WorldWideScience

Sample records for steganography focusing ascii

  1. Effective ASCII-HEX steganography for secure cloud

    International Nuclear Information System (INIS)

    Afghan, S.

    2015-01-01

    There are many reasons of cloud computing popularity some of the most important are; backup and rescue, cost effective, nearly limitless storage, automatic software amalgamation, easy access to information and many more. Pay-as-you-go model is followed to provide everything as a service. Data is secured by using standard security policies available at cloud end. In spite of its many benefits, as mentioned above, cloud computing has also some security issues. Provider as well as customer has to provide and collect data in a secure manner. Both of these issues plus efficient transmitting of data over cloud are very critical issues and needed to be resolved. There is need of security during the travel time of sensitive data over the network that can be processed or stored by the customer. Security to the customer's data at the provider end can be provided by using current security algorithms, which are not known by the customer. There is reliability problem due to existence of multiple boundaries in the cloud resource access. ASCII and HEX security with steganography is used to propose an algorithm that stores the encrypted data/cipher text in an image file which will be then sent to the cloud end. This is done by using CDM (Common Deployment Model). In future, an algorithm should be proposed and implemented for the security of virtual images in the cloud computing. (author)

  2. Combination Base64 Algorithm and EOF Technique for Steganography

    Science.gov (United States)

    Rahim, Robbi; Nurdiyanto, Heri; Hidayat, Rahmat; Saleh Ahmar, Ansari; Siregar, Dodi; Putera Utama Siahaan, Andysah; Faisal, Ilham; Rahman, Sayuti; Suita, Diana; Zamsuri, Ahmad; Abdullah, Dahlan; Napitupulu, Darmawan; Ikhsan Setiawan, Muhammad; Sriadhi, S.

    2018-04-01

    The steganography process combines mathematics and computer science. Steganography consists of a set of methods and techniques to embed the data into another media so that the contents are unreadable to anyone who does not have the authority to read these data. The main objective of the use of base64 method is to convert any file in order to achieve privacy. This paper discusses a steganography and encoding method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, the EoF technique is used to embed encoding text performed by Base64. As an example, for the mechanisms a file is used to represent the texts, and by using the two methods together will increase the security level for protecting the data, this research aims to secure many types of files in a particular media with a good security and not to damage the stored files and coverage media that used.

  3. Robust Steganography Using LSB-XOR and Image Sharing

    OpenAIRE

    Adak, Chandranath

    2013-01-01

    Hiding and securing the secret digital information and data that are transmitted over the internet is of widespread and most challenging interest. This paper presents a new idea of robust steganography using bitwise-XOR operation between stego-key-image-pixel LSB (Least Significant Bit) value and secret message-character ASCII-binary value (or, secret image-pixel value). The stego-key-image is shared in dual-layer using odd-even position of each pixel to make the system robust. Due to image s...

  4. Steganography: LSB Methodology

    Science.gov (United States)

    2012-08-02

    of LSB steganography in grayscale and color images . In J. Dittmann, K. Nahrstedt, and P. Wohlmacher, editors, Proceedings of the ACM, Special...Fridrich, M. Gojan and R. Du paper titled “Reliable detection of LSB steganography in grayscale and color images ”. From a general perspective Figure 2...REPORT Steganography : LSB Methodology (Progress Report) 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: In computer science, steganography is the science

  5. Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers

    Directory of Open Access Journals (Sweden)

    Asawaree Kulkarni

    2009-06-01

    Full Text Available Steganography is the art and science of hiding information within information so that an observer does not know that communication is taking place. Bad actors passing information using steganography are of concern to the national security establishment and law enforcement. An attempt was made to determine if steganography was being used by criminals to communicate information. Web crawling technology was used and images were downloaded from Web sites that were considered as likely candidates for containing information hidden using steganographic techniques. A detection tool was used to analyze these images. The research failed to demonstrate that steganography was prevalent on the public Internet. The probable reasons included the growth and availability of large number of steganography-producing tools and the limited capacity of the detection tools to cope with them. Thus, a redirection was introduced in the methodology and the detection focus was shifted from the analysis of the ‘product’ of the steganography-producing software; viz. the images, to the 'artifacts’ left by the steganography-producing software while it is being used to generate steganographic images. This approach was based on the concept of ‘Stego-Usage Timeline’. As a proof of concept, a sample set of criminal computers was scanned for the remnants of steganography-producing software. The results demonstrated that the problem of ‘the detection of the usage of steganography’ could be addressed by the approach adopted after the research redirection and that certain steganographic software was popular among the criminals. Thus, the contribution of the research was in demonstrating that the limitations of the tools based on the signature detection of steganographically altered images can be overcome by focusing the detection effort on detecting the artifacts of the steganography-producing tools.

  6. Quantum steganography using prior entanglement

    International Nuclear Information System (INIS)

    Mihara, Takashi

    2015-01-01

    Steganography is the hiding of secret information within innocent-looking information (e.g., text, audio, image, video, etc.). A quantum version of steganography is a method based on quantum physics. In this paper, we propose quantum steganography by combining quantum error-correcting codes with prior entanglement. In many steganographic techniques, embedding secret messages in error-correcting codes may cause damage to them if the embedded part is corrupted. However, our proposed steganography can separately create secret messages and the content of cover messages. The intrinsic form of the cover message does not have to be modified for embedding secret messages. - Highlights: • Our steganography combines quantum error-correcting codes with prior entanglement. • Our steganography can separately create secret messages and the content of cover messages. • Errors in cover messages do not have affect the recovery of secret messages. • We embed a secret message in the Steane code as an example of our steganography

  7. Quantum steganography using prior entanglement

    Energy Technology Data Exchange (ETDEWEB)

    Mihara, Takashi, E-mail: mihara@toyo.jp

    2015-06-05

    Steganography is the hiding of secret information within innocent-looking information (e.g., text, audio, image, video, etc.). A quantum version of steganography is a method based on quantum physics. In this paper, we propose quantum steganography by combining quantum error-correcting codes with prior entanglement. In many steganographic techniques, embedding secret messages in error-correcting codes may cause damage to them if the embedded part is corrupted. However, our proposed steganography can separately create secret messages and the content of cover messages. The intrinsic form of the cover message does not have to be modified for embedding secret messages. - Highlights: • Our steganography combines quantum error-correcting codes with prior entanglement. • Our steganography can separately create secret messages and the content of cover messages. • Errors in cover messages do not have affect the recovery of secret messages. • We embed a secret message in the Steane code as an example of our steganography.

  8. Investigator's guide to steganography

    CERN Document Server

    Kipper, Gregory

    2003-01-01

    The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future

  9. Steganography and Steganalysis in Digital Images

    Science.gov (United States)

    2012-01-01

    REPORT Steganography and Steganalysis in Digital Images 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Steganography (from the Greek for "covered writing...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Least Significant Bit ( LSB ), steganography , steganalysis, stegogramme. Dr. Jeff Duffany...Z39.18 - Steganography and Steganalysis in Digital Images Report Title ABSTRACT Steganography (from the Greek for "covered writing") is the secret

  10. Towards Statistically Undetectable Steganography

    Science.gov (United States)

    2011-06-30

    payload size. Middle, payload proportional to y/N. Right, proportional to N. LSB replacement steganography in never-compressed cover images , detected... Images for Applications in Steganography ," IEEE Trans, on Info. Forensics and Security, vol. 3(2), pp. 247-258, 2008. Conference papers. (1) T. Filler...SPLE, Electronic Imaging , Security, Forensics, Steganography , and Watermarking of Mul- timedia Contents X, San Jose, CA, January 26-31, pp. 11-1-11-13

  11. Noiseless Steganography The Key to Covert Communications

    CERN Document Server

    Desoky, Abdelrahman

    2012-01-01

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise b

  12. COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS

    Directory of Open Access Journals (Sweden)

    S. A. Seyyedi

    2013-01-01

    Full Text Available Steganography is a method of hiding information in other information of different format (container. There are many steganography techniques with various types of container. In the Internet, digital images are the most popular and frequently used containers. We consider main image steganography techniques and their advantages and disadvantages. We also identify the requirements of a good steganography algorithm and compare various such algorithms.

  13. Steganography Detection Using Entropy Measures

    Science.gov (United States)

    2012-11-16

    latter leads to the level of compression of the image . 3.3. Least Significant Bit ( LSB ) The object of steganography is to prevent suspicion upon the...6 2.3. Different kinds of steganography . . . . . . . . . . . . . . . . . . . . . 6 II. Steganography 8 3. Images and Significance of...9 3.3. Least Significant Bit ( LSB ) . . . . . . . . . . . . . . . . . . . . . . . . 9 3.4. Significant Bit Image Depiction

  14. A Survey on different techniques of steganography

    Directory of Open Access Journals (Sweden)

    Kaur Harpreet

    2016-01-01

    Full Text Available Steganography is important due to the exponential development and secret communication of potential computer users over the internet. Steganography is the art of invisible communication to keep secret information inside other information. Steganalysis is the technology that attempts to ruin the Steganography by detecting the hidden information and extracting.Steganography is the process of Data embedding in the images, text/documented, audio and video files. The paper also highlights the security improved by applying various techniques of video steganography.

  15. PIXEL PATTERN BASED STEGANOGRAPHY ON IMAGES

    Directory of Open Access Journals (Sweden)

    R. Rejani

    2015-02-01

    Full Text Available One of the drawback of most of the existing steganography methods is that it alters the bits used for storing color information. Some of the examples include LSB or MSB based steganography. There are also various existing methods like Dynamic RGB Intensity Based Steganography Scheme, Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm etc that can be used to find out the steganography method used and break it. Another drawback of the existing methods is that it adds noise to the image which makes the image look dull or grainy making it suspicious for a person about existence of a hidden message within the image. To overcome these shortcomings we have come up with a pixel pattern based steganography which involved hiding the message within in image by using the existing RGB values whenever possible at pixel level or with minimum changes. Along with the image a key will also be used to decrypt the message stored at pixel levels. For further protection, both the message stored as well as the key file will be in encrypted format which can have same or different keys or decryption. Hence we call it as a RGB pixel pattern based steganography.

  16. Forensic analysis of video steganography tools

    Directory of Open Access Journals (Sweden)

    Thomas Sloan

    2015-05-01

    Full Text Available Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend ceasing any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful

  17. Digital watermarking and steganography fundamentals and techniques

    CERN Document Server

    Shih, Frank Y

    2007-01-01

    Introduction Digital Watermarking Digital Steganography Differences between Watermarking and Steganography A Brief History Appendix: Selected List of Books on Watermarking and Steganography Classification in Digital Watermarking Classification Based on Characteristics Classification Based on Applications Mathematical Preliminaries  Least-Significant-Bit Substitution Discrete Fourier Transform (DFT) Discrete Cosine Transform Discrete Wavelet Transform Random Sequence Generation  The Chaotic M

  18. State Of The Art In Digital Steganography Focusing ASCII Text Documents

    OpenAIRE

    Rafat, Khan Farhan; Sher, Muhammad

    2010-01-01

    Digitization of analogue signals has opened up new avenues for information hiding and the recent advancements in the telecommunication field has taken up this desire even further. From copper wire to fiber optics, technology has evolved and so are ways of covert channel communication. By "Covert" we mean "anything not meant for the purpose for which it is being used". Investigation and detection of existence of such cover channel communication has always remained a serious concern of informat...

  19. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  20. ASCII Art Synthesis from Natural Photographs.

    Science.gov (United States)

    Xu, Xuemiao; Zhong, Linyuan; Xie, Minshan; Liu, Xueting; Qin, Jing; Wong, Tien-Tsin

    2017-08-01

    While ASCII art is a worldwide popular art form, automatic generating structure-based ASCII art from natural photographs remains challenging. The major challenge lies on extracting the perception-sensitive structure from the natural photographs so that a more concise ASCII art reproduction can be produced based on the structure. However, due to excessive amount of texture in natural photos, extracting perception-sensitive structure is not easy, especially when the structure may be weak and within the texture region. Besides, to fit different target text resolutions, the amount of the extracted structure should also be controllable. To tackle these challenges, we introduce a visual perception mechanism of non-classical receptive field modulation (non-CRF modulation) from physiological findings to this ASCII art application, and propose a new model of non-CRF modulation which can better separate the weak structure from the crowded texture, and also better control the scale of texture suppression. Thanks to our non-CRF model, more sensible ASCII art reproduction can be obtained. In addition, to produce more visually appealing ASCII arts, we propose a novel optimization scheme to obtain the optimal placement of proportional-font characters. We apply our method on a rich variety of images, and visually appealing ASCII art can be obtained in all cases.

  1. Spread spectrum image steganography.

    Science.gov (United States)

    Marvel, L M; Boncelet, C R; Retter, C T

    1999-01-01

    In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

  2. Comparison of Video Steganography Methods for Watermark Embedding

    Directory of Open Access Journals (Sweden)

    Griberman David

    2016-05-01

    Full Text Available The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection. Four embedding methods that use Discrete Cosine and Discrete Wavelet Transforms have been researched and compared based on their embedding efficiency and fidelity. A video steganography program has been developed in the Java programming language with all of the researched methods implemented for experiments. The experiments used 3 video containers with different amounts of movement. The impact of the movement has been addressed in the paper as well as the ways of potential improvement of embedding efficiency using adaptive embedding based on the movement amount. Results of the research have been verified using a survey with 17 participants.

  3. Survey of the Use of Steganography over the Internet

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela DINCA

    2011-01-01

    Full Text Available This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof. Niels Provos and Peter Honeyman conducted an extensive Internet search where they analyzed over 2 million images and didn’t find a single hidden image. After this study the scientific community was divided: some believed that Niels Provos and Peter Honeyman was conclusive enough other did not. This paper describes what Steganography is and what can be used for, various Steganography techniques and also presents the studies made regarding the use of Steganography on the Internet.

  4. On LSB Spatial Domain Steganography and Channel Capacity

    Science.gov (United States)

    2008-03-21

    reveal the hidden information should not be taken as proof that the image is now clean. The survivability of LSB type spatial domain steganography ...the mindset that JPEG compressing an image is sufficient to destroy the steganography for spatial domain LSB type stego. We agree that JPEGing...modeling of 2 bit LSB steganography shows that theoretically there is non-zero stego payload possible even though the image has been JPEGed. We wish to

  5. Researcher’s Perspective of Substitution Method on Text Steganography

    Science.gov (United States)

    Zamir Mansor, Fawwaz; Mustapha, Aida; Azah Samsudin, Noor

    2017-08-01

    The linguistic steganography studies are still in the stage of development and empowerment practices. This paper will present several text steganography on substitution methods based on the researcher’s perspective, all scholar paper will analyse and compared. The objective of this paper is to give basic information in the substitution method of text domain steganography that has been applied by previous researchers. The typical ways of this method also will be identified in this paper to reveal the most effective method in text domain steganography. Finally, the advantage of the characteristic and drawback on these techniques in generally also presented in this paper.

  6. Implementation of IMAGE STEGANOGRAPHY Based on Random LSB

    OpenAIRE

    Ashish kumari; Shyama Sharma; Navdeep Bohra

    2012-01-01

    Steganography is the technique of hiding a private message within a file in such a manner that third party cannot know the existence of matter or the hidden information. The purpose of Steganography is to create secrete communication between the sender and the receiver byreplacing the least significant bits (LSB)of the cover image with the data bits. And in this paper we have shown that how image steganography (random and sequential LSB) works and practical understanding of what image Stegano...

  7. Video steganography based on bit-plane decomposition of wavelet-transformed video

    Science.gov (United States)

    Noda, Hideki; Furuta, Tomofumi; Niimi, Michiharu; Kawaguchi, Eiji

    2004-06-01

    This paper presents a steganography method using lossy compressed video which provides a natural way to send a large amount of secret data. The proposed method is based on wavelet compression for video data and bit-plane complexity segmentation (BPCS) steganography. BPCS steganography makes use of bit-plane decomposition and the characteristics of the human vision system, where noise-like regions in bit-planes of a dummy image are replaced with secret data without deteriorating image quality. In wavelet-based video compression methods such as 3-D set partitioning in hierarchical trees (SPIHT) algorithm and Motion-JPEG2000, wavelet coefficients in discrete wavelet transformed video are quantized into a bit-plane structure and therefore BPCS steganography can be applied in the wavelet domain. 3-D SPIHT-BPCS steganography and Motion-JPEG2000-BPCS steganography are presented and tested, which are the integration of 3-D SPIHT video coding and BPCS steganography, and that of Motion-JPEG2000 and BPCS, respectively. Experimental results show that 3-D SPIHT-BPCS is superior to Motion-JPEG2000-BPCS with regard to embedding performance. In 3-D SPIHT-BPCS steganography, embedding rates of around 28% of the compressed video size are achieved for twelve bit representation of wavelet coefficients with no noticeable degradation in video quality.

  8. An Analysis of Perturbed Quantization Steganography in the Spatial Domain

    Science.gov (United States)

    2005-03-01

    Transform Domain While LSB steganography hides data in the least significant areas of image pixels, this data is not robust against lossy digital...introduced a technique for detecting least significant bit ( LSB ) steganography in digital images called RS Steganalysis. RS Steganalysis produces a...the function has the effect of additive noise similar to that introduced by pixel based LSB steganography . In clean cover images , the flipping

  9. Multimedia security watermarking, steganography, and forensics

    CERN Document Server

    Shih, Frank Y

    2012-01-01

    Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different asp

  10. Secure steganography designed for mobile platforms

    Science.gov (United States)

    Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.

    2006-05-01

    Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.

  11. A New Paradigm Hidden in Steganography

    Science.gov (United States)

    2000-01-01

    the n least signi cant bits ( LSB ) of each pixel in the cov- erimage, with the n most signi cant bits (MSB) from the corresponding pixel of the image to...e.g., 2 LSB are (0,0) ) to 3 (e.g., 2 LSB are (1,1) ), it is visually impossible for Eve to detect the steganography . Of course, if Eve has knowl...cryptographic security when the steganography has failed. Simply encrypt the embedded bits so that the 2 LSB in the stegoimage appear as white noise

  12. Secure Image Steganography Algorithm Based on DCT with OTP Encryption

    Directory of Open Access Journals (Sweden)

    De Rosal Ignatius Moses Setiadi

    2017-04-01

    Full Text Available Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR and ormalize cross Correlation (NCC to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT, One Time Pad, Vernam, Chiper, Image Cryptography

  13. Multi-Class Classification for Identifying JPEG Steganography Embedding Methods

    Science.gov (United States)

    2008-09-01

    digital pictures on Web sites or sending them through email (Astrowsky, 2000). Steganography may also be used to allow communication between affiliates...B.H. (2000). STEGANOGRAPHY: Hidden Images, A New Challenge in the Fight Against Child Porn . UPDATE, Volume 13, Number 2, pp. 1-4, Retrieved June 3

  14. Steganography and Cryptography Inspired Enhancement of Introductory Programming Courses

    Science.gov (United States)

    Kortsarts, Yana; Kempner, Yulia

    2015-01-01

    Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…

  15. Steganography and Prospects of Its Application in Protection of Printing Documents

    Directory of Open Access Journals (Sweden)

    M. O. Zhmakin

    2010-09-01

    Full Text Available In the article the principle of steganography reveals. Three modern directions of concealment of the information are presented. Application classical steganography in printing prints is described.

  16. Wireless steganography

    Science.gov (United States)

    Agaian, Sos S.; Akopian, David; D'Souza, Sunil

    2006-02-01

    Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends in mobile phone technology indicate that tasks achievable by mobile devices will soon exceed our imagination. This paper undertakes a case study of the development and implementation of one of the first known steganography (data hiding) applications on a mobile device. Steganography is traditionally accomplished using the high processing speeds of desktop or notebook computers. With the introduction of mobile platform operating systems, there arises an opportunity for the users to develop and embed their own applications. We take advantage of this opportunity with the introduction of wireless steganographic algorithms. Thus we demonstrates that custom applications, popular with security establishments, can be developed also on mobile systems independent of both the mobile device manufacturer and mobile service provider. For example, this might be a very important feature if the communication is to be controlled exclusively by authorized personnel. The paper begins by reviewing the technological capabilities of modern mobile devices. Then we address a suitable development platform which is based on Symbian TM/Series60 TM architecture. Finally, two data hiding applications developed for Symbian TM/Series60 TM mobile phones are presented.

  17. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Fadhil Mahmood

    2013-04-01

    Full Text Available     Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.        In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.      This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secures data transmission applications

  18. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Mahmood

    2014-04-01

    Full Text Available Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.  In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.  This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secure data transmission applications

  19. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  20. LSB Based Quantum Image Steganography Algorithm

    Science.gov (United States)

    Jiang, Nan; Zhao, Na; Wang, Luo

    2016-01-01

    Quantum steganography is the technique which hides a secret message into quantum covers such as quantum images. In this paper, two blind LSB steganography algorithms in the form of quantum circuits are proposed based on the novel enhanced quantum representation (NEQR) for quantum images. One algorithm is plain LSB which uses the message bits to substitute for the pixels' LSB directly. The other is block LSB which embeds a message bit into a number of pixels that belong to one image block. The extracting circuits can regain the secret message only according to the stego cover. Analysis and simulation-based experimental results demonstrate that the invisibility is good, and the balance between the capacity and the robustness can be adjusted according to the needs of applications.

  1. CRYPTO-STEG: A Hybrid Cryptology - Steganography Approach for Improved Data Security

    Directory of Open Access Journals (Sweden)

    Atif Bin Mansoor

    2012-04-01

    Full Text Available Internet is a widely used medium for transfer of information due to its reach and ease of availability. However, internet is an insecure medium and any information might be easily intercepted and viewed during its transfer. Different mechanisms like cryptology and steganography are adopted to secure the data communication over an inherently insecure medium like internet. Cryptology scrambles the information in a manner that an unintended recipient cannot easily extract the information, while steganography hides the information in a cover object so that it is transferred unnoticed in the cover. Encrypted data may not be extracted easily but causes a direct suspicion to any observer, while data hidden using steganographic techniques go inconspicuous. Cryptanalysis is the process of attacking the encrypted text to extract the information, while steganalysis is the process of detecting the disguised messages. In literature, both cryptology and steganography are treated separately. In this paper, we present our research on an improved data security paradigm, where data is first encrypted using AES (Advanced Encryption Standard and DES (Data Encryption Standard cryptology algorithms. Both plain and encrypted data is hidden in the images using Model Based and F5 steganographic techniques. Features are extracted in DWT (Discrete Wavelet Transform and DCT (Discrete Cosine Transform domains using higher order statistics for steganalysis, and subsequently used to train a FLD (Fisher Linear Discriminant classifier which is employed to categorize a separate set of images as clean or stego (containing hidden messages. Experimental results demonstrate improved data security using proposed CRYPTO-STEG approach compared to plain text steganography. Results also demonstrate that the Model Based steganography is more secure than the F5 steganography.

  2. Survey Report – State Of The Art In Digital Steganography Focusing ASCII Text Documents

    OpenAIRE

    Khan Farhan Rafat; Muhammad Sher

    2010-01-01

    Digitization of analogue signals has opened up new avenues for information hiding and the recent advancements in the telecommunication field has taken up this desire even further. From copper wire to fiber optics, technology has evolved and so are ways of covert channel communication. By “Covert” we mean “anything not meant for the purpose for which it is being used”. Investigation and detection of existence of such cover channel communication has always remained a serious concern of informat...

  3. A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition

    Directory of Open Access Journals (Sweden)

    Junhui He

    2018-01-01

    Full Text Available Steganography is a means of covert communication without revealing the occurrence and the real purpose of communication. The adaptive multirate wideband (AMR-WB is a widely adapted format in mobile handsets and is also the recommended speech codec for VoLTE. In this paper, a novel AMR-WB speech steganography is proposed based on diameter-neighbor codebook partition algorithm. Different embedding capacity may be achieved by adjusting the iterative parameters during codebook division. The experimental results prove that the presented AMR-WB steganography may provide higher and flexible embedding capacity without inducing perceptible distortion compared with the state-of-the-art methods. With 48 iterations of cluster merging, twice the embedding capacity of complementary-neighbor-vertices-based embedding method may be obtained with a decrease of only around 2% in speech quality and much the same undetectability. Moreover, both the quality of stego speech and the security regarding statistical steganalysis are better than the recent speech steganography based on neighbor-index-division codebook partition.

  4. Raw Data (ASCII format) - PLACE | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available List Contact us PLACE Raw Data (ASCII format) Data detail Data name Raw Data (ASCII format) DOI 10.18908/lsd...miter About This Database Database Description Download License Update History of This Database Site Policy | Contact Us Raw Data (ASCII format) - PLACE | LSDB Archive ...

  5. Online Voting System Based on Image Steganography and Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Biju Issac

    2017-01-01

    Full Text Available This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE on a web-based interface, with MySQL database server and Glassfish application server as the backend. After considering the requirements of an online voting system, current technologies on electronic voting schemes in published literature were examined. Next, the cryptographic and steganography techniques best suited for the requirements of the voting system were chosen, and the software was implemented. We have incorporated in our system techniques like the password hashed based scheme, visual cryptography, F5 image steganography and threshold decryption cryptosystem. The analysis, design and implementation phase of the software development of the voting system is discussed in detail. We have also used a questionnaire survey and did the user acceptance testing of the system.

  6. Throughput increase of the covert communication channel organized by the stable steganography algorithm using spatial domain of the image

    Directory of Open Access Journals (Sweden)

    O.V. Kostyrka

    2016-09-01

    Full Text Available At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed steganography message, significant throughput of a steganography communication channel. Aim: The aim of this research is to modify the steganography method, developed by the author earlier, which will allow to increase the throughput of the corresponding covert communication channel when saving resistance to attacks against the built-in message and perception reliability of the created steganography message, inherent to developed method. Materials and Methods: Modifications of a steganography method that is steady against attacks against the built-in message which is carrying out the inclusion and decoding of the sent (additional information in spatial domain of the image allowing to increase the throughput of the organized communication channel are offered. Use of spatial domain of the image allows to avoid accumulation of an additional computational error during the inclusion/decoding of additional information due to “transitions” from spatial domain of the image to the area of conversion and back that positively affects the efficiency of decoding. Such methods are considered as attacks against the built-in message: imposing of different noise on a steganography message, filtering, lossy compression of a ste-ganography message where the JPEG and JPEG2000 formats with different quality coefficients for saving of a steganography message are used. Results: It is shown that algorithmic implementations of the offered methods modifications remain steady against the perturbing influences, including considerable, provide reliability of perception of the created steganography message, increase the throughput of the created steganography communication channel in comparison with the algorithm implementing

  7. Quantum red-green-blue image steganography

    Science.gov (United States)

    Heidari, Shahrokh; Pourarian, Mohammad Rasoul; Gheibi, Reza; Naseri, Mosayeb; Houshmand, Monireh

    One of the most considering matters in the field of quantum information processing is quantum data hiding including quantum steganography and quantum watermarking. This field is an efficient tool for protecting any kind of digital data. In this paper, three quantum color images steganography algorithms are investigated based on Least Significant Bit (LSB). The first algorithm employs only one of the image’s channels to cover secret data. The second procedure is based on LSB XORing technique, and the last algorithm utilizes two channels to cover the color image for hiding secret quantum data. The performances of the proposed schemes are analyzed by using software simulations in MATLAB environment. The analysis of PSNR, BER and Histogram graphs indicate that the presented schemes exhibit acceptable performances and also theoretical analysis demonstrates that the networks complexity of the approaches scales squarely.

  8. A novel quantum steganography scheme for color images

    Science.gov (United States)

    Li, Panchi; Liu, Xiande

    In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme outperforms several other existing schemes in terms of embedding capacity and security.

  9. A novel JPEG steganography method based on modulus function with histogram analysis

    Directory of Open Access Journals (Sweden)

    V. Banoci

    2012-06-01

    Full Text Available In this paper, we present a novel steganographic method for embedding of secret data in still grayscale JPEG image. In order to provide large capacity of the proposed method while maintaining good visual quality of stego-image, the embedding process is performed in quantized transform coefficients of Discrete Cosine transform (DCT by modifying coefficients according to modulo function, what gives to the steganography system blind extraction predisposition. After-embedding histogram of proposed Modulo Histogram Fitting (MHF method is analyzed to secure steganography system against steganalysis attacks. In addition, AES ciphering was implemented to increase security and improve histogram after-embedding characteristics of proposed steganography system as experimental results show.

  10. LSB-based Steganography Using Reflected Gray Code for Color Quantum Images

    Science.gov (United States)

    Li, Panchi; Lu, Aiping

    2018-02-01

    At present, the classical least-significant-bit (LSB) based image steganography has been extended to quantum image processing. For the existing LSB-based quantum image steganography schemes, the embedding capacity is no more than 3 bits per pixel. Therefore, it is meaningful to study how to improve the embedding capacity of quantum image steganography. This work presents a novel LSB-based steganography using reflected Gray code for colored quantum images, and the embedding capacity of this scheme is up to 4 bits per pixel. In proposed scheme, the secret qubit sequence is considered as a sequence of 4-bit segments. For the four bits in each segment, the first bit is embedded in the second LSB of B channel of the cover image, and and the remaining three bits are embedded in LSB of RGB channels of each color pixel simultaneously using reflected-Gray code to determine the embedded bit from secret information. Following the transforming rule, the LSB of stego-image are not always same as the secret bits and the differences are up to almost 50%. Experimental results confirm that the proposed scheme shows good performance and outperforms the previous ones currently found in the literature in terms of embedding capacity.

  11. Improved chaos-based video steganography using DNA alphabets

    Directory of Open Access Journals (Sweden)

    Nirmalya Kar

    2018-03-01

    Full Text Available DNA based steganography plays a vital role in the field of privacy and secure communication. Here, we propose a DNA properties-based mechanism to send data hidden inside a video file. Initially, the video file is converted into image frames. Random frames are then selected and data is hidden in these at random locations by using the Least Significant Bit substitution method. We analyze the proposed architecture in terms of peak signal-to-noise ratio as well as mean squared error measured between the original and steganographic files averaged over all video frames. The results show minimal degradation of the steganographic video file. Keywords: Chaotic map, DNA, Linear congruential generator, Video steganography, Least significant bit

  12. New methods to improve the pixel domain steganography, steganalysis, and simplify the assessment of steganalysis tools

    OpenAIRE

    Khalind, Omed Saleem

    2015-01-01

    Unlike other security methods, steganography hides the very existence of secret messages rather than their content only. Both steganography and steganalysis are strongly related to each other, the new steganographic methods should be evaluated with current steganalysis methods and vice-versa. Since steganography is considered broken when the stego object is recognised, undetectability would be the most important property of any steganographic system. Digital image files are excellent media fo...

  13. An Improvement on LSB Matching and LSB Matching Revisited Steganography Methods

    OpenAIRE

    Qazanfari, Kazem; Safabakhsh, Reza

    2017-01-01

    The aim of the steganography methods is to communicate securely in a completely undetectable manner. LSB Matching and LSB Matching Revisited steganography methods are two general and esiest methods to achieve this aim. Being secured against first order steganalysis methods is the most important feature of these methods. On the other hand, these methods don't consider inter pixel dependency. Therefore, recently, several steganalysis methods are proposed that by using co-occurrence matrix detec...

  14. Adaptive steganography

    Science.gov (United States)

    Chandramouli, Rajarathnam; Li, Grace; Memon, Nasir D.

    2002-04-01

    Steganalysis techniques attempt to differentiate between stego-objects and cover-objects. In recent work we developed an explicit analytic upper bound for the steganographic capacity of LSB based steganographic techniques for a given false probability of detection. In this paper we look at adaptive steganographic techniques. Adaptive steganographic techniques take explicit steps to escape detection. We explore different techniques that can be used to adapt message embedding to the image content or to a known steganalysis technique. We investigate the advantages of adaptive steganography within an analytical framework. We also give experimental results with a state-of-the-art steganalysis technique demonstrating that adaptive embedding results in a significant number of bits embedded without detection.

  15. COMPARATIVE STUDY OF EDGE BASED LSB MATCHING STEGANOGRAPHY FOR COLOR IMAGES

    Directory of Open Access Journals (Sweden)

    A.J. Umbarkar

    2016-02-01

    Full Text Available Steganography is a very pivotal technique mainly used for covert transfer of information over a covert communication channel. This paper proposes a significant comparative study of the spatial LSB domain technique that focuses on sharper edges of the color as well as gray scale images for the purpose of data hiding and hides secret message first in sharper edge regions and then in smooth regions of the image. Message embedding depends on content of the image and message size. The experimental results illustrate that, for low embedding rate the method hides the message in sharp edges of cover image to get better stego image visualization quality. For high embedding rate, smooth regions and edges of the cover image are used for the purpose of data hiding. In this steganography method, color image and textured kind of image preserves better visual quality of stego image. The novelty of the comparative study is that, it helps to analyze the efficiency and performance of the method as it gives better results because it directly works on color images instead of converting to gray scale image.

  16. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  17. AUDIO CRYPTANALYSIS- AN APPLICATION OF SYMMETRIC KEY CRYPTOGRAPHY AND AUDIO STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Smita Paira

    2016-09-01

    Full Text Available In the recent trend of network and technology, “Cryptography” and “Steganography” have emerged out as the essential elements of providing network security. Although Cryptography plays a major role in the fabrication and modification of the secret message into an encrypted version yet it has certain drawbacks. Steganography is the art that meets one of the basic limitations of Cryptography. In this paper, a new algorithm has been proposed based on both Symmetric Key Cryptography and Audio Steganography. The combination of a randomly generated Symmetric Key along with LSB technique of Audio Steganography sends a secret message unrecognizable through an insecure medium. The Stego File generated is almost lossless giving a 100 percent recovery of the original message. This paper also presents a detailed experimental analysis of the algorithm with a brief comparison with other existing algorithms and a future scope. The experimental verification and security issues are promising.

  18. EFFICIENT ADAPTIVE STEGANOGRAPHY FOR COLOR IMAGESBASED ON LSBMR ALGORITHM

    Directory of Open Access Journals (Sweden)

    B. Sharmila

    2012-02-01

    Full Text Available Steganography is the art of hiding the fact that communication is taking place, by hiding information in other medium. Many different carrier file formats can be used, but digital images are the most popular because of their frequent use on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques. The Least Significant Bit (LSB based approach is a simplest type of steganographic algorithm. In all the existing approaches, the decision of choosing the region within a cover image is performed without considering the relationship between image content and the size of secret message. Thus, the plain regions in the cover will be ruin after data hiding even at a low data rate. Hence choosing the edge region for data hiding will be a solution. Many algorithms are deal with edges in images for data hiding. The Paper 'Edge adaptive image steganography based on LSBMR algorithm' is a LSB steganography presented the results of algorithms on gray-scale images only. This paper presents the results of analyzing the performance of edge adaptive steganography for colored images (JPEG. The algorithms have been slightly modified for colored image implementation and are compared on the basis of evaluation parameters like peak signal noise ratio (PSNR and mean square error (MSE. This method can select the edge region depending on the length of secret message and difference between two consecutive bits in the cover image. For length of message is short, only small edge regions are utilized while on leaving other region as such. When the data rate increases, more regions can be used adaptively for data hiding by adjusting the parameters. Besides this, the message is encrypted using efficient cryptographic algorithm which further increases the security.

  19. Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

    Science.gov (United States)

    Yu, Lifang; Zhao, Yao; Ni, Rongrong; Li, Ting

    2010-12-01

    We propose a novel steganographic method in JPEG images with high performance. Firstly, we propose improved adaptive LSB steganography, which can achieve high capacity while preserving the first-order statistics. Secondly, in order to minimize visual degradation of the stego image, we shuffle bits-order of the message based on chaos whose parameters are selected by the genetic algorithm. Shuffling message's bits-order provides us with a new way to improve the performance of steganography. Experimental results show that our method outperforms classical steganographic methods in image quality, while preserving characteristics of histogram and providing high capacity.

  20. Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Yu Lifang

    2010-01-01

    Full Text Available We propose a novel steganographic method in JPEG images with high performance. Firstly, we propose improved adaptive LSB steganography, which can achieve high capacity while preserving the first-order statistics. Secondly, in order to minimize visual degradation of the stego image, we shuffle bits-order of the message based on chaos whose parameters are selected by the genetic algorithm. Shuffling message's bits-order provides us with a new way to improve the performance of steganography. Experimental results show that our method outperforms classical steganographic methods in image quality, while preserving characteristics of histogram and providing high capacity.

  1. Quantum Steganography via Greenberger-Horne-Zeilinger GHZ4 State

    International Nuclear Information System (INIS)

    El Allati, A.; Hassouni, Y.; Medeni, M.B. Ould

    2012-01-01

    A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ 4 state is constructed to investigate the possibility of remotely transferred hidden information. Moreover, the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information. Then, the scheme consists of sharing the correlation of four particle GHZ 4 states between the legitimate users. After insuring the security of the quantum channel, they begin to hide the secret information in the cover of message. Comparing the scheme with the previous quantum steganographies, capacity and imperceptibility of hidden message are good. The security of the present scheme against many attacks is also discussed. (general)

  2. Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss

    Directory of Open Access Journals (Sweden)

    Avinash Srinivasan

    2015-08-01

    Full Text Available Information hiding techniques, especially steganography, have been extensively researched for over two decades. Nonetheless, steganography on smartphones over cellular carrier networks is yet to be fully explored. Today, smartphones, which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel. In this paper, we propose Android-Stego - a framework for steganography employing smart-phones. Android-Stego has been evaluated and confirmed to achieve covert communication over real world cellular service providers' communication networks such as Verizon and Sprint. A key contribution of our research presented in this paper is the benchmark results we have provided by analyzing real world cellular carriers network restrictions on MMS message size. We have also analyzed the actions the carriers take - such as compression and/or format conversion - on MMS messages that fall outside the established MMS communication norm, which varies for each service provider. Finally, We have used these benchmark results in implementing Android-Stego such that it is sensitive to carrier restrictions and robust to message loss.

  3. SEGY to ASCII: Conversion and Plotting Program

    Science.gov (United States)

    Goldman, Mark R.

    1999-01-01

    This report documents a computer program to convert standard 4 byte, IBM floating point SEGY files to ASCII xyz format. The program then optionally plots the seismic data using the GMT plotting package. The material for this publication is contained in a standard tar file (of99-126.tar) that is uncompressed and 726 K in size. It can be downloaded by any Unix machine. Move the tar file to the directory you wish to use it in, then type 'tar xvf of99-126.tar' The archive files (and diskette) contain a NOTE file, a README file, a version-history file, source code, a makefile for easy compilation, and an ASCII version of the documentation. The archive files (and diskette) also contain example test files, including a typical SEGY file along with the resulting ASCII xyz and postscript files. Requirements for compiling the source code into an executable are a C++ compiler. The program has been successfully compiled using Gnu's g++ version 2.8.1, and use of other compilers may require modifications to the existing source code. The g++ compiler is a free, high quality C++ compiler and may be downloaded from the ftp site: ftp://ftp.gnu.org/gnu Requirements for plotting the seismic data is the existence of the GMT plotting package. The GMT plotting package may be downloaded from the web site: http://www.soest.hawaii.edu/gmt/

  4. New LSB-based colour image steganography method to enhance ...

    Indian Academy of Sciences (India)

    Mustafa Cem kasapbaşi

    2018-04-27

    Apr 27, 2018 ... evaluate the proposed method, comparative performance tests are carried out against different spatial image ... image steganography applications based on LSB are ..... worst case scenario could occur when having highest.

  5. New quantization matrices for JPEG steganography

    Science.gov (United States)

    Yildiz, Yesna O.; Panetta, Karen; Agaian, Sos

    2007-04-01

    Modern steganography is a secure communication of information by embedding a secret-message within a "cover" digital multimedia without any perceptual distortion to the cover media, so the presence of the hidden message is indiscernible. Recently, the Joint Photographic Experts Group (JPEG) format attracted the attention of researchers as the main steganographic format due to the following reasons: It is the most common format for storing images, JPEG images are very abundant on the Internet bulletin boards and public Internet sites, and they are almost solely used for storing natural images. Well-known JPEG steganographic algorithms such as F5 and Model-based Steganography provide high message capacity with reasonable security. In this paper, we present a method to increase security using JPEG images as the cover medium. The key element of the method is using a new parametric key-dependent quantization matrix. This new quantization table has practically the same performance as the JPEG table as far as compression ratio and image statistics. The resulting image is indiscernible from an image that was created using the JPEG compression algorithm. This paper presents the key-dependent quantization table algorithm and then analyzes the new table performance.

  6. StegNet: Mega Image Steganography Capacity with Deep Convolutional Network

    Directory of Open Access Journals (Sweden)

    Pin Wu

    2018-06-01

    Full Text Available Traditional image steganography often leans interests towards safely embedding hidden information into cover images with payload capacity almost neglected. This paper combines recent deep convolutional neural network methods with image-into-image steganography. It successfully hides the same size images with a decoding rate of 98.2% or bpp (bits per pixel of 23.57 by changing only 0.76% of the cover image on average. Our method directly learns end-to-end mappings between the cover image and the embedded image and between the hidden image and the decoded image. We further show that our embedded image, while with mega payload capacity, is still robust to statistical analysis.

  7. Diffie-Hellman Key Exchange through Steganographied Images

    Directory of Open Access Journals (Sweden)

    Amine Khaldi

    2018-05-01

    Full Text Available Purpose – In a private key system, the major problem is the exchange of the key between the two parties. Diffie and Hellman have set up a way to share the key. However, this technique is not protected against a man-in-the-middle attack as the settings are not authenticated. The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. So, we will not need a digital signature or creating a secure channel to do our key exchange since only the two concerned parts are aware of this exchange. Findings – We generate a symmetric 128-bit key between two users without use of digital signature or secure channel. However, it works only on bitmap images, heavy images and sensitive to compression.

  8. DWT Steganography with Usage of Scrambling

    Directory of Open Access Journals (Sweden)

    Jakub Oravec

    2016-07-01

    Full Text Available This article describes image steganography technique, which uses Discrete Wavelet Transform and Standard map for storage of secret data in form of binary image. Modifications, which are done on cover image depend on its scrambled and decomposed version. To avoid unnecessary amount of changes, proposed approach marks location of altered DWT coefficients. The paper ends with illustration of yielded results and presents some possible topics for future work.

  9. Application of Genetic Algorithm and Particle Swarm Optimization techniques for improved image steganography systems

    Directory of Open Access Journals (Sweden)

    Jude Hemanth Duraisamy

    2016-01-01

    Full Text Available Image steganography is one of the ever growing computational approaches which has found its application in many fields. The frequency domain techniques are highly preferred for image steganography applications. However, there are significant drawbacks associated with these techniques. In transform based approaches, the secret data is embedded in random manner in the transform coefficients of the cover image. These transform coefficients may not be optimal in terms of the stego image quality and embedding capacity. In this work, the application of Genetic Algorithm (GA and Particle Swarm Optimization (PSO have been explored in the context of determining the optimal coefficients in these transforms. Frequency domain transforms such as Bandelet Transform (BT and Finite Ridgelet Transform (FRIT are used in combination with GA and PSO to improve the efficiency of the image steganography system.

  10. DIGITAL DATA PROTECTION USING STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    R. Rejani

    2016-03-01

    Full Text Available In today’s digital world applications from a computer or a mobile device consistently used to get every kind of work done for professional as well as entertainment purpose. However, one of the major issue that a software publisher will face is the issue of piracy. Throughout the last couple of decades, almost all-major or minor software has been pirated and freely circulated across the internet. The impact of the rampant software piracy has been huge and runs into billions of dollars every year. For an independent developer or a programmer, the impact of piracy will be huge. Huge companies that make specialized software often employ complex hardware methods such as usage of dongles to avoid software piracy. However, this is not possible to do for a normal independent programmer of a small company. As part of the research, a new method of software protection that does not need proprietary hardware and other complex methods are proposed in this paper. This method uses a combination of inbuilt hardware features as well as steganography and encryption to protect the software against piracy. The properties or methods used include uniqueness of hardware, steganography, strong encryption like AES and geographic location. To avoid hacking the proposed framework also makes use of self-checks in a random manner. The process is quite simple to implement for any developer and is usable on both traditional PCs as well as mobile environments.

  11. Quantum watermarking scheme through Arnold scrambling and LSB steganography

    Science.gov (United States)

    Zhou, Ri-Gui; Hu, Wenwen; Fan, Ping

    2017-09-01

    Based on the NEQR of quantum images, a new quantum gray-scale image watermarking scheme is proposed through Arnold scrambling and least significant bit (LSB) steganography. The sizes of the carrier image and the watermark image are assumed to be 2n× 2n and n× n, respectively. Firstly, a classical n× n sized watermark image with 8-bit gray scale is expanded to a 2n× 2n sized image with 2-bit gray scale. Secondly, through the module of PA-MOD N, the expanded watermark image is scrambled to a meaningless image by the Arnold transform. Then, the expanded scrambled image is embedded into the carrier image by the steganography method of LSB. Finally, the time complexity analysis is given. The simulation experiment results show that our quantum circuit has lower time complexity, and the proposed watermarking scheme is superior to others.

  12. A Novel Steganography Technique for SDTV-H.264/AVC Encoded Video

    Directory of Open Access Journals (Sweden)

    Christian Di Laura

    2016-01-01

    Full Text Available Today, eavesdropping is becoming a common issue in the rapidly growing digital network and has foreseen the need for secret communication channels embedded in digital media. In this paper, a novel steganography technique designed for Standard Definition Digital Television (SDTV H.264/AVC encoded video sequences is presented. The algorithm introduced here makes use of the compression properties of the Context Adaptive Variable Length Coding (CAVLC entropy encoder to achieve a low complexity and real-time inserting method. The chosen scheme hides the private message directly in the H.264/AVC bit stream by modifying the AC frequency quantized residual luminance coefficients of intrapredicted I-frames. In order to avoid error propagation in adjacent blocks, an interlaced embedding strategy is applied. Likewise, the steganography technique proposed allows self-detection of the hidden message at the target destination. The code source was implemented by mixing MATLAB 2010 b and Java development environments. Finally, experimental results have been assessed through objective and subjective quality measures and reveal that less visible artifacts are produced with the technique proposed by reaching PSNR values above 40.0 dB and an embedding bit rate average per secret communication channel of 425 bits/sec. This exemplifies that steganography is affordable in digital television.

  13. A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE

    Directory of Open Access Journals (Sweden)

    MELAD J. SAEED

    2013-10-01

    Full Text Available Image steganography is the art of hiding information into a cover image. This paper presents a new technique based on chaotic steganography and encryption text in DCT domain for color image, where DCT is used to transform original image (cover image from spatial domain to frequency domain. This technique used chaotic function in two phases; firstly; for encryption secret message, second; for embedding in DCT cover image. With this new technique, good results are obtained through satisfying the important properties of steganography such as: imperceptibility; improved by having mean square error (MSE, peak signal to noise ratio (PSNR and normalized correlation (NC, to phase and capacity; improved by encoding the secret message characters with variable length codes and embedding the secret message in one level of color image only.

  14. STEGANOGRAPHY USAGE TO CONTROL MULTIMEDIA STREAM

    Directory of Open Access Journals (Sweden)

    Grzegorz Koziel

    2014-03-01

    Full Text Available In the paper, a proposal of new application for steganography is presented. It is possible to use steganographic techniques to control multimedia stream playback. Special control markers can be included in the sound signal and the player can detect markers and modify the playback parameters according to the hidden instructions. This solution allows for remembering user preferences within the audio track as well as allowing for preparation of various versions of the same content at the production level.

  15. Progressive Exponential Clustering-Based Steganography

    Directory of Open Access Journals (Sweden)

    Li Yue

    2010-01-01

    Full Text Available Cluster indexing-based steganography is an important branch of data-hiding techniques. Such schemes normally achieve good balance between high embedding capacity and low embedding distortion. However, most cluster indexing-based steganographic schemes utilise less efficient clustering algorithms for embedding data, which causes redundancy and leaves room for increasing the embedding capacity further. In this paper, a new clustering algorithm, called progressive exponential clustering (PEC, is applied to increase the embedding capacity by avoiding redundancy. Meanwhile, a cluster expansion algorithm is also developed in order to further increase the capacity without sacrificing imperceptibility.

  16. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  17. Extreme learning machine based optimal embedding location finder for image steganography.

    Directory of Open Access Journals (Sweden)

    Hayfaa Abdulzahra Atee

    Full Text Available In image steganography, determining the optimum location for embedding the secret message precisely with minimum distortion of the host medium remains a challenging issue. Yet, an effective approach for the selection of the best embedding location with least deformation is far from being achieved. To attain this goal, we propose a novel approach for image steganography with high-performance, where extreme learning machine (ELM algorithm is modified to create a supervised mathematical model. This ELM is first trained on a part of an image or any host medium before being tested in the regression mode. This allowed us to choose the optimal location for embedding the message with best values of the predicted evaluation metrics. Contrast, homogeneity, and other texture features are used for training on a new metric. Furthermore, the developed ELM is exploited for counter over-fitting while training. The performance of the proposed steganography approach is evaluated by computing the correlation, structural similarity (SSIM index, fusion matrices, and mean square error (MSE. The modified ELM is found to outperform the existing approaches in terms of imperceptibility. Excellent features of the experimental results demonstrate that the proposed steganographic approach is greatly proficient for preserving the visual information of an image. An improvement in the imperceptibility as much as 28% is achieved compared to the existing state of the art methods.

  18. A novel hash based least significant bit (2-3-3) image steganography in spatial domain

    OpenAIRE

    Manjula, G. R.; Danti, Ajit

    2015-01-01

    This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show ...

  19. Rosetta: Ensuring the Preservation and Usability of ASCII-based Data into the Future

    Science.gov (United States)

    Ramamurthy, M. K.; Arms, S. C.

    2015-12-01

    Field data obtained from dataloggers often take the form of comma separated value (CSV) ASCII text files. While ASCII based data formats have positive aspects, such as the ease of accessing the data from disk and the wide variety of tools available for data analysis, there are some drawbacks, especially when viewing the situation through the lens of data interoperability and stewardship. The Unidata data translation tool, Rosetta, is a web-based service that provides an easy, wizard-based interface for data collectors to transform their datalogger generated ASCII output into Climate and Forecast (CF) compliant netCDF files following the CF-1.6 discrete sampling geometries. These files are complete with metadata describing what data are contained in the file, the instruments used to collect the data, and other critical information that otherwise may be lost in one of many README files. The choice of the machine readable netCDF data format and data model, coupled with the CF conventions, ensures long-term preservation and interoperability, and that future users will have enough information to responsibly use the data. However, with the understanding that the observational community appreciates the ease of use of ASCII files, methods for transforming the netCDF back into a CSV or spreadsheet format are also built-in. One benefit of translating ASCII data into a machine readable format that follows open community-driven standards is that they are instantly able to take advantage of data services provided by the many open-source data server tools, such as the THREDDS Data Server (TDS). While Rosetta is currently a stand-alone service, this talk will also highlight efforts to couple Rosetta with the TDS, thus allowing self-publishing of thoroughly documented datasets by the data producers themselves.

  20. Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem.

    Science.gov (United States)

    Jain, Mamta; Kumar, Anil; Choudhary, Rishabh Charan

    2017-06-01

    In this article, we have proposed an improved diagonal queue medical image steganography for patient secret medical data transmission using chaotic standard map, linear feedback shift register, and Rabin cryptosystem, for improvement of previous technique (Jain and Lenka in Springer Brain Inform 3:39-51, 2016). The proposed algorithm comprises four stages, generation of pseudo-random sequences (pseudo-random sequences are generated by linear feedback shift register and standard chaotic map), permutation and XORing using pseudo-random sequences, encryption using Rabin cryptosystem, and steganography using the improved diagonal queues. Security analysis has been carried out. Performance analysis is observed using MSE, PSNR, maximum embedding capacity, as well as by histogram analysis between various Brain disease stego and cover images.

  1. Detection of LSB+/-1 steganography based on co-occurrence matrix and bit plane clipping

    Science.gov (United States)

    Abolghasemi, Mojtaba; Aghaeinia, Hassan; Faez, Karim; Mehrabi, Mohammad Ali

    2010-01-01

    Spatial LSB+/-1 steganography changes smooth characteristics between adjoining pixels of the raw image. We present a novel steganalysis method for LSB+/-1 steganography based on feature vectors derived from the co-occurrence matrix in the spatial domain. We investigate how LSB+/-1 steganography affects the bit planes of an image and show that it changes more least significant bit (LSB) planes of it. The co-occurrence matrix is derived from an image in which some of its most significant bit planes are clipped. By this preprocessing, in addition to reducing the dimensions of the feature vector, the effects of embedding were also preserved. We compute the co-occurrence matrix in different directions and with different dependency and use the elements of the resulting co-occurrence matrix as features. This method is sensitive to the data embedding process. We use a Fisher linear discrimination (FLD) classifier and test our algorithm on different databases and embedding rates. We compare our scheme with the current LSB+/-1 steganalysis methods. It is shown that the proposed scheme outperforms the state-of-the-art methods in detecting the LSB+/-1 steganographic method for grayscale images.

  2. Quantum color image watermarking based on Arnold transformation and LSB steganography

    Science.gov (United States)

    Zhou, Ri-Gui; Hu, Wenwen; Fan, Ping; Luo, Gaofeng

    In this paper, a quantum color image watermarking scheme is proposed through twice-scrambling of Arnold transformations and steganography of least significant bit (LSB). Both carrier image and watermark images are represented by the novel quantum representation of color digital images model (NCQI). The image sizes for carrier and watermark are assumed to be 2n×2n and 2n‑1×2n‑1, respectively. At first, the watermark is scrambled into a disordered form through image preprocessing technique of exchanging the image pixel position and altering the color information based on Arnold transforms, simultaneously. Then, the scrambled watermark with 2n‑1×2n‑1 image size and 24-qubit grayscale is further expanded to an image with size 2n×2n and 6-qubit grayscale using the nearest-neighbor interpolation method. Finally, the scrambled and expanded watermark is embedded into the carrier by steganography of LSB scheme, and a key image with 2n×2n size and 3-qubit information is generated at the meantime, which only can use the key image to retrieve the original watermark. The extraction of watermark is the reverse process of embedding, which is achieved by applying a sequence of operations in the reverse order. Simulation-based experimental results involving different carrier and watermark images (i.e. conventional or non-quantum) are simulated based on the classical computer’s MATLAB 2014b software, which illustrates that the present method has a good performance in terms of three items: visual quality, robustness and steganography capacity.

  3. A secure approach for encrypting and compressing biometric information employing orthogonal code and steganography

    Science.gov (United States)

    Islam, Muhammad F.; Islam, Mohammed N.

    2012-04-01

    The objective of this paper is to develop a novel approach for encryption and compression of biometric information utilizing orthogonal coding and steganography techniques. Multiple biometric signatures are encrypted individually using orthogonal codes and then multiplexed together to form a single image, which is then embedded in a cover image using the proposed steganography technique. The proposed technique employs three least significant bits for this purpose and a secret key is developed to choose one from among these bits to be replaced by the corresponding bit of the biometric image. The proposed technique offers secure transmission of multiple biometric signatures in an identification document which will be protected from unauthorized steganalysis attempt.

  4. Secured Data Transmission Using Wavelet Based Steganography and cryptography

    OpenAIRE

    K.Ravindra Reddy; Ms Shaik Taj Mahaboob

    2014-01-01

    Steganography and cryptographic methods are used together with wavelets to increase the security of the data while transmitting through networks. Another technology, the digital watermarking is the process of embedding information into a digital (image) signal. Before embedding the plain text into the image, the plain text is encrypted by using Data Encryption Standard (DES) algorithm. The encrypted text is embedded into the LL sub band of the wavelet decomposed image using Le...

  5. SEGY to ASCII Conversion and Plotting Program 2.0

    Science.gov (United States)

    Goldman, Mark R.

    2005-01-01

    INTRODUCTION SEGY has long been a standard format for storing seismic data and header information. Almost every seismic processing package can read and write seismic data in SEGY format. In the data processing world, however, ASCII format is the 'universal' standard format. Very few general-purpose plotting or computation programs will accept data in SEGY format. The software presented in this report, referred to as SEGY to ASCII (SAC), converts seismic data written in SEGY format (Barry et al., 1975) to an ASCII data file, and then creates a postscript file of the seismic data using a general plotting package (GMT, Wessel and Smith, 1995). The resulting postscript file may be plotted by any standard postscript plotting program. There are two versions of SAC: one version for plotting a SEGY file that contains a single gather, such as a stacked CDP or migrated section, and a second version for plotting multiple gathers from a SEGY file containing more than one gather, such as a collection of shot gathers. Note that if a SEGY file has multiple gathers, then each gather must have the same number of traces per gather, and each trace must have the same sample interval and number of samples per trace. SAC will read several common standards of SEGY data, including SEGY files with sample values written in either IBM or IEEE floating-point format. In addition, utility programs are present to convert non-standard Seismic Unix (.sux) SEGY files and PASSCAL (.rsy) SEGY files to standard SEGY files. SAC allows complete user control over all plotting parameters including label size and font, tick mark intervals, trace scaling, and the inclusion of a title and descriptive text. SAC shell scripts create a postscript image of the seismic data in vector rather than bitmap format, using GMT's pswiggle command. Although this can produce a very large postscript file, the image quality is generally superior to that of a bitmap image, and commercial programs such as Adobe Illustrator

  6. Transliterating non-ASCII characters with Python

    Directory of Open Access Journals (Sweden)

    Seth Bernstein

    2013-10-01

    Full Text Available This lesson shows how to use Python to transliterate automatically a list of words from a language with a non-Latin alphabet to a standardized format using the American Standard Code for Information Interchange (ASCII characters. It builds on readers’ understanding of Python from the lessons “Viewing HTML Files,” “Working with Web Pages,” “From HTML to List of Words (part 1” and “Intro to Beautiful Soup.” At the end of the lesson, we will use the transliteration dictionary to convert the names from a database of the Russian organization Memorial from Cyrillic into Latin characters. Although the example uses Cyrillic characters, the technique can be reproduced with other alphabets using Unicode.

  7. A novel quantum LSB-based steganography method using the Gray code for colored quantum images

    Science.gov (United States)

    Heidari, Shahrokh; Farzadnia, Ehsan

    2017-10-01

    As one of the prevalent data-hiding techniques, steganography is defined as the act of concealing secret information in a cover multimedia encompassing text, image, video and audio, imperceptibly, in order to perform interaction between the sender and the receiver in which nobody except the receiver can figure out the secret data. In this approach a quantum LSB-based steganography method utilizing the Gray code for quantum RGB images is investigated. This method uses the Gray code to accommodate two secret qubits in 3 LSBs of each pixel simultaneously according to reference tables. Experimental consequences which are analyzed in MATLAB environment, exhibit that the present schema shows good performance and also it is more secure and applicable than the previous one currently found in the literature.

  8. LSB steganography with improved embedding efficiency and undetectability

    OpenAIRE

    Khalind, Omed; Aziz, Benjamin Yowell Yousif

    2015-01-01

    In this paper, we propose a new method of non-adapt ive LSB steganography in still images to improve the embedding efficiency from 2 to 8/3 rand om bits per one embedding change even for the embedding rate of 1 bit per pixel. The method t akes 2-bits of the secret message at a time and compares them to the LSBs of the two chosen pix el values for embedding, it always assumes a single mismatch between the two and uses the seco nd LSB o...

  9. New Encrypted Steganography Approach

    Directory of Open Access Journals (Sweden)

    Saba Mohammed Husain‎

    2017-12-01

    Full Text Available The proposed research Provides an approach for hiding an encrypted text in side a digital image. Where the text is encrypted in a complex manner used method of PlayFair to encrypt clear text and to increase security put lettering ciphertext on the geometric shape clockwise and then we write the ciphertext output in the form of lines, taken new ciphertext and converted to Ascii code and then to binary and hidden text in bits least importance in the picture. The results were good by PNSR scale

  10. Embedded FPGA Design for Optimal Pixel Adjustment Process of Image Steganography

    Directory of Open Access Journals (Sweden)

    Chiung-Wei Huang

    2018-01-01

    Full Text Available We propose a prototype of field programmable gate array (FPGA implementation for optimal pixel adjustment process (OPAP algorithm of image steganography. In the proposed scheme, the cover image and the secret message are transmitted from a personal computer (PC to an FPGA board using RS232 interface for hardware processing. We firstly embed k-bit secret message into each pixel of the cover image by the last-significant-bit (LSB substitution method, followed by executing associated OPAP calculations to construct a stego pixel. After all pixels of the cover image have been embedded, a stego image is created and transmitted from FPGA back to the PC and stored in the PC. Moreover, we have extended the basic pixel-wise structure to a parallel structure which can fully use the hardware devices to speed up the embedding process and embed several bits of secret message at the same time. Through parallel mechanism of the hardware based design, the data hiding process can be completed in few clock cycles to produce steganography outcome. Experimental results show the effectiveness and correctness of the proposed scheme.

  11. CRED 20m Gridded bathymetry of Necker Island, Hawaii, USA (Arc ASCII format)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Gridded bathymetry of the shelf and slope environments of Necker Island, Northwestern Hawaiian Islands, Hawaii, USA. This ASCII includes multibeam bathymetry from...

  12. Single-mismatch 2LSB embedding method of steganography

    OpenAIRE

    Khalind, Omed; Aziz, Benjamin

    2013-01-01

    This paper proposes a new method of 2LSB embedding steganography in still images. The proposed method considers a single mismatch in each 2LSB embedding between the 2LSB of the pixel value and the 2-bits of the secret message, while the 2LSB replacement overwrites the 2LSB of the image’s pixel value with 2-bits of the secret message. The number of bit-changes needed for the proposed method is 0.375 bits from the 2LSBs of the cover image, and is much less than the 2LSB replacement which is 0.5...

  13. CRED 20m Gridded bathymetry of Nihoa Island, Hawaii, USA (Arc ASCII format)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Gridded bathymetry (20m) of the shelf and slope environments of Nihoa Island, Hawaii, USA. The ASCII includes multibeam bathymetry from the Simrad EM120, Simrad...

  14. Steganography based on pixel intensity value decomposition

    Science.gov (United States)

    Abdulla, Alan Anwar; Sellahewa, Harin; Jassim, Sabah A.

    2014-05-01

    This paper focuses on steganography based on pixel intensity value decomposition. A number of existing schemes such as binary, Fibonacci, Prime, Natural, Lucas, and Catalan-Fibonacci (CF) are evaluated in terms of payload capacity and stego quality. A new technique based on a specific representation is proposed to decompose pixel intensity values into 16 (virtual) bit-planes suitable for embedding purposes. The proposed decomposition has a desirable property whereby the sum of all bit-planes does not exceed the maximum pixel intensity value, i.e. 255. Experimental results demonstrate that the proposed technique offers an effective compromise between payload capacity and stego quality of existing embedding techniques based on pixel intensity value decomposition. Its capacity is equal to that of binary and Lucas, while it offers a higher capacity than Fibonacci, Prime, Natural, and CF when the secret bits are embedded in 1st Least Significant Bit (LSB). When the secret bits are embedded in higher bit-planes, i.e., 2nd LSB to 8th Most Significant Bit (MSB), the proposed scheme has more capacity than Natural numbers based embedding. However, from the 6th bit-plane onwards, the proposed scheme offers better stego quality. In general, the proposed decomposition scheme has less effect in terms of quality on pixel value when compared to most existing pixel intensity value decomposition techniques when embedding messages in higher bit-planes.

  15. Transfer of numeric ASCII data files between Apple and IBM personal computers.

    Science.gov (United States)

    Allan, R W; Bermejo, R; Houben, D

    1986-01-01

    Listings for programs designed to transfer numeric ASCII data files between Apple and IBM personal computers are provided with accompanying descriptions of how the software operates. Details of the hardware used are also given. The programs may be easily adapted for transferring data between other microcomputers.

  16. Steganalysis and improvement of a quantum steganography protocol via a GHZ4 state

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian

    2013-01-01

    Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, El Allati et al. proposed a new quantum steganography using the GHZ 4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ 4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ 4 state, we give another 8 groups of unitary transformations that can change the GHZ 4 state into 8 different quantum states. Due to the symmetry of the GHZ 4 state, all the possible 16 groups of unitary transformations change the GHZ 4 state into 8 different quantum states, so the improved protocol achieves a high efficiency

  17. Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery

    Directory of Open Access Journals (Sweden)

    Afany Zeinata Firdaus

    2013-12-01

    Full Text Available In today's era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding the secret message is shorter than the average computation time making phase (extracting the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB . Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.

  18. Bit Plane Coding based Steganography Technique for JPEG2000 Images and Videos

    Directory of Open Access Journals (Sweden)

    Geeta Kasana

    2016-02-01

    Full Text Available In this paper, a Bit Plane Coding (BPC based steganography technique for JPEG2000 images and Motion JPEG2000 video is proposed. Embedding in this technique is performed in the lowest significant bit planes of the wavelet coefficients of a cover image. In JPEG2000 standard, the number of bit planes of wavelet coefficients to be used in encoding is dependent on the compression rate and are used in Tier-2 process of JPEG2000. In the proposed technique, Tier-1 and Tier-2 processes of JPEG2000 and Motion JPEG2000 are executed twice on the encoder side to collect the information about the lowest bit planes of all code blocks of a cover image, which is utilized in embedding and transmitted to the decoder. After embedding secret data, Optimal Pixel Adjustment Process (OPAP is applied on stego images to enhance its visual quality. Experimental results show that proposed technique provides large embedding capacity and better visual quality of stego images than existing steganography techniques for JPEG2000 compressed images and videos. Extracted secret image is similar to the original secret image.

  19. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    International Nuclear Information System (INIS)

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  20. Quantum steganography with a large payload based on dense coding and entanglement swapping of Greenberger—Horne—Zeilinger states

    International Nuclear Information System (INIS)

    Ye Tian-Yu; Jiang Li-Zhen

    2013-01-01

    A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger—Horne—Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable. (general)

  1. RF model of the distribution system as a communication channel, phase 2. Volume 4: Sofware source program and illustrations ASCII database listings

    Science.gov (United States)

    Rustay, R. C.; Gajjar, J. T.; Rankin, R. W.; Wentz, R. C.; Wooding, R.

    1982-01-01

    Listings of source programs and some illustrative examples of various ASCII data base files are presented. The listings are grouped into the following categories: main programs, subroutine programs, illustrative ASCII data base files. Within each category files are listed alphabetically.

  2. A Novel Quantum Video Steganography Protocol with Large Payload Based on MCQI Quantum Video

    Science.gov (United States)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai

    2017-11-01

    As one of important multimedia forms in quantum network, quantum video attracts more and more attention of experts and scholars in the world. A secure quantum video steganography protocol with large payload based on the video strip encoding method called as MCQI (Multi-Channel Quantum Images) is proposed in this paper. The new protocol randomly embeds the secret information with the form of quantum video into quantum carrier video on the basis of unique features of video frames. It exploits to embed quantum video as secret information for covert communication. As a result, its capacity are greatly expanded compared with the previous quantum steganography achievements. Meanwhile, the new protocol also achieves good security and imperceptibility by virtue of the randomization of embedding positions and efficient use of redundant frames. Furthermore, the receiver enables to extract secret information from stego video without retaining the original carrier video, and restore the original quantum video as a follow. The simulation and experiment results prove that the algorithm not only has good imperceptibility, high security, but also has large payload.

  3. Steganalysis of LSB Image Steganography using Multiple Regression and Auto Regressive (AR) Model

    OpenAIRE

    Souvik Bhattacharyya; Gautam Sanyal

    2011-01-01

    The staggering growth in communication technologyand usage of public domain channels (i.e. Internet) has greatly facilitated transfer of data. However, such open communication channelshave greater vulnerability to security threats causing unauthorizedin- formation access. Traditionally, encryption is used to realizethen communication security. However, important information is notprotected once decoded. Steganography is the art and science of communicating in a way which hides the existence o...

  4. Multimodal Authentication - Biometric Password And Steganography

    Directory of Open Access Journals (Sweden)

    Alvin Prasad

    2017-06-01

    Full Text Available Security is a major concern for everyone be it individuals or organizations. As the nature of information systems is becoming distributed securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

  5. Building a Steganography Program Including How to Load, Process, and Save JPEG and PNG Files in Java

    Science.gov (United States)

    Courtney, Mary F.; Stix, Allen

    2006-01-01

    Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…

  6. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    Science.gov (United States)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  7. On Max-Plus Algebra and Its Application on Image Steganography

    Directory of Open Access Journals (Sweden)

    Kiswara Agung Santoso

    2018-01-01

    Full Text Available We propose a new steganography method to hide an image into another image using matrix multiplication operations on max-plus algebra. This is especially interesting because the matrix used in encoding or information disguises generally has an inverse, whereas matrix multiplication operations in max-plus algebra do not have an inverse. The advantages of this method are the size of the image that can be hidden into the cover image, larger than the previous method. The proposed method has been tested on many secret images, and the results are satisfactory which have a high level of strength and a high level of security and can be used in various operating systems.

  8. CRED 20 m Gridded bathymetry of Brooks Banks and St. Rogatien Bank, Hawaii, USA (Arc ASCII format)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Gridded bathymetry (20m) of the shelf and slope environments of Brooks Banks and St. Rogatien, Hawaii, USA. The ASCII includes multibeam bathymetry from the Simrad...

  9. Increasing Security for Cloud Computing By Steganography in Image Edges

    Directory of Open Access Journals (Sweden)

    Hassan Hadi Saleh

    2017-03-01

    Full Text Available The security of data storage in “cloud” is big challenge because the data keep within resources that may be accessed by particular machines. The managing of these data and services may not be high reliable. Therefore, the security of data is highly challenging. To increase the security of data in data center of cloud, we have introduced good method to ensure data security in “cloud computing” by methods of data hiding using color images which is called steganography. The fundamental objective of this paper is to prevent "Data Access” by unauthorized or opponent users. This scheme stores data at data centers within edges of color images and retrieves data from it when it is wanted.

  10. LSB-Based Steganography Using Reflected Gray Code

    Science.gov (United States)

    Chen, Chang-Chu; Chang, Chin-Chen

    Steganography aims to hide secret data into an innocuous cover-medium for transmission and to make the attacker cannot recognize the presence of secret data easily. Even the stego-medium is captured by the eavesdropper, the slight distortion is hard to be detected. The LSB-based data hiding is one of the steganographic methods, used to embed the secret data into the least significant bits of the pixel values in a cover image. In this paper, we propose an LSB-based scheme using reflected-Gray code, which can be applied to determine the embedded bit from secret information. Following the transforming rule, the LSBs of stego-image are not always equal to the secret bits and the experiment shows that the differences are up to almost 50%. According to the mathematical deduction and experimental results, the proposed scheme has the same image quality and payload as the simple LSB substitution scheme. In fact, our proposed data hiding scheme in the case of G1 (one bit Gray code) system is equivalent to the simple LSB substitution scheme.

  11. Quantum steganography with noisy quantum channels

    International Nuclear Information System (INIS)

    Shaw, Bilal A.; Brun, Todd A.

    2011-01-01

    Steganography is the technique of hiding secret information by embedding it in a seemingly ''innocent'' message. We present protocols for hiding quantum information by disguising it as noise in a codeword of a quantum error-correcting code. The sender (Alice) swaps quantum information into the codeword and applies a random choice of unitary operation, drawing on a secret random key she shares with the receiver (Bob). Using the key, Bob can retrieve the information, but an eavesdropper (Eve) with the power to monitor the channel, but without the secret key, cannot distinguish the message from channel noise. We consider two types of protocols: one in which the hidden quantum information is stored locally in the codeword, and another in which it is embedded in the space of error syndromes. We analyze how difficult it is for Eve to detect the presence of secret messages, and estimate rates of steganographic communication and secret key consumption for specific protocols and examples of error channels. We consider both the case where there is no actual noise in the channel (so that all errors in the codeword result from the deliberate actions of Alice), and the case where the channel is noisy and not controlled by Alice and Bob.

  12. CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Cemal Kocak

    2017-03-01

    Full Text Available Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting of maximum 16 digits determined by the user in cryptography method. Similarly, the encrypted information is processed, during the embedding stage, using a 16 digit pin (I-PIN which is determined again by the user. The carrier images utilized in the study have been determined as 24 bit/pixel colour. Utilization of images in .jpeg, .tiff, .pnp format has also been provided. The performance of the CLSM method has been evaluated according to the objective quality measurement criteria of PSNR-dB (Peak Signal-to-Noise Ratio and SSIM (Structural Similarity Index. In the study, 12 different sized information between 1000 and 609,129 bits were embedded into images. Between 34.14 and 65.8 dB PSNR values and between 0.989 and 0.999 SSIM values were obtained. CLSM showed better results compared to Pixel Value Differencing (PVD method, Simulated Annealing (SA Algorithm and Mix column transform based on irreducible polynomial mathematics methods.

  13. A Novel Quantum Image Steganography Scheme Based on LSB

    Science.gov (United States)

    Zhou, Ri-Gui; Luo, Jia; Liu, XingAo; Zhu, Changming; Wei, Lai; Zhang, Xiafen

    2018-06-01

    Based on the NEQR representation of quantum images and least significant bit (LSB) scheme, a novel quantum image steganography scheme is proposed. The sizes of the cover image and the original information image are assumed to be 4 n × 4 n and n × n, respectively. Firstly, the bit-plane scrambling method is used to scramble the original information image. Then the scrambled information image is expanded to the same size of the cover image by using the key only known to the operator. The expanded image is scrambled to be a meaningless image with the Arnold scrambling. The embedding procedure and extracting procedure are carried out by K 1 and K 2 which are under control of the operator. For validation of the presented scheme, the peak-signal-to-noise ratio (PSNR), the capacity, the security of the images and the circuit complexity are analyzed.

  14. SCOPES: steganography with compression using permutation search

    Science.gov (United States)

    Boorboor, Sahar; Zolfaghari, Behrouz; Mozafari, Saadat Pour

    2011-10-01

    LSB (Least Significant Bit) is a widely used method for image steganography, which hides the secret message as a bit stream in LSBs of pixel bytes in the cover image. This paper proposes a variant of LSB named SCOPES that encodes and compresses the secret message while being hidden through storing addresses instead of message bytes. Reducing the length of the stored message improves the storage capacity and makes the stego image visually less suspicious to the third party. The main idea behind the SCOPES approach is dividing the message into 3-character segments, seeking each segment in the cover image and storing the address of the position containing the segment instead of the segment itself. In this approach, every permutation of the 3 bytes (if found) can be stored along with some extra bits indicating the permutation. In some rare cases the segment may not be found in the image and this can cause the message to be expanded by some overhead bits2 instead of being compressed. But experimental results show that SCOPES performs overlay better than traditional LSB even in the worst cases.

  15. A Learning-Based Steganalytic Method against LSB Matching Steganography

    Directory of Open Access Journals (Sweden)

    Z. Xia

    2011-04-01

    Full Text Available This paper considers the detection of spatial domain least significant bit (LSB matching steganography in gray images. Natural images hold some inherent properties, such as histogram, dependence between neighboring pixels, and dependence among pixels that are not adjacent to each other. These properties are likely to be disturbed by LSB matching. Firstly, histogram will become smoother after LSB matching. Secondly, the two kinds of dependence will be weakened by the message embedding. Accordingly, three features, which are respectively based on image histogram, neighborhood degree histogram and run-length histogram, are extracted at first. Then, support vector machine is utilized to learn and discriminate the difference of features between cover and stego images. Experimental results prove that the proposed method possesses reliable detection ability and outperforms the two previous state-of-the-art methods. Further more, the conclusions are drawn by analyzing the individual performance of three features and their fused feature.

  16. PHYSICAL MODELLING OF TERRAIN DIRECTLY FROM SURFER GRID AND ARC/INFO ASCII DATA FORMATS#

    Directory of Open Access Journals (Sweden)

    Y.K. Modi

    2012-01-01

    Full Text Available

    ENGLISH ABSTRACT: Additive manufacturing technology is used to make physical models of terrain using GIS surface data. Attempts have been made to understand several other GIS file formats, such as the Surfer grid and the ARC/INFO ASCII grid. The surface of the terrain in these file formats has been converted into an STL file format that is suitable for additive manufacturing. The STL surface is converted into a 3D model by making the walls and the base. In this paper, the terrain modelling work has been extended to several other widely-used GIS file formats. Terrain models can be created in less time and at less cost, and intricate geometries of terrain can be created with ease and great accuracy.

    AFRIKAANSE OPSOMMING: Laagvervaardigingstegnologie word gebruik om fisiese modelle van terreine vanaf GIS oppervlakdata te maak. Daar is gepoog om verskeie ander GIS lêerformate, soos die Surfer rooster en die ARC/INFO ASCII rooster, te verstaan. Die oppervlak van die terrein in hierdie lêerformate is omgeskakel in 'n STL lêerformaat wat geskik is vir laagvervaardiging. Verder is die STL oppervlak omgeskakel in 'n 3D model deur die kante en die basis te modelleer. In hierdie artikel is die terreinmodelleringswerk uitgebrei na verskeie ander algemeen gebruikte GIS lêerformate. Terreinmodelle kan so geskep word in korter tyd en teen laer koste, terwyl komplekse geometrieë van terreine met gemak en groot akkuraatheid geskep kan word.

  17. Klasifikasi Bit-Plane Noise untuk Penyisipan Pesan pada Teknik Steganography BPCS Menggunakan Fuzzy Inference Sistem Mamdani

    Directory of Open Access Journals (Sweden)

    Rahmad Hidayat

    2015-04-01

    Full Text Available Bit-Plane Complexity Segmentation (BPCS is a fairly new steganography technique. The most important process in BPCS is the calculation of complexity value of a bit-plane. The bit-plane complexity is calculated by looking at the amount of bit changes contained in a bit-plane. If a bit-plane has a high complexity, the bi-plane is categorized as a noise bit-plane that does not contain valuable information on the image. Classification of the bit-plane using the set cripst set (noise/not is not fair, where a little difference of the value will significantly change the status of the bit-plane. The purpose of this study is to apply the principles of fuzzy sets to classify the bit-plane into three sets that are informative, partly informative, and the noise region. Classification of the bit-plane into a fuzzy set is expected to classify the bit-plane in a more objective approach and ultimately message capacity of the images can be improved by using the Mamdani fuzzy inference to take decisions which bit-plane will be replaced with a message based on the classification of bit-plane and the size of the message that will be inserted. This research is able to increase the capability of BPCS steganography techniques to insert a message in bit-pane with more precise so that the container image quality would be better. It can be seen that the PSNR value of original image and stego-image is only slightly different.

  18. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography

    Science.gov (United States)

    Pevný, Tomáš; Filler, Tomáš; Bas, Patrick

    This paper presents a complete methodology for designing practical and highly-undetectable stegosystems for real digital media. The main design principle is to minimize a suitably-defined distortion by means of efficient coding algorithm. The distortion is defined as a weighted difference of extended state-of-the-art feature vectors already used in steganalysis. This allows us to "preserve" the model used by steganalyst and thus be undetectable even for large payloads. This framework can be efficiently implemented even when the dimensionality of the feature set used by the embedder is larger than 107. The high dimensional model is necessary to avoid known security weaknesses. Although high-dimensional models might be problem in steganalysis, we explain, why they are acceptable in steganography. As an example, we introduce HUGO, a new embedding algorithm for spatial-domain digital images and we contrast its performance with LSB matching. On the BOWS2 image database and in contrast with LSB matching, HUGO allows the embedder to hide 7× longer message with the same level of security level.

  19. Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer

    Directory of Open Access Journals (Sweden)

    Michael J. Pelosi

    2018-04-01

    Full Text Available In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image pixel; bpp. Payload image file format outputs from the software include PNG, BMP, JP2, JXR, J2K, TIFF, and WEBP. A variety of file output formats is empirically important as most steganalysis programs will only accept PNG, BMP, and possibly JPG, as the file inputs. In this extended reprint, we introduce additional application and discussion regarding cold storage of crypto-currency account and password information, as well as applications for secure transfer in hostile or insecure network circumstances.

  20. A Text Steganographic System Based on Word Length Entropy Rate

    Directory of Open Access Journals (Sweden)

    Francis Xavier Kofi Akotoye

    2017-10-01

    Full Text Available The widespread adoption of electronic distribution of material is accompanied by illicit copying and distribution. This is why individuals, businesses and governments have come to think of how to protect their work, prevent such illicit activities and trace the distribution of a document. It is in this context that a lot of attention is being focused on steganography. Implementing steganography in text document is not an easy undertaking considering the fact that text document has very few places in which to embed hidden data. Any minute change introduced to text objects can easily be noticed thus attracting attention from possible hackers. This study investigates the possibility of embedding data in text document by employing the entropy rate of the constituent characters of words not less than four characters long. The scheme was used to embed bits in text according to the alphabetic structure of the words, the respective characters were compared with their neighbouring characters and if the first character was alphabetically lower than the succeeding character according to their ASCII codes, a zero bit was embedded otherwise 1 was embedded after the characters had been transposed. Before embedding, the secret message was encrypted with a secret key to add a layer of security to the secret message to be embedded, and then a pseudorandom number was generated from the word counts of the text which was used to paint the starting point of the embedding process. The embedding capacity of the scheme was relatively high compared with the space encoding and semantic method.

  1. A high capacity text steganography scheme based on LZW compression and color coding

    Directory of Open Access Journals (Sweden)

    Aruna Malik

    2017-02-01

    Full Text Available In this paper, capacity and security issues of text steganography have been considered by employing LZW compression technique and color coding based approach. The proposed technique uses the forward mail platform to hide the secret data. This algorithm first compresses secret data and then hides the compressed secret data into the email addresses and also in the cover message of the email. The secret data bits are embedded in the message (or cover text by making it colored using a color coding table. Experimental results show that the proposed method not only produces a high embedding capacity but also reduces computational complexity. Moreover, the security of the proposed method is significantly improved by employing stego keys. The superiority of the proposed method has been experimentally verified by comparing with recently developed existing techniques.

  2. Steganalysis Techniques for Documents and Images

    Science.gov (United States)

    2005-05-01

    steganography . We then illustrated the efficacy of our model using variations of LSB steganography . For binary images , we have made significant progress in...efforts have focused on two areas. The first area is LSB steganalysis for grayscale images . Here, as we had proposed (as a challenging task), we have...generalized our previous steganalysis technique of sample pair analysis to a theoretical framework for the detection of the LSB steganography . The new

  3. Minimizing embedding impact in steganography using trellis-coded quantization

    Science.gov (United States)

    Filler, Tomáš; Judas, Jan; Fridrich, Jessica

    2010-01-01

    In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance with bounds derived from appropriate rate-distortion bounds. We assume that each cover element can be assigned a positive scalar expressing the impact of making an embedding change at that element (single-letter distortion). The problem is to embed a given payload with minimal possible average embedding impact. This task, which can be viewed as a generalization of matrix embedding or writing on wet paper, has been approached using heuristic and suboptimal tools in the past. Here, we propose a fast and very versatile solution to this problem that can theoretically achieve performance arbitrarily close to the bound. It is based on syndrome coding using linear convolutional codes with the optimal binary quantizer implemented using the Viterbi algorithm run in the dual domain. The complexity and memory requirements of the embedding algorithm are linear w.r.t. the number of cover elements. For practitioners, we include detailed algorithms for finding good codes and their implementation. Finally, we report extensive experimental results for a large set of relative payloads and for different distortion profiles, including the wet paper channel.

  4. Image Steganography of Multiple File Types with Encryption and Compression Algorithms

    Directory of Open Access Journals (Sweden)

    Ernest Andreigh C. Centina

    2017-05-01

    Full Text Available The goals of this study were to develop a system intended for securing files through the technique of image steganography integrated with cryptography by utilizing ZLIB Algorithm for compressing and decompressing secret files, DES Algorithm for encryption and decryption, and Least Significant Bit Algorithm for file embedding and extraction to avoid compromise on highly confidential files from exploits of unauthorized persons. Ensuing to this, the system is in acc ordance with ISO 9126 international quality standards. Every quality criteria of the system was evaluated by 10 Information Technology professionals, and the arithmetic Mean and Standard Deviation of the survey were computed. The result exhibits that m ost of them strongly agreed that the system is excellently effective based on Functionality, Reliability, Usability, Efficiency, Maintainability and Portability conformance to ISO 9126 standards. The system was found to be a useful tool for both governmen t agencies and private institutions for it could keep not only the message secret but also the existence of that particular message or file et maintaining the privacy of highly confidential and sensitive files from unauthorized access.

  5. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  6. Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication

    Directory of Open Access Journals (Sweden)

    Jung-oh Park

    2015-01-01

    Full Text Available Recently, as the utilization of CCTV (closed circuit television is emerging as an issue, the studies on CCTV are receiving much attention. Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure, SN (serial number, and R value (random number attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. This paper should be appropriate for utilization of user infringement-related CCTV where user information protection-related technology is not applied for CCTV in the future.

  7. An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution

    Science.gov (United States)

    Chadha, Ankit; Satam, Neha; Sood, Rakshak; Bade, Dattatray

    2013-09-01

    In order to improve the data hiding in all types of multimedia data formats such as image and audio and to make hidden message imperceptible, a novel method for steganography is introduced in this paper. It is based on Least Significant Bit (LSB) manipulation and inclusion of redundant noise as secret key in the message. This method is applied to data hiding in images. For data hiding in audio, Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) both are used. All the results displayed prove to be time-efficient and effective. Also the algorithm is tested for various numbers of bits. For those values of bits, Mean Square Error (MSE) and Peak-Signal-to-Noise-Ratio (PSNR) are calculated and plotted. Experimental results show that the stego-image is visually indistinguishable from the original cover-image when nsteganography process does not reveal presence of any hidden message, thus qualifying the criteria of imperceptible message.

  8. A Novel Image Steganography Technique for Secured Online Transaction Using DWT and Visual Cryptography

    Science.gov (United States)

    Anitha Devi, M. D.; ShivaKumar, K. B.

    2017-08-01

    Online payment eco system is the main target especially for cyber frauds. Therefore end to end encryption is very much needed in order to maintain the integrity of secret information related to transactions carried online. With access to payment related sensitive information, which enables lot of money transactions every day, the payment infrastructure is a major target for hackers. The proposed system highlights, an ideal approach for secure online transaction for fund transfer with a unique combination of visual cryptography and Haar based discrete wavelet transform steganography technique. This combination of data hiding technique reduces the amount of information shared between consumer and online merchant needed for successful online transaction along with providing enhanced security to customer’s account details and thereby increasing customer’s confidence preventing “Identity theft” and “Phishing”. To evaluate the effectiveness of proposed algorithm Root mean square error, Peak signal to noise ratio have been used as evaluation parameters

  9. The Impact of Hard Disk Firmware Steganography on Computer Forensics

    Directory of Open Access Journals (Sweden)

    Iain Sutherland

    2009-06-01

    Full Text Available The hard disk drive is probably the predominant form of storage media and is a primary data source in a forensic investigation. The majority of available software tools and literature relating to the investigation of the structure and content contained within a hard disk drive concerns the extraction and analysis of evidence from the various file systems which can reside in the user accessible area of the disk. It is known that there are other areas of the hard disk drive which could be used to conceal information, such as the Host Protected Area and the Device Configuration Overlay. There are recommended methods for the detection and forensic analysis of these areas using appropriate tools and techniques. However, there are additional areas of a disk that have currently been overlooked.  The Service Area or Platter Resident Firmware Area is used to store code and control structures responsible for the functionality of the drive and for logging failing or failed sectors.This paper provides an introduction into initial research into the investigation and identification of issues relating to the analysis of the Platter Resident Firmware Area. In particular, the possibility that the Platter Resident Firmware Area could be manipulated and exploited to facilitate a form of steganography, enabling information to be concealed by a user and potentially from a digital forensic investigator.

  10. A review on "A Novel Technique for Image Steganography Based on Block-DCT and Huffman Encoding"

    Science.gov (United States)

    Das, Rig; Tuithung, Themrichon

    2013-03-01

    This paper reviews the embedding and extraction algorithm proposed by "A. Nag, S. Biswas, D. Sarkar and P. P. Sarkar" on "A Novel Technique for Image Steganography based on Block-DCT and Huffman Encoding" in "International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010" [3] and shows that the Extraction of Secret Image is Not Possible for the algorithm proposed in [3]. 8 bit Cover Image of size is divided into non joint blocks and a two dimensional Discrete Cosine Transformation (2-D DCT) is performed on each of the blocks. Huffman Encoding is performed on an 8 bit Secret Image of size and each bit of the Huffman Encoded Bit Stream is embedded in the frequency domain by altering the LSB of the DCT coefficients of Cover Image blocks. The Huffman Encoded Bit Stream and Huffman Table

  11. Audre's daughter: Black lesbian steganography in Dee Rees' Pariah and Audre Lorde's Zami: A New Spelling of My Name.

    Science.gov (United States)

    Kang, Nancy

    2016-01-01

    This article argues that African-American director Dee Rees' critically acclaimed debut Pariah (2011) is a rewriting of lesbian poet-activist Audre Lorde's iconic "bio-mythography" Zami: A New Spelling of My Name (1982). The article examines how Rees' work creatively and subtly re-envisions Lorde's Zami by way of deeply rooted and often cleverly camouflaged patterns, resonances, and contrasts. Shared topics include naming, mother-daughter bonds, the role of clothing in identity formation, domestic abuse, queer time, and lesbian, gay, bisexual, and transgender legacy discourse construction. What emerges between the visual and written texts is a hidden language of connection--what may be termed Black lesbian steganography--which proves thought-provoking to viewers and readers alike.

  12. A novel fuzzy logic-based image steganography method to ensure medical data security.

    Science.gov (United States)

    Karakış, R; Güler, I; Çapraz, I; Bilir, E

    2015-12-01

    This study aims to secure medical data by combining them into one file format using steganographic methods. The electroencephalogram (EEG) is selected as hidden data, and magnetic resonance (MR) images are also used as the cover image. In addition to the EEG, the message is composed of the doctor׳s comments and patient information in the file header of images. Two new image steganography methods that are based on fuzzy-logic and similarity are proposed to select the non-sequential least significant bits (LSB) of image pixels. The similarity values of the gray levels in the pixels are used to hide the message. The message is secured to prevent attacks by using lossless compression and symmetric encryption algorithms. The performance of stego image quality is measured by mean square of error (MSE), peak signal-to-noise ratio (PSNR), structural similarity measure (SSIM), universal quality index (UQI), and correlation coefficient (R). According to the obtained result, the proposed method ensures the confidentiality of the patient information, and increases data repository and transmission capacity of both MR images and EEG signals. Copyright © 2015 Elsevier Ltd. All rights reserved.

  13. Rate-distortion analysis of steganography for conveying stereovision disparity maps

    Science.gov (United States)

    Umeda, Toshiyuki; Batolomeu, Ana B. D. T.; Francob, Filipe A. L.; Delannay, Damien; Macq, Benoit M. M.

    2004-06-01

    3-D images transmission in a way which is compliant with traditional 2-D representations can be done through the embedding of disparity maps within the 2-D signal. This approach enables the transmission of stereoscopic video sequences or images on traditional analogue TV channels (PAL or NTSC) or printed photographic images. The aim of this work is to study the achievable performances of such a technique. The embedding of disparity maps has to be seen as a global rate-distortion problem. The embedding capacity through steganography is determined by the transmission channel noise and by the bearable distortion on the watermarked image. The distortion of the 3-D image displayed as two stereo views depends on the rate allocated to the complementary information required to build those two views from one reference 2-D image. Results from the works on the scalar Costa scheme are used to optimize the embedding of the disparity map compressed bit stream into the reference image. A method for computing the optimal trade off between the disparity map distortion and embedding distortion as a function of the channel impairments is proposed. The goal is to get a similar distortion on the left (the reference image) and the right (the disparity compensated image) images. We show that in typical situations the embedding of 2 bits/pixels in the left image, while the disparity map is compressed at 1 bit per pixel leads to a good trade-off. The disparity map is encoded with a strong error correcting code, including synchronisation bits.

  14. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  15. Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods

    Science.gov (United States)

    Rojali, Salman, Afan Galih; George

    2017-08-01

    Along with the development of information technology in meeting the needs, various adverse actions and difficult to avoid are emerging. One of such action is data theft. Therefore, this study will discuss about cryptography and steganography that aims to overcome these problems. This study will use the Modification Vigenere Cipher, Least Significant Bit and Dictionary Based Compression methods. To determine the performance of study, Peak Signal to Noise Ratio (PSNR) method is used to measure objectively and Mean Opinion Score (MOS) method is used to measure subjectively, also, the performance of this study will be compared to other method such as Spread Spectrum and Pixel Value differencing. After comparing, it can be concluded that this study can provide better performance when compared to other methods (Spread Spectrum and Pixel Value Differencing) and has a range of MSE values (0.0191622-0.05275) and PSNR (60.909 to 65.306) with a hidden file size of 18 kb and has a MOS value range (4.214 to 4.722) or image quality that is approaching very good.

  16. Perbandingan Kapasitas Pesan pada Steganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement

    Directory of Open Access Journals (Sweden)

    Dian Hafidh Zulfikar

    2016-01-01

        Based on test results that have to be got several conclusions that capacity steganographic message on DCT sequential greater than the DCT F5 steganography either before or after application of the application POIE, stego image quality on DCT steganography F5 better than the sequential DCT steganography well before the application POIE and after application of POIE, both F5 and steganography steganography DCT DCT sequential equally resistant to manipulation of stego image.

  17. Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks

    Directory of Open Access Journals (Sweden)

    Donghui Hu

    2017-01-01

    Full Text Available Digital image steganalysis is the art of detecting the presence of information hiding in carrier images. When detecting recently developed adaptive image steganography methods, state-of-art steganalysis methods cannot achieve satisfactory detection accuracy, because the adaptive steganography methods can adaptively embed information into regions with rich textures via the guidance of distortion function and thus make the effective steganalysis features hard to be extracted. Inspired by the promising success which convolutional neural network (CNN has achieved in the fields of digital image analysis, increasing researchers are devoted to designing CNN based steganalysis methods. But as for detecting adaptive steganography methods, the results achieved by CNN based methods are still far from expected. In this paper, we propose a hybrid approach by designing a region selection method and a new CNN framework. In order to make the CNN focus on the regions with complex textures, we design a region selection method by finding a region with the maximal sum of the embedding probabilities. To evolve more diverse and effective steganalysis features, we design a new CNN framework consisting of three separate subnets with independent structure and configuration parameters and then merge and split the three subnets repeatedly. Experimental results indicate that our approach can lead to performance improvement in detecting adaptive steganography.

  18. Effect of using different cover image quality to obtain robust selective embedding in steganography

    Science.gov (United States)

    Abdullah, Karwan Asaad; Al-Jawad, Naseer; Abdulla, Alan Anwer

    2014-05-01

    One of the common types of steganography is to conceal an image as a secret message in another image which normally called a cover image; the resulting image is called a stego image. The aim of this paper is to investigate the effect of using different cover image quality, and also analyse the use of different bit-plane in term of robustness against well-known active attacks such as gamma, statistical filters, and linear spatial filters. The secret messages are embedded in higher bit-plane, i.e. in other than Least Significant Bit (LSB), in order to resist active attacks. The embedding process is performed in three major steps: First, the embedding algorithm is selectively identifying useful areas (blocks) for embedding based on its lighting condition. Second, is to nominate the most useful blocks for embedding based on their entropy and average. Third, is to select the right bit-plane for embedding. This kind of block selection made the embedding process scatters the secret message(s) randomly around the cover image. Different tests have been performed for selecting a proper block size and this is related to the nature of the used cover image. Our proposed method suggests a suitable embedding bit-plane as well as the right blocks for the embedding. Experimental results demonstrate that different image quality used for the cover images will have an effect when the stego image is attacked by different active attacks. Although the secret messages are embedded in higher bit-plane, but they cannot be recognised visually within the stegos image.

  19. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... anonymous steganography, { A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), { A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  20. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... defining anonymous steganography, - A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), - A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  1. Generation new MP3 data set after compression

    Science.gov (United States)

    Atoum, Mohammed Salem; Almahameed, Mohammad

    2016-02-01

    The success of audio steganography techniques is to ensure imperceptibility of the embedded secret message in stego file and withstand any form of intentional or un-intentional degradation of secret message (robustness). Crucial to that using digital audio file such as MP3 file, which comes in different compression rate, however research studies have shown that performing steganography in MP3 format after compression is the most suitable one. Unfortunately until now the researchers can not test and implement their algorithm because no standard data set in MP3 file after compression is generated. So this paper focuses to generate standard data set with different compression ratio and different Genre to help researchers to implement their algorithms.

  2. Better Steganalysis (BEST) - Reduction of Interfering Influence of Image Content on Steganalysis

    Science.gov (United States)

    2009-10-08

    LSB embedding, let us consider greyscale images with pixel values in the range 0. . . 255 as carrier medium. LSB steganography replaces the least...Detecting LSB steganography in color and grayscale images . IEEE Multimedia, 8(4):22–28, 2001. [9] Jessica Fridrich, Miroslav Goljan, and Dorin Hogea...January, 19–22 2004. [13] Andrew D. Ker. Improved detection of LSB steganography in grayscale images . In Jessica Fridrich, editor, Information Hiding

  3. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach

    Directory of Open Access Journals (Sweden)

    A.A. Mohamed

    2014-07-01

    Full Text Available Steganography means how to hide secret information in a cover media, so that other individuals fail to realize their existence. Due to the lack of data redundancy in the text file in comparison with other carrier files, text steganography is a difficult problem to solve. In this paper, we proposed a new promised steganographic algorithm for Arabic text based on features of Arabic text. The focus is on more secure algorithm and high capacity of the carrier. Our extensive experiments using the proposed algorithm resulted in a high capacity of the carrier media. The embedding capacity rate ratio of the proposed algorithm is high. In addition, our algorithm can resist traditional attacking methods since it makes the changes in carrier text as minimum as possible.

  4. Forensic Analysis of Digital Image Tampering

    Science.gov (United States)

    2004-12-01

    analysis of when each method fails, which Chapter 4 discusses. Finally, a test image containing an invisible watermark using LSB steganography is...2.2 – Example of invisible watermark using Steganography Software F5 ............. 8 Figure 2.3 – Example of copy-move image forgery [12...used to embed the hidden watermark is Steganography Software F5 version 11+ discussed in Section 2.2. Original JPEG Image – 580 x 435 – 17.4

  5. Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

    OpenAIRE

    Kamaldeep Joshi; Rajkumar Yadav; Sachin Allwadhi

    2016-01-01

    Image steganography is the best aspect of information hiding. In this, the information is hidden within an image and the image travels openly on the Internet. The Least Significant Bit (LSB) is one of the most popular methods of image steganography. In this method, the information bit is hidden at the LSB of the image pixel. In one bit LSB steganography method, the total numbers of the pixels and the total number of message bits are equal to each other. In this paper, the LSB method of image ...

  6. Log ASCII Standard (LAS) Files for Geophysical Wireline Well Logs and Their Application to Geologic Cross Sections Through the Central Appalachian Basin

    Science.gov (United States)

    Crangle, Robert D.

    2007-01-01

    Introduction The U.S. Geological Survey (USGS) uses geophysical wireline well logs for a variety of purposes, including stratigraphic correlation (Hettinger, 2001, Ryder, 2002), petroleum reservoir analyses (Nelson and Bird, 2005), aquifer studies (Balch, 1988), and synthetic seismic profiles (Kulander and Ryder, 2005). Commonly, well logs are easier to visualize, manipulate, and interpret when available in a digital format. In recent geologic cross sections E-E' and D-D', constructed through the central Appalachian basin (Ryder, Swezey, and others, in press; Ryder, Crangle, and others, in press), gamma ray well log traces and lithologic logs were used to correlate key stratigraphic intervals (Fig. 1). The stratigraphy and structure of the cross sections are illustrated through the use of graphical software applications (e.g., Adobe Illustrator). The gamma ray traces were digitized in Neuralog (proprietary software) from paper well logs and converted to a Log ASCII Standard (LAS) format. Once converted, the LAS files were transformed to images through an LAS-reader application (e.g., GeoGraphix Prizm) and then overlain in positions adjacent to well locations, used for stratigraphic control, on each cross section. This report summarizes the procedures used to convert paper logs to a digital LAS format using a third-party software application, Neuralog. Included in this report are LAS files for sixteen wells used in geologic cross section E-E' (Table 1) and thirteen wells used in geologic cross section D-D' (Table 2).

  7. Photonic layer security in fiber-optic networks and optical OFDM transmission

    Science.gov (United States)

    Wang, Zhenxing

    Currently the Internet is experiencing an explosive growth in the world. Such growth leads to an increased data transmission rate demand in fiber-optical networks. Optical orthogonal frequency multiplexing (OFDM) is considered as a promising solution to achieve data rate beyond 100Gb/s per wavelength channel. In the meanwhile, because of extensive data transmission and sharing, data security has become an important problem and receives considerable attention in current research literature. This thesis focuses on data security issues at the physical layer of optical networks involving code-division multiple access (CDMA) systems and steganography methods. The thesis also covers several implementation issues in optical OFDM transmission. Optical CDMA is regarded as a good candidate to provide photonic layer security in multi-access channels. In this thesis we provide a systematic analysis of the security performance of incoherent optical CDMA codes. Based on the analysis, we proposed and experimentally demonstrated several methods to improve the security performance of the optical CDMA systems, such as applying all-optical encryption, and code hopping using nonlinear wavelength conversion. Moreover, we demonstrate that the use of wireless CDMA codes in optical systems can enhance the security in one single-user end-to-end optical channel. Optical steganography is another method to provide photonic data security and involves hiding the existence of data transmissions. In the thesis, we demonstrate that an optical steganography channel can exist in phase modulated public channels as well as traditional on-off-keying (OOK) modulated channels, without data synchronization. We also demonstrate an optical steganography system with enhanced security by utilizing temporal phase modulation techniques. Additionally, as one type of an overlay channel, the optical steganography technology can carry the sensor data collected by wireless sensor network on top of public optical

  8. Stego Keys Performance on Feature Based Coding Method in Text Domain

    Directory of Open Access Journals (Sweden)

    Din Roshidi

    2017-01-01

    Full Text Available A main critical factor on embedding process in any text steganography method is a key used known as stego key. This factor will be influenced the success of the embedding process of text steganography method to hide a message from third party or any adversary. One of the important aspects on embedding process in text steganography method is the fitness performance of the stego key. Three parameters of the fitness performance of the stego key have been identified such as capacity ratio, embedded fitness ratio and saving space ratio. It is because a better as capacity ratio, embedded fitness ratio and saving space ratio offers of any stego key; a more message can be hidden. Therefore, main objective of this paper is to analyze three features coding based namely CALP, VERT and QUAD of stego keys in text steganography on their capacity ratio, embedded fitness ratio and saving space ratio. It is found that CALP method give a good effort performance compared to VERT and QUAD methods.

  9. Achievement report for fiscal 1998 on area consortium research and development business. Area consortium for venture business development by building base for small business (abuse double protected next generation card system based on steganography); 1998 nendo venture kigyo ikuseigata chiiki consortium kenkyu kaihatsu (chusho kigyo sozo kibangata). Steganography gijutsu wo riyoshita jisedaigata fusei shiyo taju boshi guard system no kenkyu kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    A card system is developed using BPCS (Business Planning and Control System) steganography, with electronic data imbedded in the card. Under the system, the visual recognition of the user and the mechanical verification of the card are carried out simultaneously, with the card rejecting any abuse. In fiscal 1998, a system was built by way of trial, constituted of technologies of encoding, decoding, and packaging data into an IC (integrated circuit) card. A photograph of the user's face is attached to the card, the card carries an 8KB IC memory device, and the device stores data of the photograph of the user's face etc. A password has to be inputted before any data may be taken out. A customized key is required to display the imbedded personal data and, for the restoration of the key data, the personal key known only to the owner and the company key that is kept by the card managing company need to be collated with each other. Multiple checking is available for the prevention of abuse, which include the collation of face photographs, collation with display by inputting the password, and request for the customized key to confirm the presence of authority to read the imbedded personal data. (NEDO)

  10. Illustration Watermarking for Digital Images: An Investigation of Hierarchical Signal Inheritances for Nested Object-based Embedding

    Science.gov (United States)

    2007-02-23

    approach for signal-level watermark inheritance. 15. SUBJECT TERMS EOARD, Steganography , Image Fusion, Data Mining, Image ...189, Geneva, Switzerland, 2006 [V Block-Luminance and Blue Channel LSB Wet Paper Code Image Watermarking, accepte publication in: Proceedings of...SPIE Electronic Imaging , Security, Steganography , and Wa- termarking of Multimedia Contents IX, 2007 Interaction with a project from German Science

  11. Data Compression of Fingerprint Minutiae

    OpenAIRE

    VISHAL SHRIVASTAVA; SUMIT SHARMA

    2012-01-01

    Biometric techniques have usual advantages over conventional personal identification technique. Among various commercially available biometric techniques such as face, fingerprint, Iris etc., fingerprint-based techniques are the most accepted recognition system. Fingerprints are trace or impression of patterns created byfriction ridges of the skin in the fingers and thumbs. Steganography usually used in smart card is a safe technique for authenticating a person. In steganography, biometric ch...

  12. A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm

    Science.gov (United States)

    Nofriansyah, Dicky; Defit, Sarjon; Nurcahyo, Gunadi W.; Ganefri, G.; Ridwan, R.; Saleh Ahmar, Ansari; Rahim, Robbi

    2018-01-01

    Cybercrime is one of the most serious threats. Efforts are made to reduce the number of cybercrime is to find new techniques in securing data such as Cryptography, Steganography and Watermarking combination. Cryptography and Steganography is a growing data security science. A combination of Cryptography and Steganography is one effort to improve data integrity. New techniques are used by combining several algorithms, one of which is the incorporation of hill cipher method and Morse code. Morse code is one of the communication codes used in the Scouting field. This code consists of dots and lines. This is a new modern and classic concept to maintain data integrity. The result of the combination of these three methods is expected to generate new algorithms to improve the security of the data, especially images.

  13. High-capacity method for hiding data in the discrete cosine transform domain

    Science.gov (United States)

    Qazanfari, Kazem; Safabakhsh, Reza

    2013-10-01

    Steganography is the art and science of hiding data in different media such as texts, audios, images, and videos. Data hiding techniques are generally divided into two groups: spatial and frequency domain techniques. Spatial domain methods generally have low security and, as a result, are less attractive to researchers. Discrete cosine transform (DCT) is the most common transform domain used in steganography and JPEG compression. Since a large number of the DCT coefficients of JPEG images are zero, the capacity of DCT domain-based steganography methods is not very high. We present a high-capacity method for hiding messages in the DCT domain. We describe the method in two classes where the receiver has and where the receiver does not have the cover image. In each class, we consider three cases for each coefficient. By considering n coefficients, there are 3n different situations. The method embeds ⌊log2 3n⌋ bits in these n coefficients. We show that the maximum reachable capacity by our method is 58% higher than the other general steganography methods. Experimental results show that the histogram-based steganalysis methods cannot detect the stego images produced by the proposed method while the capacity is increased significantly.

  14. DEVELOPMENT AND IMPLEMENTATION OF HASH FUNCTION FOR GENERATING HASHED MESSAGE

    Directory of Open Access Journals (Sweden)

    Amir Ghaeedi

    2016-09-01

    Full Text Available Steganography is a method of sending confidential information in a way that the existence of the channel in this communication remains secret. A collaborative approach between steganography and digital signature provides a high secure hidden data. Unfortunately, there are wide varieties of attacks that affect the quality of image steganography. Two issues that required to be addressed are large size of the ciphered data in digital signature and high bandwidth. The aim of the research is to propose a new method for producing a dynamic hashed message algorithm in digital signature and then embedded into image for enhancing robustness of image steganography with reduced bandwidth. A digital signature with smaller hash size than other hash algorithms was developed for authentication purposes. A hash function is used in the digital signature generation. The encoder function encoded the hashed message to generate the digital signature and then embedded into an image as a stego-image. In enhancing the robustness of the digital signature, we compressed or encoded it or performed both operations before embedding the data into the image. This encryption algorithm is also computationally efficient whereby for messages with the sizes less than 1600 bytes, the hashed file reduced the original file up to 8.51%.

  15. A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis

    Science.gov (United States)

    2002-01-01

    itd.nrl.navy.mil Abstract. Steganography and steganalysis of digital images is a cat- and-mouse game. In recent work, Fridrich, Goljan and Du introduced a method...proposed embedding method. 1 Introduction Steganography and steganalysis of digital images is a cat-and-mouse game. Ever since Kurak and McHugh’s seminal...paper on LSB embeddings in images [10], various researchers have published work on either increasing the payload, im- proving the resistance to

  16. A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

    Directory of Open Access Journals (Sweden)

    Milad Taleby Ahvanooey

    2018-01-01

    Full Text Available With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.

  17. Matryoshka: Hiding Secret Communication in Plain Sight

    OpenAIRE

    Safaka, Iris; Fragouli, Christina; Argyraki, Katerina

    2016-01-01

    We want to enable a pair of communicating users to exchange secret messages while hiding the fact that secret communication is taking place. We propose a linguistic steganography approach, where each human message is hidden in another human-like message. A hard open question is how to keep the steganographic message small -- existing related tools tend to blow up its size, thereby revealing the use of steganography. We encrypt by compressing each message, mapping it to a plausible sequence of...

  18. PENGGUNAAN TEKNIK KEAMANAN PADA JARINGAN SERAT OPTIK DENGAN METODE ANTI-JAMMING DAN STEGANOGRAFI MENGGUNAKAN MODUL OPTISYSTEM

    Directory of Open Access Journals (Sweden)

    Mia Rosmiati

    2017-02-01

    Full Text Available Serat optic merupakan media transmisi yang dapat menghantarkan informasi dalam bentuk cahaya. digunakannya cahaya sebagai media penghantaran informasi membuat media ini dapat menghantarkan informasi dengan kapasitas besar dalam waktu yang sangat singkat. Sehingga saat ini serat optic banyak digunakan dalam Telekomunikasi. jaringan serat optic ini harus disertai dengan teknik keamanan yang handal dalam proses transmisi informasinya, karena jika terjadi  penyerangan  dalam jaringan yang serat optic maka data yang akan diterima oleh receiver akan jauh berbeda dengan data yang dikirim transmitter. Sehingga hal ini sangat fatal jika informasi yang dikirimkan memiliki tingkat kerahasiaan yang sangat  tinggi seperti informasi keamanan Negara. Adapun metode yang dapat digunakan dalam pengamanan jaringan serat optic adalah metode steganography dan metode anti-jamming. Dari percobaan yang telah dilakukan terlihat bahwa teknik steganography memiliki tingkat kehandalan yang lebih baik jika dibandingkan dengan metode anti-jamming dengan  nilai BER untuk metode steganography adalah 1.91219e-077.

  19. Recent Advances in Information Hiding and Applications

    CERN Document Server

    Huang, Hsiang-Cheh; Jain, Lakhmi; Zhao, Yao

    2013-01-01

    This research book presents a sample of recent advances in information hiding techniques and their applications. It includes:   Image data hiding scheme based on vector quantization and image graph coloring The copyright protection system for Android platform Reversible data hiding ICA-based image and video watermarking Content-based invariant image watermarking Single bitmap block truncation coding of color images using cat swarm optimization Genetic-based wavelet packet watermarking for copyright protection Lossless text steganography in compression coding Fast and low-distortion capacity acoustic synchronized acoustic-to-acoustic steganography scheme Video watermarking with shot detection

  20. Practical steganalysis of digital images: state of the art

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav

    2002-04-01

    Steganography is the art of hiding the very presence of communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a great deal of attention both from law enforcement and the media. In our paper, we classify and review current stego-detection algorithms that can be used to trace popular steganographic products. We recognize several qualitatively different approaches to practical steganalysis - visual detection, detection based on first order statistics (histogram analysis), dual statistics methods that use spatial correlations in images and higher-order statistics (RS steganalysis), universal blind detection schemes, and special cases, such as JPEG compatibility steganalysis. We also present some new results regarding our previously proposed detection of LSB embedding using sensitive dual statistics. The recent steganalytic methods indicate that the most common paradigm in image steganography - the bit-replacement or bit substitution - is inherently insecure with safe capacities far smaller than previously thought.

  1. Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model

    Directory of Open Access Journals (Sweden)

    Chun-Juan Ouyang

    2017-01-01

    Full Text Available Security measure is of great importance in both steganography and steganalysis. Considering that statistical feature perturbations caused by steganography in an image are always nondeterministic and that an image is considered nonstationary, in this paper, the steganography is regarded as a fuzzy process. Here a steganographic security measure is proposed. This security measure evaluates the similarity between two vague sets of cover images and stego images in terms of n-order Markov chain to capture the interpixel correlation. The new security measure has proven to have the properties of boundedness, commutativity, and unity. Furthermore, the security measures of zero order, first order, second order, third order, and so forth are obtained by adjusting the order value of n-order Markov chain. Experimental results indicate that the larger n is, the better the measuring ability of the proposed security measure will be. The proposed security measure is more sensitive than other security measures defined under a deterministic distribution model, when the embedding is low. It is expected to provide a helpful guidance for designing secure steganographic algorithms or reliable steganalytic methods.

  2. APLIKASI KEAMANAN PESAN MENGGUNAKAN ALGORITMA STEGANOGRAFI DAN KRIPTOGRAFI

    Directory of Open Access Journals (Sweden)

    Wawan Setiawan

    2015-04-01

    Full Text Available Steganography is a technique of hiding a secret or confidential information in another message so that other people are not aware of the existence of a hidden message. In order for hidden messages or information that it's safer to use the science of cryptography for data encryption. So that the data or messages can not be understood by an unauthorized person who managed to access the data. This application uses methodologies Rappid Guidelines for Application Engineering (Grapple, which consists of Requirement gathering, Analysis, Designs, Development, and Deployment. This application was built using the Java programming language with tools NetBeans IDE 7.0. The algorithm used in this application is the steganography algorithms Least Significant Bit and cryptographic algorithms Vigenere Cipher. The final results of this study is an application of steganography in images by using the method of least significant bit (LSB and vigenere that can be run on a computer. The image can be used in this application is the image format JPG, PNG, GIF, and BMP. This application can insert text in the image and can perform encryption and decryption at the message you want to insert.

  3. 37 CFR 1.824 - Form and format for nucleotide and/or amino acid sequence submissions in computer readable form.

    Science.gov (United States)

    2010-07-01

    ... System Compatibility: MS-DOS, MS-Windows, Unix or Macintosh; (3) Line Terminator: ASCII Carriage Return... command; specify blocking factor (not “block size”); Line Terminator: ASCII Carriage Return plus ASCII Line Feed. (3) 8mm Data Cartridge: Format: Unix tar command; specify blocking factor (not “block size...

  4. CERCLIS (Superfund) ASCII Text Format - CPAD Database

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Comprehensive Environmental Response, Compensation and Liability Information System (CERCLIS) (Superfund) Public Access Database (CPAD) contains a selected set...

  5. Combination of Rivest-Shamir-Adleman Algorithm and End of File Method for Data Security

    Science.gov (United States)

    Rachmawati, Dian; Amalia, Amalia; Elviwani

    2018-03-01

    Data security is one of the crucial issues in the delivery of information. One of the ways which used to secure the data is by encoding it into something else that is not comprehensible by human beings by using some crypto graphical techniques. The Rivest-Shamir-Adleman (RSA) cryptographic algorithm has been proven robust to secure messages. Since this algorithm uses two different keys (i.e., public key and private key) at the time of encryption and decryption, it is classified as asymmetric cryptography algorithm. Steganography is a method that is used to secure a message by inserting the bits of the message into a larger media such as an image. One of the known steganography methods is End of File (EoF). In this research, the cipher text resulted from the RSA algorithm is compiled into an array form and appended to the end of the image. The result of the EoF is the image which has a line with black gradations under it. This line contains the secret message. This combination of cryptography and steganography in securing the message is expected to increase the security of the message, since the message encryption technique (RSA) is mixed with the data hiding technique (EoF).

  6. Information Hiding: an Annotated Bibliography

    National Research Council Canada - National Science Library

    Anderson, Ross

    1999-01-01

    ... so. These steganography, copyright marking, the study of covert channels in operating systems, low-probability of intercept communications, and the study of subliminal channels in digital signature schemes...

  7. Novel approach to information security management of confidential ...

    African Journals Online (AJOL)

    Novel approach to information security management of confidential and propriety information ... Journal of Fundamental and Applied Sciences ... valuable information by using steganography it can have a major impact security management.

  8. Cover estimation and payload location using Markov random fields

    Science.gov (United States)

    Quach, Tu-Thach

    2014-02-01

    Payload location is an approach to find the message bits hidden in steganographic images, but not necessarily their logical order. Its success relies primarily on the accuracy of the underlying cover estimators and can be improved if more estimators are used. This paper presents an approach based on Markov random field to estimate the cover image given a stego image. It uses pairwise constraints to capture the natural two-dimensional statistics of cover images and forms a basis for more sophisticated models. Experimental results show that it is competitive against current state-of-the-art estimators and can locate payload embedded by simple LSB steganography and group-parity steganography. Furthermore, when combined with existing estimators, payload location accuracy improves significantly.

  9. Digital video steganalysis using motion vector recovery-based features.

    Science.gov (United States)

    Deng, Yu; Wu, Yunjie; Zhou, Linna

    2012-07-10

    As a novel digital video steganography, the motion vector (MV)-based steganographic algorithm leverages the MVs as the information carriers to hide the secret messages. The existing steganalyzers based on the statistical characteristics of the spatial/frequency coefficients of the video frames cannot attack the MV-based steganography. In order to detect the presence of information hidden in the MVs of video streams, we design a novel MV recovery algorithm and propose the calibration distance histogram-based statistical features for steganalysis. The support vector machine (SVM) is trained with the proposed features and used as the steganalyzer. Experimental results demonstrate that the proposed steganalyzer can effectively detect the presence of hidden messages and outperform others by the significant improvements in detection accuracy even with low embedding rates.

  10. Kombinasi RSA-CRT dengan Random LSB untuk Keamanan Data di Kanwil Kementerian Agama Prov. Sumatera Utara

    Directory of Open Access Journals (Sweden)

    Niti Ravika Nasution

    2017-04-01

    Full Text Available In this study the authors use Cryptographic Algorithms Rivest Shamir Adleman Chinese Remainder Theorem (RSA-CRT and steganography technique Random Least Significant Bits (LSB. RSA-CRT is basically the same as usual, but utilizing RSA CRT theorem to shorten the bit size decryption exponent d by hiding d on congruent systems that accelerate time decryption, the difference in the key generation process and the decryption process. Cryptographic algorithm RSA-CRT produce ciphertext stored into a picture (image using Steganography technique Random Least Significant Bits (LSB. The workings of Random LSB is storing the message (ciphertext in the first bit or the second bit random key for use random number generator Pseudo Random Number Generator (PRNG with Linear Congruential Generator (LCG method. Ciphertext stored in a picture  (image has extracted key re-use random number generator at the time of inserting the message. Then the ciphertext is decrypted back by the algorithm RSA-CRT to produce the original text (plaintext. Merging Cryptographic Algorithm RSA-CRT with Steganography Technique Simple  LSB than with Random LSB generate higher PSNR and MSE is lower, which means better level of data security and more resistant to attack. Has more difficult to find a secret message by cryptanalysis and steganalyst.

  11. General Principles of Integrity Checking of Digital Images and Application for Steganalysis

    Directory of Open Access Journals (Sweden)

    Kobozeva Alla A.

    2016-06-01

    Full Text Available The new common approach for integrity checking of digital images is developed. The new features of formal parameters defining image are revealed, theoretically grounded and practically tested. The characteristics of the mutual arrangement of left and right singular vectors corresponding to the largest singular value of the image’s matrix (block of matrix and the vector composed of singular numbers is obtained. Formal parameters are obtained using normal singular decomposition of matrix (block of matrix which is uniquely determined. It is shown that for most blocks of original image (no matter lossy or lossless the angle between the left (right mentioned singular vector and vector composed of singular numbers is defined by the angle between the n-optimal vector and the vector of standard basis of the range corresponding dimension. It is shown that the determined feature brakes for the mentioned formal parameters in a non-original image. This shows the integrity violation of the image, i.e. the existence of the additional information embedded using steganography algorithms. So this can be used as a basis for development of new universal steganography methods and algorithms, and one example of the realization is proposed. The efficiency of the proposed algorithm won’t depend on the details of steganography method used for embedding. All the obtained results can be easily adapted for the digital video and audio analysis.

  12. A SiPM-based scintillator prototype for the upgrade of the Pierre Auger Observatory

    Energy Technology Data Exchange (ETDEWEB)

    Schumacher, Johannes; Bretz, Thomas; Hebbeker, Thomas; Kemp, Julian; Meissner, Rebecca; Middendorf, Lukas; Niggemann, Tim; Peters, Christine [III. Physikalisches Institut A, RWTH Aachen University (Germany); Collaboration: Pierre-Auger-Collaboration

    2016-07-01

    Plastic scintillator-based detectors are simple and yet powerful instruments, commonly used in particle physics experiments. These detectors are also planned to be installed at the Pierre Auger Observatory as part of the upgrade called AugerPrime. Here, a single detector module will consist of several large-sized scintillator bars. Embedded wavelength shifting fibres read out the scintillation light and are coupled to a single photo-sensitive device. We investigate the application of silicon photomultipliers (SiPMs) in this scope, which benefits from high photon detection efficiency and stability. We show the performance of a SiPM-based prototype device installed in the 2 m{sup 2} detector ASCII - an early prototype of the scintillating detector planned for AugerPrime. We focus on the electronics, the optical coupling and the in situ calibration. As ASCII has been operating with SiPMs for several months now, we also highlight first high-energy events seen in coincidence with the Surface Detector of the Pierre Auger Observatory.

  13. Steganography using RTP packets

    OpenAIRE

    Pontón Loaiza, Melina Marcela

    2014-01-01

    En tiempos actuales, donde la mayoría de las comunicaciones se realizan a través de medios digitales, la privacidad y seguridad al transmitir información pueden ser fácilmente vulnerables. La esteganografía, siendo la ciencia de ocultar comunicaciones secretas en medios aparentemente inocentes, nos puede ayudar a alcanzar este propósito. El objetivo del presente trabajo es el de actualizar y mejorar la herramienta esteganográfica stegan RTP, además de analizar las diferentes maneras en que la...

  14. NOISE SECURES SECRET DATA! BY ACT AS A REFERENCE FOR EMBEDDING

    Directory of Open Access Journals (Sweden)

    J. Jayaseelan

    2014-03-01

    Full Text Available Data Security is that the most crucial think about a communication network. Data security is achieved by cryptography and data concealing. Steganography is one of the info concealing technique; here any form of signal is concealing by exploitation a picture, audio or video. In an exceedingly spatial domain steganography, most typically the info is embedded into a LSB’s of the cover image pixels. As a result of it maintain the standard of the stego image as like as cover image instead of embedded into MSB’s. To embedding into a LSB’s of cover image (R, G, B plane researchers are using different types of pixel indicating methods, random embedding, edge based embedding in spatial domain or applying completely different reworks in transform domain. In this paper, for spatial domain steganography noise based embedding technique is proposed; it is entirely different from the out there techniques. In this paper two copies of JPEG, PNG, GIF, or BMP etc., images are used. One is taken as a reference image and noise is added onto that. Supported this reference image knowledge is embedded into the LSB’s of cover image. Proposed system using salt and pepper noise for data embedding, it is an ON, OFF noise. Based on added salt, pepper, and no noise portions of reference image completely different range of bits are embedded into the cover image. The result is analyzed by using MSE, PSNR and capacity performance metrics.

  15. Watermarking Algorithms for 3D NURBS Graphic Data

    Directory of Open Access Journals (Sweden)

    Jae Jun Lee

    2004-10-01

    Full Text Available Two watermarking algorithms for 3D nonuniform rational B-spline (NURBS graphic data are proposed: one is appropriate for the steganography, and the other for watermarking. Instead of directly embedding data into the parameters of NURBS, the proposed algorithms embed data into the 2D virtual images extracted by parameter sampling of 3D model. As a result, the proposed steganography algorithm can embed information into more places of the surface than the conventional algorithm, while preserving the data size of the model. Also, any existing 2D watermarking technique can be used for the watermarking of 3D NURBS surfaces. From the experiment, it is found that the algorithm for the watermarking is robust to the attacks on weights, control points, and knots. It is also found to be robust to the remodeling of NURBS models.

  16. Program Aplikasi Steganografi Menggunakan Metode Spread Spectrum pada Perangkat Mobile Berbasis Android

    Directory of Open Access Journals (Sweden)

    Rojali Rojali

    2012-12-01

    Full Text Available The exchange of traffic information in cyberspace grows fast. In all areas of life utilize technology to exchange information. One of the media owned by many people is mobile device such as mobile phone and tablet computer. In fact many people have been using mobile devices for information exchange function, and expect information to be transmitted quickly, accurately, and safely. The information security sent will be very important when the information is confidential. One way to secure information sent is the concealment of information into a media so that information hidden is beyond recognition by the human senses, which iscommonly referred to steganography. This research studied and implemented steganography using spread spectrum Method on Android-based mobile devices. The results showed that the inserted image before and after the message was inserted is not different with PSNR value of about 75.

  17. KONSEP PENYANDIAN FILE JPEG DENGAN MENGGUNAKAN METODE LSB

    Directory of Open Access Journals (Sweden)

    Haikal Nando Winata

    2017-03-01

    Full Text Available Steganography is a technique to hide text or messages that other people do not know the contents of the text or the secret message. Steganography technique is often used to avoid suspicion and to avoid other people desire to know the contents of the text or the secret message. Digital image is one of the most well-known media and the public by the author. Digital image acts as a medium or a text container you want to hide a secret message. Methods LSB (Least Significant Bit that hides the bytes of text or message you want to hide into the last byte in the digital image. LSB method has the advantage of not changing the size and shape of the digital image by naked eye, text data or messages hidden can be restored without any change in size and shape

  18. Enhancing the (MSLDIP) image steganographic method (ESLDIP method)

    Science.gov (United States)

    Seddik Saad, Al-hussien

    2011-10-01

    Message transmissions over the Internet still have data security problem. Therefore, secure and secret communication methods are needed for transmitting messages over the Internet. Cryptography scrambles the message so that it cannot be understood. However, it makes the message suspicious enough to attract eavesdropper's attention. Steganography hides the secret message within other innocuous-looking cover files (i.e. images, music and video files) so that it cannot be observed [1].The term steganography originates from the Greek root words "steganos'' and "graphein'' which literally mean "covered writing''. It is defined as the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio text and video files [3].Steganographic techniques allow one party to communicate information to another without a third party even knowing that the communication is occurring. The ways to deliver these "secret messages" vary greatly [3].Our proposed method called Enhanced SLDIP (ESLDIP). In which the maximmum hiding capacity (MHC) of proposed ESLDIP method is higher than the previously proposed MSLDIP methods and the PSNR of the ESLDIP method is higher than the MSLDIP PSNR values', which means that the image quality of the ESLDIP method will be better than MSLDIP method and the maximmum hiding capacity (MHC) also improved. The rest of this paper is organized as follows. In section 2, steganography has been discussed; lingo, carriers and types. In section 3, related works are introduced. In section 4, the proposed method will be discussed in details. In section 5, the simulation results are given and Section 6 concludes the paper.

  19. Spatio-temporal Rich Model Based Video Steganalysis on Cross Sections of Motion Vector Planes.

    Science.gov (United States)

    Tasdemir, Kasim; Kurugollu, Fatih; Sezer, Sakir

    2016-05-11

    A rich model based motion vector steganalysis benefiting from both temporal and spatial correlations of motion vectors is proposed in this work. The proposed steganalysis method has a substantially superior detection accuracy than the previous methods, even the targeted ones. The improvement in detection accuracy lies in several novel approaches introduced in this work. Firstly, it is shown that there is a strong correlation, not only spatially but also temporally, among neighbouring motion vectors for longer distances. Therefore, temporal motion vector dependency along side the spatial dependency is utilized for rigorous motion vector steganalysis. Secondly, unlike the filters previously used, which were heuristically designed against a specific motion vector steganography, a diverse set of many filters which can capture aberrations introduced by various motion vector steganography methods is used. The variety and also the number of the filter kernels are substantially more than that of used in previous ones. Besides that, filters up to fifth order are employed whereas the previous methods use at most second order filters. As a result of these, the proposed system captures various decorrelations in a wide spatio-temporal range and provides a better cover model. The proposed method is tested against the most prominent motion vector steganalysis and steganography methods. To the best knowledge of the authors, the experiments section has the most comprehensive tests in motion vector steganalysis field including five stego and seven steganalysis methods. Test results show that the proposed method yields around 20% detection accuracy increase in low payloads and 5% in higher payloads.

  20. KONSEPSI INDUSTRIALISASI MADURA BERBASIS SUMBER DAYA LOKAL

    Directory of Open Access Journals (Sweden)

    Kurniati Indahsari

    2012-04-01

    Full Text Available Normal 0 false false false EN-US X-NONE AR-SA MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:Arial; mso-bidi-theme-font:minor-bidi;} Abstrac This article explores a concept of Local Based Industrialization in Madura. Industrialization is focused on community development rather than economic development. Three characters of Local Based Industrialization in Madura are: (1 pushing balanced transformation of economic structure; (2 focusing on community development and implementing sustainable development; and (3 developing local resources based industries. By implementing this concept, Madurese can develop without deleting their Islamic and traditional values and characters. Kata-kata kunci industrialisasi Madura, kompetensi inti industri daerah, berbasis sumberdaya lokal, community development

  1. Focusing ethnography

    DEFF Research Database (Denmark)

    Woermann, Niklas

    2018-01-01

    underpinnings of focusing ethnographic research by comparing different schools of thought and suggesting a practice theory-based approach. It argues that many research projects are focused but do not reflect on the process of focusing, describes how to identify focal settings or practices, and introduces......Building theory with ethnography and filmic research increasingly requires focussing on key practices or settings, instead of painting a broad panorama of a culture. But few authors discuss why and how to focus. This article provides a systematic discussion of the theoretical and methodological...

  2. Steganalysis based on JPEG compatibility

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Du, Rui

    2001-11-01

    In this paper, we introduce a new forensic tool that can reliably detect modifications in digital images, such as distortion due to steganography and watermarking, in images that were originally stored in the JPEG format. The JPEG compression leave unique fingerprints and serves as a fragile watermark enabling us to detect changes as small as modifying the LSB of one randomly chosen pixel. The detection of changes is based on investigating the compatibility of 8x8 blocks of pixels with JPEG compression with a given quantization matrix. The proposed steganalytic method is applicable to virtually all steganongraphic and watermarking algorithms with the exception of those that embed message bits into the quantized JPEG DCT coefficients. The method can also be used to estimate the size of the secret message and identify the pixels that carry message bits. As a consequence of our steganalysis, we strongly recommend avoiding using images that have been originally stored in the JPEG format as cover-images for spatial-domain steganography.

  3. Fingerprinting with Wow

    Science.gov (United States)

    Yu, Eugene; Craver, Scott

    2006-02-01

    Wow, or time warping caused by speed fluctuations in analog audio equipment, provides a wealth of applications in watermarking. Very subtle temporal distortion has been used to defeat watermarks, and as components in watermarking systems. In the image domain, the analogous warping of an image's canvas has been used both to defeat watermarks and also proposed to prevent collusion attacks on fingerprinting systems. In this paper, we explore how subliminal levels of wow can be used for steganography and fingerprinting. We present both a low-bitrate robust solution and a higher-bitrate solution intended for steganographic communication. As already observed, such a fingerprinting algorithm naturally discourages collusion by averaging, owing to flanging effects when misaligned audio is averaged. Another advantage of warping is that even when imperceptible, it can be beyond the reach of compression algorithms. We use this opportunity to debunk the common misconception that steganography is impossible under "perfect compression."

  4. Analysis of Multiple Data Hiding Combined Coloured Visual Cryptography and LSB

    Science.gov (United States)

    Maulana, Halim; Rahman Syahputra, Edy

    2017-12-01

    Currently the level of data security becoming a major factor in data transfer. As we know every process of sending data through any medium the risk of that data gets hacked will still be there. Some techniques for securing data such as steganography and cryptography also often used as a solution for securing data. But it does not last long because it has been found out the weaknesses of the algorithm so that the security be assured. So, in need of variety of new algorithms to be able to protect the data so that data security can be guaranteed. In this study tries to combine two visual algorithms that steganography and cryptography. Where in these experiments will try to secure two pieces of data type that is the type of image data and text data where both the data is regarded as a message so to obtain the correct information receiver should get that two types of data.

  5. Algorithm for detection of steganographic inserts type LSB-substitution on the basis of an analysis of the zero layer

    Science.gov (United States)

    Belim, S. V.; Vilkhovskiy, D. E.

    2018-01-01

    All articles must contain an abstract. The abstract text should be formatted using 10 point Times or Times New Roman and indented 25 mm from the left margin. Leave 10 mm space after the abstract before you begin the main text of your article, starting on the same page as the abstract. The abstract should give readers concise information about the content of the article and indicate the main results obtained and conclusions drawn. The abstract is not part of the text and should be complete in itself; no table numbers, figure numbers, references or displayed mathematical expressions should be included. It should be suitable for direct inclusion in abstracting services and should not normally exceed 200 words in a single paragraph. Since contemporary information-retrieval systems rely heavily on the content of titles and abstracts to identify relevant articles in literature searches, great care should be taken in constructing both. Keywords - search for LSB-inserts, analysis of steganography container, revealing of steganography inserts.

  6. Focused Ethnography

    Directory of Open Access Journals (Sweden)

    Hubert Knoblauch

    2005-09-01

    Full Text Available In this paper I focus on a distinctive kind of sociological ethnography which is particularly, though not exclusively, adopted in applied research. It has been proposed that this branch of ethno­graphy be referred to as focused ethnography. Focused ethnography shall be delineated within the context of other common conceptions of what may be called conventional ethnography. However, rather than being opposed to it, focused ethno­graphy is rather complementary to conventional ethnography, particularly in fields that are charac­teristic of socially and functionally differentiated contemporary society. The paper outlines the back­ground as well as the major methodological features of focused ethnography, such as short-term field visits, data intensity and time intensity, so as to provide a background for future studies in this area. URN: urn:nbn:de:0114-fqs0503440

  7. 36 CFR Appendix to Part 1193 - Advisory Guidance

    Science.gov (United States)

    2010-07-01

    ... electronic form. Electronic text must be provided in ASCII or a properly formatted word processor file. Using... text. When converting a document into ASCII or word processor formats, it is important to utilize the... access, use 18 point type; anything larger could make text too choppy to read comfortably. Use a good...

  8. Limited distortion in LSB steganography

    Science.gov (United States)

    Kim, Younhee; Duric, Zoran; Richards, Dana

    2006-02-01

    It is well known that all information hiding methods that modify the least significant bits introduce distortions into the cover objects. Those distortions have been utilized by steganalysis algorithms to detect that the objects had been modified. It has been proposed that only coefficients whose modification does not introduce large distortions should be used for embedding. In this paper we propose an effcient algorithm for information hiding in the LSBs of JPEG coefficients. Our algorithm uses parity coding to choose the coefficients whose modifications introduce minimal additional distortion. We derive the expected value of the additional distortion as a function of the message length and the probability distribution of the JPEG quantization errors of cover images. Our experiments show close agreement between the theoretical prediction and the actual additional distortion.

  9. One improved LSB steganography algorithm

    Science.gov (United States)

    Song, Bing; Zhang, Zhi-hong

    2013-03-01

    It is easy to be detected by X2 and RS steganalysis with high accuracy that using LSB algorithm to hide information in digital image. We started by selecting information embedded location and modifying the information embedded method, combined with sub-affine transformation and matrix coding method, improved the LSB algorithm and a new LSB algorithm was proposed. Experimental results show that the improved one can resist the X2 and RS steganalysis effectively.

  10. Video Error Correction Using Steganography

    Science.gov (United States)

    Robie, David L.; Mersereau, Russell M.

    2002-12-01

    The transmission of any data is always subject to corruption due to errors, but video transmission, because of its real time nature must deal with these errors without retransmission of the corrupted data. The error can be handled using forward error correction in the encoder or error concealment techniques in the decoder. This MPEG-2 compliant codec uses data hiding to transmit error correction information and several error concealment techniques in the decoder. The decoder resynchronizes more quickly with fewer errors than traditional resynchronization techniques. It also allows for perfect recovery of differentially encoded DCT-DC components and motion vectors. This provides for a much higher quality picture in an error-prone environment while creating an almost imperceptible degradation of the picture in an error-free environment.

  11. Video Error Correction Using Steganography

    Directory of Open Access Journals (Sweden)

    Robie David L

    2002-01-01

    Full Text Available The transmission of any data is always subject to corruption due to errors, but video transmission, because of its real time nature must deal with these errors without retransmission of the corrupted data. The error can be handled using forward error correction in the encoder or error concealment techniques in the decoder. This MPEG-2 compliant codec uses data hiding to transmit error correction information and several error concealment techniques in the decoder. The decoder resynchronizes more quickly with fewer errors than traditional resynchronization techniques. It also allows for perfect recovery of differentially encoded DCT-DC components and motion vectors. This provides for a much higher quality picture in an error-prone environment while creating an almost imperceptible degradation of the picture in an error-free environment.

  12. Focus Groups Help To Focus the Marketing Strategy.

    Science.gov (United States)

    Ashar, Hanna; Lane, Maureen

    1996-01-01

    A university-based degree completion program for adults conducted focus group research to refine market positioning and promotion. Focus groups averaged five current students and recent graduates who reflected, demographically, the current student population. Results gave insight into reasons for selecting the university, aspects of the program…

  13. Students’ perceptions about the use of wiki. analysis of an experience of collaborative learning at the University of Girona

    Directory of Open Access Journals (Sweden)

    Albert Ruda González

    2013-02-01

    Full Text Available 0 0 1 47 260 USAL 2 1 306 14.0 Normal 0 21 false false false ES JA X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-ansi-language:ES; mso-fareast-language:EN-US;} This paper focuses on frustration experienced by law students as a result of using wikis to carry out a group investigation assignment at an on-site university. The reasons which may have contributed to such a negative response by the students are explored and some proposals for improvement are presented.

  14. Without 'Focus'

    Directory of Open Access Journals (Sweden)

    Aldo Sevi

    2010-12-01

    Full Text Available It is widely accepted that a notion of 'focus', more or less as conceived of in Jackendoff (1972, must be incorporated into our theory of grammar, as a means of accounting for certain observed correlations between prosodic facts and semantic/pragmatic facts. In this paper, we put forth the somewhat radical idea that the time has come to give up this customary view, and eliminate 'focus' from our theory of grammar. We argue that such a move is both economical and fruitful.Research over the years has revealed that the correlations between prosody, 'focus', and the alleged semantic/pragmatic effects of focus are much less clear and systematic than we may have initially hoped. First we argue that this state of affairs detracts significantly from the utility of our notion of 'focus', to the point of calling into question the very motivation for including it in the grammar. Then we look at some of the central data, and show how they might be analyzed without recourse to a notion of 'focus'. We concentrate on (i the effect of pitch accent placement on discourse congruence, and (ii the choice of 'associate' for the so-called 'focus sensitive' adverb only. We argue that our focus-free approach to the data improves empirical coverage, and begins to reveal patterns that have previously been obscured by preconceptions about 'focus'.ReferencesBeaver, D. & Clark, B. 2008. Sense and Sensitivity: How Focus Determines Meaning. Blackwell.Beaver, D., Clark, B., Flemming, E., Jaeger, T. F. & Wolters, M. 2007. ‘When semantics meets phonetics: Acoustical studies of second occurrence focus’. Language 83.2: 245–76.http://dx.doi.org/10.1353/lan.2007.0053Beckman, M. & Hirschberg, J. 1994. ‘The ToBI Annotation Conventions’. Ms.,http://www.cs.columbia.edu/~julia/files/conv.pdf.Bolinger, D. 1972. ‘Accent is predictable (if you are a mind-reader’. Language 48.3: 633–44.http://dx.doi.org/10.2307/412039Büring, D. 2006. ‘Focus projection and default

  15. Focus on focusing

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    The discovery and impact of the principle of strong focusing was celebrated at a history Symposium at Stanford on 25 July in the course of the 1985 US Summer School on Particle Accelerators. Burt Richter, Stanford Linac Director, who introduced all the speakers with well chosen reminders about their various contributions related to the theme of the symposium, remarked that it was an appropriate time to be lauding the great contributions of accelerator physicists following the Nobel Prize award to Simon van der Meer for outstanding achievements in accelerator physics

  16. Focus on focusing

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    1985-10-15

    The discovery and impact of the principle of strong focusing was celebrated at a history Symposium at Stanford on 25 July in the course of the 1985 US Summer School on Particle Accelerators. Burt Richter, Stanford Linac Director, who introduced all the speakers with well chosen reminders about their various contributions related to the theme of the symposium, remarked that it was an appropriate time to be lauding the great contributions of accelerator physicists following the Nobel Prize award to Simon van der Meer for outstanding achievements in accelerator physics.

  17. 資訊檢索互動讀者詢問行為研究 | Patron Elicitation Behavior in IR Interaction

    Directory of Open Access Journals (Sweden)

    吳美美、劉英享、姜杏蓉 Mei-Mei Wu、Ying-Hsang Liu、Hsing-Jung Chiang

    2001-10-01

    Full Text Available

    頁次:39-51

    ascii-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast; mso-font-kerning: 0pt;">

    ascii-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast; mso-font-kerning: 0pt;">讀者到資訊系統ascii-theme-font: minor-fareast;">(ascii-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast; mso-font-kerning: 0pt;">包括實體及虛擬圖書館ascii-theme-font: minor-fareast;">)ascii-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast; mso-font-kerning: 0pt;">詢問相關資訊,表達某種程度的資訊需求,系統理應理解讀者的資訊需求,提供合適的資訊給讀者。但是這個資訊檢索的理想陳述和現實狀況相去甚遠,檢索成功與否如買彩卷,運氣難料ascii-theme-font: minor-fareast;">。ascii-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast; mso-font-kerning: 0pt

  18. Electric motors in the focus; Elektroantrieb im Focus

    Energy Technology Data Exchange (ETDEWEB)

    Wilms, Jan

    2013-05-15

    In August 2013, the first electric series production model of Ford comes to the market: the Focus Electric. A 23-kWh lithium-ion battery supplies the 107 kilowatts (145 hp) electric motor of the Focus Electric with energy. This battery enables a range of 162 kilometers and a limited top speed of 136 kilometers per hour. However, with 40,000 Euro this electric-powered vehicles is too expensive.

  19. Focus is key: Panic-focused interpretations are associated with symptomatic improvement in panic-focused psychodynamic psychotherapy.

    Science.gov (United States)

    Keefe, John R; Solomonov, Nili; Derubeis, Robert J; Phillips, Alexander C; Busch, Fredric N; Barber, Jacques P; Chambless, Dianne L; Milrod, Barbara L

    2018-04-18

    This study examines whether, in panic-focused psychodynamic psychotherapy (PFPP), interpretations of conflicts that underlie anxiety (panic-focused or PF-interpretations) are specifically associated with subsequent panic disorder (PD) symptom improvement, over and above the provision of non-symptom-focused interpretations. Technique use in Sessions 2 and 10 of a 24-session PFPP protocol was assessed for the 65 patients with complete outcome data randomized to PFPP in a two-site trial of psychotherapies for PD. Sessions were rated in 15-min segments for therapists' use of PF-interpretations, non-PF-interpretations, and PF-clarifications. Robust regressions were conducted to examine the relationship between these interventions and symptom change subsequent to the sampled session. Interpersonal problems were examined as a moderator of the relationship of PF-interpretations to symptom change. At Session 10, but not at Session 2, patients who received a higher degree of PF-interpretations experienced greater subsequent improvement in panic symptoms. Non-PF-interpretations were not predictive. Patients with more interpersonal distress benefitted particularly from the use of PF-interpretations at Session 10. By the middle phase of PFPP, panic-focused interpretations may drive subsequent improvements in panic symptoms, especially among patients with higher interpersonal distress. Interpretations of conflict absent a panic focus may not be especially helpful.

  20. Focusators for laser-branding

    Science.gov (United States)

    Doskolovich, L. L.; Kazanskiy, N. L.; Kharitonov, S. I.; Uspleniev, G. V.

    A new method is investigated for synthesis of computer-generated optical elements: focusators that are able to focus the radial-symmetrical laser beam into complex focal contours, in particular into alphanumeric symbols. The method is based on decomposition of the focal contour into segments of straight lines and semi-circles, following corresponding spacing out of the focusator on elementary segments (concentric rings or sectors) and solution of the inverse task of focusing from focusator segments into corresponding elements of the focal contour. The results of numerical computing of the field from synthesized focusators into the letters are presented. The theoretical efficiency of the focusators discussed is no less than 85%. The amplitude masks and the results of operational studies of synthesized focusators are presented.

  1. Plasma focus breeder

    International Nuclear Information System (INIS)

    Ikuta, Kazunari.

    1981-09-01

    Instead of using linear accelerators, it is possible to breed fissile fuels with the help of high current plasma focus device. A mechanism of accelerating proton beam in plasma focus device to high energy would be a change of inductance in plasma column because of rapid growth of plasma instability. A possible scheme of plasma focus breeder is also proposed. (author)

  2. Plutonium focus area

    International Nuclear Information System (INIS)

    1996-08-01

    To ensure research and development programs focus on the most pressing environmental restoration and waste management problems at the U.S. Department of Energy (DOE), the Assistant Secretary for the Office of Environmental Management (EM) established a working group in August 1993 to implement a new approach to research and technology development. As part of this new approach, EM developed a management structure and principles that led to the creation of specific Focus Areas. These organizations were designed to focus the scientific and technical talent throughout DOE and the national scientific community on the major environmental restoration and waste management problems facing DOE. The Focus Area approach provides the framework for intersite cooperation and leveraging of resources on common problems. After the original establishment of five major Focus Areas within the Office of Technology Development (EM-50, now called the Office of Science and Technology), the Nuclear Materials Stabilization Task Group (EM-66) followed the structure already in place in EM-50 and chartered the Plutonium Focus Area (PFA). The following information outlines the scope and mission of the EM, EM-60, and EM-66 organizations as related to the PFA organizational structure

  3. [Pre-verbality in focusing and the need for self check. An attempt at "focusing check"].

    Science.gov (United States)

    Masui, T; Ikemi, A; Murayama, S

    1983-06-01

    Though the Focusing process is not entirely non-verbal, in Focusing, careful attention is paid by the Focuser and the Listener to the pre-verbal experiential process. In other words, Focusing involves attending to the felt sense that is not easily expressed in words immediately. Hence, during the process of learning to Focus, the Focusing teacher attempts to communicate the experiences of Focusing to the student which are not easily done by words. Due to such difficulties, the Focusing student may (and quite frequently does) mistake the experiential process in Focusing with other processes. Often, the felt sense can be confused with other phenomena such as "autogenic discharge". Also the Focuser may not stay with the felt sense and drift into "free association" or frequently, certain processes in "meditation" can be confused with Focusing. Therefore, there is a need for a "check" by which the Focusing student can confirm the Focusing experience for himself. For the Focusing student, such a "check" serves not only to confirm the Focusing process, but also an aid to learning Focusing. We will report here a "Focusing Check" which we developed by translating Eugene Gendlin's "Focusing Check" and making several modifications in it so that it will be more understandable to the Japanese. Along with the "Focusing Check" we developed, the authors discuss the need for such a check.

  4. Focus group discussions

    CERN Document Server

    Hennink, Monique M

    2014-01-01

    The Understanding Research series focuses on the process of writing up social research. The series is broken down into three categories: Understanding Statistics, Understanding Measurement, and Understanding Qualitative Research. The books provide researchers with guides to understanding, writing, and evaluating social research. Each volume demonstrates how research should be represented, including how to write up the methodology as well as the research findings. Each volume also reviews how to appropriately evaluate published research. Focus Group Discussions addresses the challenges associated with conducting and writing focus group research. It provides detailed guidance on the practical and theoretical considerations in conducting focus group discussions including: designing the discussion guide, recruiting participants, training a field team, moderating techniques and ethical considerations. Monique Hennink describes how a methodology section is read and evaluated by others, such as journal reviewers or ...

  5. An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks

    OpenAIRE

    S. Santhosh Baboo; K. Gokulraj

    2012-01-01

    Network security is the prevailing and challenging factor in computer communications. Computer security and communication security are interrelated and essential features in the internetworking system. Network security is ascertained by many factors like authentication, authorization, digital signatures, cryptography, steganography etc. Among them authentication is playing an important role in networked communications, where the communicating partners are to be identified each other legit...

  6. Near-field flat focusing mirrors

    Science.gov (United States)

    Cheng, Yu-Chieh; Staliunas, Kestutis

    2018-03-01

    This article reviews recent progress towards the design of near-field flat focusing mirrors, focusing/imaging light patterns in reflection. An important feature of such flat focusing mirrors is their transverse invariance, as they do not possess any optical axis. We start with a review of the physical background to the different focusing mechanisms of near- and far-field focusing. These near-field focusing devices like flat lenses and the reviewed near-field focusing mirrors can implement planar focusing devices without any optical axis. In contrast, various types of far-field planar focusing devices, such as high-contrast gratings and metasurfaces, unavoidably break the transverse invariance due to their radially symmetrical structures. The particular realizations of near-field flat focusing mirrors including Bragg-like dielectric mirrors and dielectric subwavelength gratings are the main subjects of the review. The first flat focusing mirror was demonstrated with a chirped mirror and was shown to manage an angular dispersion for beam focusing, similar to the management of chromatic dispersion for pulse compression. Furthermore, the reviewed optimized chirped mirror demonstrated a long near-field focal length, hardly achieved by a flat lens or a planar hyperlens. Two more different configurations of dielectric subwavelength gratings that focus a light beam at normal or oblique incidence are also reviewed. We also summarize and compare focusing performance, limitations, and future perspectives between the reviewed flat focusing mirrors and other planar focusing devices including a flat lens with a negative-index material, a planar hyperlens, a high-contrast grating, and a metasurface.

  7. Code domain steganography in video tracks

    Science.gov (United States)

    Rymaszewski, Sławomir

    2008-01-01

    This article is dealing with a practical method of hiding secret information in video stream. Method is dedicated for MPEG-2 stream. The algorithm takes to consider not only MPEG video coding scheme described in standard but also bits PES-packets encapsulation in MPEG-2 Program Stream (PS). This modification give higher capacity and more effective bit rate control for output stream than previously proposed methods.

  8. COLOUR IMAGE STEGANOGRAPHY USING MEDIAN MAINTENANCE

    Directory of Open Access Journals (Sweden)

    S. Arivazhagan

    2011-08-01

    Full Text Available Steganographic algorithms in the recent past have been producing stego images with perceptual invisibility, better secrecy and certain robustness against attacks like cropping, filtering etc. Recovering a good quality secret from a good quality stego image may not always be possible. The method proposed in this paper works in transform domain and attempts to extract the secret almost as same as the embedded one maintaining minimal changes to the cover image by using techniques like median maintenance, offset and quantization.

  9. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  10. BrightFocus Foundation

    Science.gov (United States)

    ... About BrightFocus Foundation Featured Content BrightFocus: Investing in Science to Save Mind and Sight We're here to help. Explore ... recognition is very important. Monday, November 6, 2017 New Diagnosis? Managing a mind and sight disease is a journey. And you’ ...

  11. 典藏數位化資訊環境之探討 | On Creation and Management of Digital Libraries: System Environment, Human-Computer Interface and Reseach Issues

    Directory of Open Access Journals (Sweden)

    何建明、黃世昆、莊庭瑞、李德財

    2000-10-01

    Full Text Available

    頁次:38-48

    ascii-theme-font: minor-fareast; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast; mso-bidi-font-family: HiddenHorzOCR;">資訊科技發展突飛猛進,尤其是其中的媒體數位化與壓縮技術,以及網路傳輸與網際網路技術等,促使資訊的數位化、典藏、傳播比以往更加便利。然而,儘管我國資訊工業總ascii-theme-font: minor-fareast; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast; mso-bidi-font-family: 細明體;">產值ascii-theme-font: minor-fareast; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast; mso-bidi-font-family: 'MS Mincho';">高居世ascii-theme-font: minor-fareast; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast; mso-bidi-font-family: HiddenHorzOCR;">界第三名,社會資訊化程度卻落在第十名以外。政府以往的資訊科技政策,長期側重於出口導向的ascii-theme-font: minor-fareast; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast; mso-bidi-font-family: 細明體;">產ascii-theme-font: minor-fareast; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast; mso-bidi-font-family: 'MS Mincho';">業,卻較少著重於引導社會

  12. Plasma focus matching conditions

    International Nuclear Information System (INIS)

    Soliman, H.M.; Masoud, M.M.; Elkhalafawy, T.A.

    1988-01-01

    A snow-plough and slug models have been used to obtain the optimum matching conditions of the plasma in the focus. The dimensions of the plasma focus device are, inner electrode radius = 2 cm, outer electrode radius = 5.5 cm, and its length = 8 cm. It was found that the maximum magnetic energy of 12.26 kJ has to be delivered to plasma focus whose density is 10 19 /cm 3 at focusing time of 2.55 μs and with total external inductance of 24.2 n H. The same method is used to evaluate the optimum matching conditions for the previous coaxial discharge system which had inner electrode radius = 1.6 cm, outer electrode radius = 3.3 cm and its length = 31.5 cm. These conditions are charging voltage = 12 kV, capacity of the condenser bank = 430 μf, plasma focus density = 10 19 /cm 3 focusing time = 8 μs and total external inductance = 60.32 n H.3 fig., 2 tab

  13. Focused ultrasound in ophthalmology

    Directory of Open Access Journals (Sweden)

    Silverman RH

    2016-09-01

    Full Text Available Ronald H Silverman1,2 1Department of Ophthalmology, Columbia University Medical Center, 2F.L. Lizzi Center for Biomedical Engineering, Riverside Research, New York, NY, USA Abstract: The use of focused ultrasound to obtain diagnostically significant information about the eye goes back to the 1950s. This review describes the historical and technological development of ophthalmic ultrasound and its clinical application and impact. Ultrasound, like light, can be focused, which is crucial for formation of high-resolution, diagnostically useful images. Focused, single-element, mechanically scanned transducers are most common in ophthalmology. Specially designed transducers have been used to generate focused, high-intensity ultrasound that through thermal effects has been used to treat glaucoma (via cilio-destruction, tumors, and other pathologies. Linear and annular transducer arrays offer synthetic focusing in which precise timing of the excitation of independently addressable array elements allows formation of a converging wavefront to create a focus at one or more programmable depths. Most recently, linear array-based plane-wave ultrasound, in which the array emits an unfocused wavefront and focusing is performed solely on received data, has been demonstrated for imaging ocular anatomy and blood flow. While the history of ophthalmic ultrasound extends back over half-a-century, new and powerful technologic advances continue to be made, offering the prospect of novel diagnostic capabilities. Keywords: ophthalmic ultrasound, ultrasound biomicroscopy (UBM, high-intensity focused ultrasound (HIFU, ultrafast imaging, Doppler imaging 

  14. Fourth-order structural steganalysis and analysis of cover assumptions

    Science.gov (United States)

    Ker, Andrew D.

    2006-02-01

    We extend our previous work on structural steganalysis of LSB replacement in digital images, building detectors which analyse the effect of LSB operations on pixel groups as large as four. Some of the method previously applied to triplets of pixels carries over straightforwardly. However we discover new complexities in the specification of a cover image model, a key component of the detector. There are many reasonable symmetry assumptions which we can make about parity and structure in natural images, only some of which provide detection of steganography, and the challenge is to identify the symmetries a) completely, and b) concisely. We give a list of possible symmetries and then reduce them to a complete, non-redundant, and approximately independent set. Some experimental results suggest that all useful symmetries are thus described. A weighting is proposed and its approximate variance stabilisation verified empirically. Finally, we apply symmetries to create a novel quadruples detector for LSB replacement steganography. Experimental results show some improvement, in most cases, over other detectors. However the gain in performance is moderate compared with the increased complexity in the detection algorithm, and we suggest that, without new insight, further extension of structural steganalysis may provide diminishing returns.

  15. Font attributes based text steganographic algorithm (FATS) for communicating images. A nuclear power plant perspective

    Energy Technology Data Exchange (ETDEWEB)

    Krishnan, R. Bala [Indira Gandhi Centre for Atomic Research, Kalpakkam (India). Computer Division; Thandra, Prasanth Kumar; Murty, S.A.V. Satya [Indira Gandhi Centre for Atomic Research, Kalpakkam (India); Thiyagarajan, P. [Central Univ. of Tamil Nadu, Thiruvarur (India). Dept. of Computer Science

    2017-03-15

    Today even sensitive organizations like nuclear power plants are connected to the internet. As information security is of utmost priority to such organizations, achieving the same is a challenging task while using the public network like the internet. Though cryptography could be used to enhance the information security, it cannot hide its own presence from the attackers. This drawback lead security professionals to look for an alternate technique like steganography. Steganography hides the secret information, stealthily, inside another innocent looking cover medium like text, image, audio and video. Considering these, this paper proposes a novel text steganographic algorithm that embeds images as codes in the font attributes such as color, character spacing and kerning. The procedure of representing an image as codes makes the proposed method independent from the resolution of the image. Experiments were conducted by embedding diverse categories of images. A comparison with the best existing method depicted that the embedding capacity attained by the proposed method is higher at 1.59-bits/character, which suits best for low bandwidth environments. Various security aspects of the proposed method have also been discussed.

  16. Font attributes based text steganographic algorithm (FATS) for communicating images. A nuclear power plant perspective

    International Nuclear Information System (INIS)

    Krishnan, R. Bala; Thiyagarajan, P.

    2017-01-01

    Today even sensitive organizations like nuclear power plants are connected to the internet. As information security is of utmost priority to such organizations, achieving the same is a challenging task while using the public network like the internet. Though cryptography could be used to enhance the information security, it cannot hide its own presence from the attackers. This drawback lead security professionals to look for an alternate technique like steganography. Steganography hides the secret information, stealthily, inside another innocent looking cover medium like text, image, audio and video. Considering these, this paper proposes a novel text steganographic algorithm that embeds images as codes in the font attributes such as color, character spacing and kerning. The procedure of representing an image as codes makes the proposed method independent from the resolution of the image. Experiments were conducted by embedding diverse categories of images. A comparison with the best existing method depicted that the embedding capacity attained by the proposed method is higher at 1.59-bits/character, which suits best for low bandwidth environments. Various security aspects of the proposed method have also been discussed.

  17. Plasma focus project

    International Nuclear Information System (INIS)

    Sahlin, H.L.

    1975-12-01

    The primary objective of this project is to provide a relatively simple pulsed power source for high density pulsed fusion studies with a variety of DT and other fusion microexplosion targets. The plasma focus operated on DT at 1 MJ should produce greater than or equal to 10 15 DT neutrons per pulse corresponding to 2800 J of nuclear energy release and for low pressure operation and appropriately configured high Z anode center should yield an x-ray burst of about 1000 J with a substantial fraction of this x-ray energy concentrated in the 5-100 kV range. Because of its x-ray and neutron production potential, the operation of the focus as an x-ray source is also under study and an initial design study for a repetitively pulsed 1 MJ plasma focus as a pulsed neutron materials testing source has been completed. The plasma focus seems particularly appropriate for application as a materials testing source for pulsed fusion reactors, for example, based on laser driven fusion microexplosions. The construction status of the device is described

  18. Statistical Characterization of MP3 Encoders for Steganalysis: ’CHAMP3’

    Science.gov (United States)

    2004-04-27

    compression exceeds those of typical stegano- graphic tools (e. g., LSB image embedding), the availability of commented source codes for MP3 encoders...developed by testing the approach on known and unknown reference data. 15. SUBJECT TERMS EOARD, Steganography , Digital Watermarking...Pages kbps Kilobits per Second LGPL Lesser General Public License LSB Least Significant Bit MB Megabyte MDCT Modified Discrete Cosine Transformation MP3

  19. Multimedia Security Application of a Ten-Term Chaotic System without Equilibrium

    Directory of Open Access Journals (Sweden)

    Xiong Wang

    2017-01-01

    Full Text Available A system without equilibrium has been proposed in this work. Although there is an absence of equilibrium points, the system displays chaos, which has been confirmed by phase portraits and Lyapunov exponents. The system is realized on an electronic card, which exhibits chaotic signals. Furthermore, chaotic property of the system is applied in multimedia security such as image encryption and sound steganography.

  20. Object Toolkit Version 4.3 User’s Manual

    Science.gov (United States)

    2016-12-31

    and with Nascap-2k. See the EPIC and Nascap-2k manuals for instructions. Most of the difficulties that users have encountered with Object Toolkit are...4/icond). 12.3 Importing Components From a NX I-DEAS TMG ASCII VUFF File Users of the NX I-DEAS TMG thermal analysis program can import the ASCII...2k user interface. The meaning of these properties is discussed in the Nascap-2k User’s Manual . Figure 36. Detector Properties Dialog Box. 15.5

  1. The focus factor

    DEFF Research Database (Denmark)

    Nicolaisen, Jeppe; Frandsen, Tove Faber

    2015-01-01

    Introduction. We present a new bibliometric indicator to measure journal specialisation over time, named the focus factor. This new indicator is based on bibliographic coupling and counts the percentage of re-citations given in subsequent years. Method. The applicability of the new indicator....... To validate re-citations as caused by specialisation, other possible causes were measured and correlated (obsolescence, journal self-citations and number of references). Results. The results indicate that the focus factor is capable of distinguishing between general and specialised journals and thus...... effectively measures the intended phenomenon (i.e., journal specialisation). Only weak correlations were found between journal re-citations and obsolescence, journal self-citations, and number of references. Conclusions. The focus factor successfully measures journal specialisation over time. Measures based...

  2. Penyembunyian Data pada File Video Menggunakan Metode LSB dan DCT

    Directory of Open Access Journals (Sweden)

    Mahmuddin Yunus

    2014-01-01

    Full Text Available Abstrak Penyembunyian data pada file video dikenal dengan istilah steganografi video. Metode steganografi yang dikenal diantaranya metode Least Significant Bit (LSB dan Discrete Cosine Transform (DCT. Dalam penelitian ini dilakukan penyembunyian data pada file video dengan menggunakan metode LSB, metode DCT, dan gabungan metode LSB-DCT. Sedangkan kualitas file video yang dihasilkan setelah penyisipan dihitung dengan menggunakan Mean Square Error (MSE dan Peak Signal to Noise Ratio (PSNR.Uji eksperimen dilakukan berdasarkan ukuran file video, ukuran file berkas rahasia yang disisipkan, dan resolusi video. Hasil pengujian menunjukkan tingkat keberhasilan steganografi video dengan menggunakan metode LSB adalah 38%, metode DCT adalah 90%, dan gabungan metode LSB-DCT adalah 64%. Sedangkan hasil perhitungan MSE, nilai MSE metode DCT paling rendah dibandingkan metode LSB dan gabungan metode LSB-DCT. Sedangkan metode LSB-DCT mempunyai nilai yang lebih kecil dibandingkan metode LSB. Pada pengujian PSNR diperoleh databahwa nilai PSNR metode DCTlebih tinggi dibandingkan metode LSB dan gabungan metode LSB-DCT. Sedangkan nilai PSNR metode gabungan LSB-DCT lebih tinggi dibandingkan metode LSB.   Kata Kunci— Steganografi, Video, Least Significant Bit (LSB, Discrete Cosine Transform (DCT, Mean Square Error (MSE, Peak Signal to Noise Ratio (PSNR                             Abstract Hiding data in video files is known as video steganography. Some of the well known steganography methods areLeast Significant Bit (LSB and Discrete Cosine Transform (DCT method. In this research, data will be hidden on the video file with LSB method, DCT method, and the combined method of LSB-DCT. While the quality result of video file after insertion is calculated using the Mean Square Error (MSE and Peak Signal to Noise Ratio (PSNR. The experiments were conducted based on the size of the video file, the file size of the inserted secret files, and

  3. A multi-sensor study of the impact of ground-based glaciogenic seeding on orogrpahic clouds and precipitation

    Science.gov (United States)

    Pokharel, Binod

    This dissertation examines reflectivity data from three different radar systems, as well as airborne and ground-based in situ particle imaging data, to study the impact of ground-based glaciogenic seeding on orographic clouds and precipitation formed over the mountains in southern Wyoming. The data for this study come from the AgI Seeding Cloud Impact Investigation (ASCII) field campaign conducted over the Sierra Madre mountains in 2012 (ASCII-12) and over the Medicine Bow mountains in 2013 (ASCII-13) in the context of the Wyoming Weather Modification Pilot Project (WWMPP). The campaigns were supported by a network of ground-based instruments, including a microwave radiometer, two profiling Ka-band Micro Rain Radars (MRRs), a Doppler on Wheels (DOW), rawinsondes, a Cloud Particle Imager, and a Parsivel disdrometer. The University of Wyoming King Air with profiling Wyoming Cloud Radar (WCR) conducted nine successful flights in ASCII-12, and eight flights in ASCII-13. WCR profiles from these flights are combined with those from seven other flights, which followed the same geographically-fixed pattern in 2008-09 (pre-ASCII) over the Medicine Bow range. All sampled storms were relatively shallow, with low-level air forced over the target mountain, and cold enough to support ice initiation by silver iodide (AgI) nuclei in cloud. Three detailed case studies are conducted, each with different atmospheric conditions and different cloud and snow growth properties: one case (21 Feb 2012) is stratiform, with strong winds and cloud droplets too small to enable snow growth by accretion (riming). A second case (13 Feb 2012) contains shallow convective cells. Clouds in the third case study (22 Feb 2012) are stratiform but contain numerous large droplets (mode ~35 microm in diameter), large enough for ice particle growth by riming. These cases and all others, each with a treated period following an untreated period, show that a clear seeding signature is not immediately apparent

  4. Repositioning Strategy for Malaysian Companies Internationalization

    Directory of Open Access Journals (Sweden)

    Ismi Rajiani

    2013-05-01

    Full Text Available 1024x768 The rise of the emerging-market countries offers both developing and developed countries a unique opportunity to gain the benefits of a truly international economy. Consequently, it is imperative to advance our knowledge of emerging-market countries MNC emergence and competitiveness including Malaysian firms on how will they position their products strategically? Based on the framework of Porter’s Generic Strategy this paper is composed of price/ volume segments and impacts on product strategy theory. The aim is to identify crucial triggering cues and focus areas for Malaysian companies and measure what role these play in different segments. This study argues that some Malaysian companies will reposition themselves strategically when internationalizing and that they will focus on other factors or triggering cues when doing so not merely adapting the prevalent price leadership strategy. Normal 0 false false false IN X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}

  5. FOREWORD: Focus on Advanced Ceramics Focus on Advanced Ceramics

    Science.gov (United States)

    Ohashi, Naoki

    2011-06-01

    Much research has been devoted recently to developing technologies for renewable energy and improving the efficiency of the processes and devices used in industry and everyday life. Efficient solutions have been found using novel materials such as platinum and palladium-based catalysts for car exhaust systems, samarium-cobalt and neodymium-iron-boron permanent magnets for electrical motors, and so on. However, their realization has resulted in an increasing demand for rare elements and in their deficit, the development of new materials based on more abundant elements and new functionalities of traditional materials. Moreover, increasing environmental and health concerns demand substitution of toxic or hazardous substances with nature-friendly alternatives. In this context, this focus issue on advanced ceramics aims to review current trends in ceramics science and technology. It is related to the International Conference on Science and Technology of Advanced Ceramics (STAC) held annually to discuss the emerging issues in the field of ceramics. An important direction of ceramic science is the collaboration between experimental and theoretical sciences. Recent developments in density functional theory and computer technology have enabled the prediction of physical and chemical properties of ceramics, thereby assisting the design of new materials. Therefore, this focus issue includes articles devoted to theory and advanced characterization techniques. As mentioned above, the potential shortage of rare elements is becoming critical to the industry and has resulted in a Japanese government initiative called the 'Ubiquitous Element Strategy'. This focus issue also includes articles related to this strategy and to the associated topics of energy conversion, such as phosphors for high-efficiency lighting and photocatalysts for solar-energy harvesting. We hope that this focus issue will provide a timely overview of current trends and problems in ceramics science and

  6. 醫師資訊需求與資訊尋求行為之探討 | An Investigation of Information Needs and Information Seeking Behavior of the Physicians at Kaohsiung Veterans General Hospital

    Directory of Open Access Journals (Sweden)

    侯海珠 Hai-Chu Hou

    2002-10-01

    Full Text Available

    頁次:81-93

        ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;">本研究之目的在探討醫師的資訊需求與資訊尋求行為,以了解醫師的資訊需求動機與類別、資訊尋求途徑、醫師在找尋資訊的過程中面臨之困難及解決途徑,以及不同專科醫師的資訊需求與資訊尋求行為是否有所不同。本研究以質化研究為取向,主要採用深度訪談法,輔以參與觀察和相關文件資料來進行資料蒐集。研究對象為高雄榮民總醫院內外科醫師,於民國九十年七月至九十一年一月間採立意的配額取樣,針對三十二位專科醫師進行深入訪談。其後將資料予以歸納分析、編碼與詮釋,最後作結果呈現。

        ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;">研究結果歸納如下:Finding focus: a study of the historical development of focus in English

    NARCIS (Netherlands)

    Komen, E.R.

    2013-01-01

    This study reveals how two important focus articulations change over time in written English. Constituent focus, often accompanied by contrast, makes use of the clause-initial position in the oldest stages of English, but as this position comes to be used for the grammatical subject over time, the

  7. EPA Region 7 Aquatic Focus Areas (ECO_RES.R7_AQUATIC_FOCUS_AREAS)

    Data.gov (United States)

    U.S. Environmental Protection Agency — This shapefile consists of 347 individual Aquatic Ecological System (AES) polygons that are the Aquatic Conservation Focus Areas for EPA Region 7. The focus areas...

  8. Deep-Focusing Time-Distance Helioseismology

    Science.gov (United States)

    Duvall, T. L., Jr.; Jensen, J. M.; Kosovichev, A. G.; Birch, A. C.; Fisher, Richard R. (Technical Monitor)

    2001-01-01

    Much progress has been made by measuring the travel times of solar acoustic waves from a central surface location to points at equal arc distance away. Depth information is obtained from the range of arc distances examined, with the larger distances revealing the deeper layers. This method we will call surface-focusing, as the common point, or focus, is at the surface. To obtain a clearer picture of the subsurface region, it would, no doubt, be better to focus on points below the surface. Our first attempt to do this used the ray theory to pick surface location pairs that would focus on a particular subsurface point. This is not the ideal procedure, as Born approximation kernels suggest that this focus should have zero sensitivity to sound speed inhomogeneities. However, the sensitivity is concentrated below the surface in a much better way than the old surface-focusing method, and so we expect the deep-focusing method to be more sensitive. A large sunspot group was studied by both methods. Inversions based on both methods will be compared.

  9. An information hiding method based on LSB and tent chaotic map

    Science.gov (United States)

    Song, Jianhua; Ding, Qun

    2011-06-01

    In order to protect information security more effectively, a novel information hiding method based on LSB and Tent chaotic map was proposed, first the secret message is Tent chaotic encrypted, and then LSB steganography is executed for the encrypted message in the cover-image. Compared to the traditional image information hiding method, the simulation results indicate that the method greatly improved in imperceptibility and security, and acquired good results.

  10. Image Steganograpfhy Tailored to Objects Contours

    Directory of Open Access Journals (Sweden)

    Ovidiu COSMA

    2017-12-01

    Full Text Available This article proposes a steganography method that uses all three components of an image in the RGB color space to store secret data. The order in which the image pixels are processed is not given by their position within the image, but by their visual significance. In order to ensure the greatest possible embedding capacity, the image container is traversed in several passes, each expanding its capacity.

  11. Towards an Augmented Authenticator in the Cloud

    OpenAIRE

    PITROPAKIS Nikolaos; YFANTOPOULOS Nikolaos; LAMBRINOUDAKIS Costas; GENEIATAKIS DIMITRIOS

    2014-01-01

    Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive information. Meanwhile, there are several approaches applying security and privacy protection measures on cloud-based databases. Simultaneously, many steganographic algorithms have been proposed for achieving security on Cloud Infrastructures. This paper proposes a practical method for applying steganography in an one-time aut...

  12. The public works in 17thCastile: an onerous and unknown tax

    Directory of Open Access Journals (Sweden)

    Francisco Javier VELA SANTAMARÍA

    2011-07-01

    Full Text Available Normal 0 21 false false false ES X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi; mso-fareast-language:EN-US;} The studies of the public works in Golden Age Spain were focused on its technical and artistic aspects, but not on its economic consequences. But the urban infrastructure maintenance and the building of bridges, what required frequently the contribution of thousand of places, were expensive. Its financing, what needed the authorization of Council of Castile, increased the oppressive taxation of the 17th century, and its management had its same nature of privatization, lack of control and fraud.

  13. Prosodic Focus Marking in Bai.

    NARCIS (Netherlands)

    Liu, Zenghui; Chen, A.; Van de Velde, Hans

    2014-01-01

    This study investigates prosodic marking of focus in Bai, a Sino-Tibetan language spoken in the Southwest of China, by adopting a semi-spontaneous experimental approach. Our data show that Bai speakers increase the duration of the focused constituent and reduce the duration of the post-focus

  14. Optical fiber plasmonic lens for near-field focusing fabricated through focused ion beam

    Science.gov (United States)

    Sloyan, Karen; Melkonyan, Henrik; Moreira, Paulo; Dahlem, Marcus S.

    2017-02-01

    We report on numerical simulations and fabrication of an optical fiber plasmonic lens for near-field focusing applications. The plasmonic lens consists of an Archimedean spiral structure etched through a 100 nm-thick Au layer on the tip of a single-mode SM600 optical fiber operating at a wavelength of 632:8 nm. Three-dimensional finite-difference time-domain computations show that the relative electric field intensity of the focused spot increases 2:1 times when the number of turns increases from 2 to 12. Furthermore, a reduction of the intensity is observed when the initial inner radius is increased. The optimized plasmonic lens focuses light into a spot with a full-width at half-maximum of 182 nm, beyond the diffraction limit. The lens was fabricated by focused ion beam milling, with a 200nm slit width.

  15. VizieR Online Data Catalog: FADO code (Gomes+, 2017)

    Science.gov (United States)

    Gomes, J. M.; Papaderos, P.

    2017-03-01

    FADO comes from the Latin word "fatum" that means fate or destiny. It is also a well known genre of Portuguese music, and by choosing this acronym for this spectral synthesis tool we would like to pay tribute to Portugal. The main goal of FADO is to explore the star-formation and chemical enrichment history (the "Fado") of galaxies based on two hitherto unique elements in spectral fitting models: a) self-consistency between the best-fitting star formation history (SFH) and the nebular characteristics of a galaxy (e.g., hydrogen Balmer-line luminosities and equivalent widths; shape of the nebular continuum, including the Balmer and Paschen discontinuity) and b) genetic optimization and artificial intelligence algorithms. This document is part of the FADO v.1 distribution package, which contains two different ascii files, ReadMe and Read_F, and one tarball archive FADOv1.tar.gz. FADOv1.tar.gz contains the binary (executable) compiled in both OpenSuSE 13.2 64bit LINUX (FADO) and MAC OS X (FADO_MACOSX). The former is compatible with most LINUX distributions, while the latter was only tested for Yosemite 10.10.3. It contains the configuration files for running FADO: FADO.config and PLOT.config, as well as the "Simple Stellar Population" (SSP) base library with the base file list Base.BC03.L, the FADO v.1 short manual Read_F and this file (in the ReadMe directory) and, for testing purposes, three characteristic de-redshifted spectra from SDSS-DR7 in ascii format, corresponding to a star-forming (spec1.txt), composite (spec2.txt) and LINER (spec3.txt) galaxy. Auxiliary files needed for execution of FADO (.HIfboundem.ascii, .HeIIfbound.ascii, .HeIfboundem.ascii, grfont.dat and grfont.txt) are also included in the tarball. By decompressing the tarball the following six directories are created: input, output, plots, ReadMe, SSPs and tables (see below for a brief explanation). (2 data files).

  16. Unitary embedding for data hiding with the SVD

    Science.gov (United States)

    Bergman, Clifford; Davidson, Jennifer

    2005-03-01

    Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. Most current steganography algorithms insert data in the spatial or transform domains; common transforms include the discrete cosine transform, the discrete Fourier transform, and discrete wavelet transform. In this paper, we present a data-hiding algorithm that exploits a decomposition representation of the data instead of a frequency-based transformation of the data. The decomposition transform used is the singular value decomposition (SVD). The SVD of a matrix A is a decomposition A= USV' in which S is a nonnegative diagonal matrix and U and V are orthogonal matrices. We show how to use the orthogonal matrices in the SVD as a vessel in which to embed information. Several challenges were presented in order to accomplish this, and we give effective information-hiding using the SVD can be just as effective as using transform-based techniques. Furthermore, different problems arise when using the SVD than using a transform-based technique. We have applied the SVD to image data, but the technique can be formulated for other data types such as audio and video.

  17. Aplikasi Steganografi Menggunakan LSB 4 Bit Sisipan dengan Kombinasi Algoritme Substitusi dan Vigenere Berbasis Android

    Directory of Open Access Journals (Sweden)

    Priyagung Hernawandra

    2018-03-01

    Full Text Available This study aims to implement steganography with 4 bit LSB method combined with Vigenere and substitution encryption algorithms. This combination strengthens the security of text messages that are inserted into the image because the message is already a ciphertext as the result of the Vigenere and substitution encryption process. This steganography is realized as an application that runs on Android devices. This application can insert text messages that contain space characters and a combination of uppercase letters in a digital image. Using this application, insertion of messages into images causes the increase of images size by an average of 12.77% of the original size from 10 sample images. Penelitian ini bertujuan untuk mengaplikasikan steganografi dengan metode LSB 4 bit penyisipan yang digabungkan dengan algoritme enkripsi Vigenere dan substitusi. Penggunaan algoritme enkripsi ini memperkuat keamanan pesan teks yang disisipkan ke gambar karena pesan tersebut sudah berupa ciphertext hasil dari proses enkripsi dengan Vigenere dan substitusi. Pesan yang berisi karakter spasi dan kombinasi huruf besar kecil juga dapat disisipkan dalam citra digital. Steganografi ini diwujudkan sebagai aplikasi yang berjalan di devais Android. Dengan menggunakan aplikasi ini, penyisipan pesan dengan metode LSB 4 bit sisipan ke gambar menyebabkan penambahan besar gambar rata-rata 12,77% dari besar aslinya untuk 10 gambar uji.

  18. Hill Cipher and Least Significant Bit for Image Messaging Security

    Directory of Open Access Journals (Sweden)

    Muhammad Husnul Arif

    2016-02-01

    Full Text Available Exchange of information through cyberspace has many benefits as an example fast estimated time, unlimited physical distance and space limits, etc. But in these activities can also pose a security risk for confidential information. It is necessary for the safety that can be used to protect data transmitted through the Internet. Encryption algorithm that used to encrypt message to be sent (plaintext into messages that have been randomized (ciphertext is cryptography and steganography algorithms. In application of cryptographic techniques that will be used is Hill Cipher. The technique is combined with steganography techniques Least Significant Bit. The result of merging techniques can maintain the confidentiality of messages because people who do not know the secret key used will be difficult to get the message contained in the stego-image and the image that has been inserted can not be used as a cover image. Message successfully inserted and extracted back on all samples with a good image formats * .bmp, * .png , * .jpg at a resolution of 512 x 512 pixels , 256 x 256 pixels. MSE and PSNR results are not influenced file format or file size, but influenced by dimensions of image. The larger dimensions of the image, then the smaller MSE that means error of image gets smaller.

  19. HIDING TEXT IN DIGITAL IMAGES USING PERMUTATION ORDERING AND COMPACT KEY BASED DICTIONARY

    Directory of Open Access Journals (Sweden)

    Nagalinga Rajan

    2017-05-01

    Full Text Available Digital image steganography is an emerging technique in secure communication for the modern connected world. It protects the content of the message without arousing suspicion in a passive observer. A novel steganography method is presented to hide text in digital images. A compact dictionary is designed to efficiently communicate all types of secret messages. The sorting order of pixels in image blocks are chosen as the carrier of embedded information. The high correlation in image pixel values means reordering within image blocks do not cause high distortion. The image is divided into blocks and perturbed to create non repeating sequences of intensity values. These values are then sorted according to the message. At the receiver end, the message is read from the sorting order of the pixels in image blocks. Only those image blocks with standard deviation lesser than a given threshold are chosen for embedding to alleviate visual distortion. Information Security is provided by shuffling the dictionary according to a shared key. Experimental Results and Analysis show that the method is capable of hiding text with more than 4000 words in a 512×512 grayscale image with a peak signal to noise ratio above 40 decibels.

  1. Numerical experimentation on focusing time and neutron yield in GN1 plasma focus machine

    International Nuclear Information System (INIS)

    Singh, Arwinder; Lee, Sing; Saw, S.H.

    2014-01-01

    In this paper, we have shown how we have fitted Lee's six phase model code to analyze the current waveform of the GN1 plasma focus machine working in deuterium gas. The Lee's 6-phase model codes was later configured to work between 0.5 to 6 Torr and the results of both focusing time and neutron yield was then compared with the published experimental results. The final results indicate that Lee's code, gives realistic plasma dynamics and focus properties together with a realistic neutron yield for GN1 plasma focus, without the need of any adjustable parameters, needing only to fit the computed current trace to a measured current trace. (author)

  2. Space Focus Lead Report

    Energy Technology Data Exchange (ETDEWEB)

    Reeves, Geoffrey D. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-08-10

    The Space Focus team is tasked with the definition of the Space Focused Science Topics, and with the review and ranking of the CSES proposals received in all the program areas. This is achieved by dedicated meetings or a series of informal discussions and/or e-mail reviews.

  3. Plutonium focus area: Technology summary

    International Nuclear Information System (INIS)

    1996-03-01

    To ensure research and development programs focus on the most pressing environmental restoration and waste management problems at the U.S. Department of Energy (DOE), the Assistant Secretary for the Office of Environmental Management (EM) established a working group in August 1993 to implement a new approach to research and technology development. As part of this approach, EM developed a management structure and principles that led to creation of specific focus areas. These organizations were designed to focus scientific and technical talent throughout DOE and the national scientific community on major environmental restoration and waste management problems facing DOE. The focus area approach provides the framework for inter-site cooperation and leveraging of resources on common problems. After the original establishment of five major focus areas within the Office of Technology Development (EM-50), the Nuclear Materials Stabilization Task Group (NMSTG, EM-66) followed EM-50's structure and chartered the Plutonium Focus Area (PFA). NMSTG's charter to the PFA, described in detail later in this book, plays a major role in meeting the EM-66 commitments to the Defense Nuclear Facilities Safety Board (DNFSB). The PFA is a new program for FY96 and as such, the primary focus of revision 0 of this Technology Summary is an introduction to the Focus Area; its history, development, and management structure, including summaries of selected technologies being developed. Revision 1 to the Plutonium Focus Area Technology Summary is slated to include details on all technologies being developed, and is currently planned for release in August 1996. The following report outlines the scope and mission of the Office of Environmental Management, EM-60, and EM-66 organizations as related to the PFA organizational structure

  4. Regulatory focus affects physician risk tolerance.

    Science.gov (United States)

    Veazie, Peter J; McIntosh, Scott; Chapman, Benjamin P; Dolan, James G

    2014-01-01

    Risk tolerance is a source of variation in physician decision-making. This variation, if independent of clinical concerns, can result in mistaken utilization of health services. To address such problems, it will be helpful to identify nonclinical factors of risk tolerance, particularly those amendable to intervention-regulatory focus theory suggests such a factor. This study tested whether regulatory focus affects risk tolerance among primary care physicians. Twenty-seven primary care physicians were assigned to promotion-focused or prevention-focused manipulations and compared on the Risk Taking Attitudes in Medical Decision Making scale using a randomization test. Results provide evidence that physicians assigned to the promotion-focus manipulation adopted an attitude of greater risk tolerance than the physicians assigned to the prevention-focused manipulation (p = 0.01). The Cohen's d statistic was conventionally large at 0.92. Results imply that situational regulatory focus in primary care physicians affects risk tolerance and may thereby be a nonclinical source of practice variation. Results also provide marginal evidence that chronic regulatory focus is associated with risk tolerance (p = 0.05), but the mechanism remains unclear. Research and intervention targeting physician risk tolerance may benefit by considering situational regulatory focus as an explanatory factor.

  5. Biometric feature embedding using robust steganography technique

    Science.gov (United States)

    Rashid, Rasber D.; Sellahewa, Harin; Jassim, Sabah A.

    2013-05-01

    This paper is concerned with robust steganographic techniques to hide and communicate biometric data in mobile media objects like images, over open networks. More specifically, the aim is to embed binarised features extracted using discrete wavelet transforms and local binary patterns of face images as a secret message in an image. The need for such techniques can arise in law enforcement, forensics, counter terrorism, internet/mobile banking and border control. What differentiates this problem from normal information hiding techniques is the added requirement that there should be minimal effect on face recognition accuracy. We propose an LSB-Witness embedding technique in which the secret message is already present in the LSB plane but instead of changing the cover image LSB values, the second LSB plane will be changed to stand as a witness/informer to the receiver during message recovery. Although this approach may affect the stego quality, it is eliminating the weakness of traditional LSB schemes that is exploited by steganalysis techniques for LSB, such as PoV and RS steganalysis, to detect the existence of secrete message. Experimental results show that the proposed method is robust against PoV and RS attacks compared to other variants of LSB. We also discussed variants of this approach and determine capacity requirements for embedding face biometric feature vectors while maintain accuracy of face recognition.

  6. 臺灣人文學引用文獻資料庫之建置 | The Construction of Taiwan Humanities Citation Index

    Directory of Open Access Journals (Sweden)

    陳光華、陳雅琦 Kuang-Hua Chen、Ya-Chi Chen

    2001-04-01

    Full Text Available

    頁次:51-77

    ascii-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">本研究主要為建立「臺灣人文學引用文獻資料庫ascii-theme-font: minor-fareast; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">」ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast;">(THCIascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast;">)ascii-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">,資料庫收錄之期刊共計314ascii-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">種,本期計畫先以民國87

  7. Kinetics of cesium lead halide perovskite nanoparticle growth; focusing and de-focusing of size distribution

    Science.gov (United States)

    Koolyk, Miriam; Amgar, Daniel; Aharon, Sigalit; Etgar, Lioz

    2016-03-01

    In this work we study the kinetics of cesium lead halide perovskite nanoparticle (NP) growth; the focusing and de-focusing of the NP size distribution. Cesium lead halide perovskite NPs are considered to be attractive materials for optoelectronic applications. Understanding the kinetics of the formation of these all-inorganic perovskite NPs is critical for reproducibly and reliably generating large amounts of uniformly sized NPs. Here we investigate different growth durations for CsPbI3 and CsPbBr3 NPs, tracking their growth by high-resolution transmission electron microscopy and size distribution analysis. As a result, we are able to provide a detailed model for the kinetics of their growth. It was observed that the CsPbI3 NPs exhibit focusing of the size distribution in the first 20 seconds of growth, followed by de-focusing over longer growth durations, while the CsPbBr3 NPs show de-focusing of the size distribution starting from the beginning of the growth. The monomer concentration is depleted faster in the case of CsPbBr3 than in the case of CsPbI3, due to faster diffusion of the monomers, which increases the critical radius and results in de-focusing of the population. Accordingly, focusing is not observed within 40 seconds of growth in the case of CsPbBr3. This study provides important knowledge on how to achieve a narrow size distribution of cesium lead halide perovskite NPs when generating large amounts of these promising, highly luminescent NPs.In this work we study the kinetics of cesium lead halide perovskite nanoparticle (NP) growth; the focusing and de-focusing of the NP size distribution. Cesium lead halide perovskite NPs are considered to be attractive materials for optoelectronic applications. Understanding the kinetics of the formation of these all-inorganic perovskite NPs is critical for reproducibly and reliably generating large amounts of uniformly sized NPs. Here we investigate different growth durations for CsPbI3 and CsPbBr3 NPs, tracking

  8. Self-focused and other-focused resiliency: Plausible mechanisms linking early family adversity to health problems in college women.

    Science.gov (United States)

    Coleman, Sulamunn R M; Zawadzki, Matthew J; Heron, Kristin E; Vartanian, Lenny R; Smyth, Joshua M

    2016-01-01

    This study examined whether self-focused and other-focused resiliency help explain how early family adversity relates to perceived stress, subjective health, and health behaviors in college women. Female students (N = 795) participated between October 2009 and May 2010. Participants completed self-report measures of early family adversity, self-focused (self-esteem, personal growth initiative) and other-focused (perceived social support, gratitude) resiliency, stress, subjective health, and health behaviors. Using structural equation modeling, self-focused resiliency associated with less stress, better subjective health, more sleep, less smoking, and less weekend alcohol consumption. Other-focused resiliency associated with more exercise, greater stress, and more weekend alcohol consumption. Early family adversity was indirectly related to all health outcomes, except smoking, via self-focused and other-focused resiliency. Self-focused and other-focused resiliency represent plausible mechanisms through which early family adversity relates to stress and health in college women. This highlights areas for future research in disease prevention and management.

  9. Thermal self-focusing at oblique incidence

    International Nuclear Information System (INIS)

    Craxton, R.S.; McCrory, R.L.

    1984-03-01

    Thermal self-focusing at oblique incidence has been investigated in two-dimensional line-focus geometry using the Eulerian hydrodynamics simulation code SAGE. The laser beam interacts with a long-scale-length preformed plasma with an expontial density profiele. Questions to be addressed include: (1) What happens when a self-focusing channel reaches the turning point of the incident rays, and (2) Does the unabsorbed light return in the specular direction or back along the channel. A comparison is also made between thermal self-focusing at normal incidence in cylindrical and line-focus geometries: in cylindrical geometry the self-focusing mechanism is enhanced by the relative ease with which plasma may be expelled from a small cylindrical channel

  10. Verum focus and polar questions

    Directory of Open Access Journals (Sweden)

    Ion Giurgea

    2012-11-01

    Full Text Available We argue that some word order phenomena in Romanian and Sardinian are the result of a checking operation in the left periphery involving verum focus (i.e. focus on the polarity component of the sentence. In particular, this operation accounts for some word order patterns found in polar questions. In Romanian, polarity fronting is realized as head-movement of (V+T to a higher peripheral head which bears a Focus-probe. This licenses VS orders for predications in which VS is not allowed as a neutral order (i-level predicates, iteratives, generics. In Sardinian, an entire phrase headed by the lexical predicate (verbal non-finite form or non-verbal predicate is fronted before the auxiliary. We argue that this order is obtained by two movement operations, head-raising of Aux to Foc and movement of the predicate phrase to SpecFoc. We also present the semantics of polarity focus, distinguishing several types of focus (informational, emphatic, contrastive.

  11. Ion Motion in the Adiabatic Focuser

    International Nuclear Information System (INIS)

    Henestroza, E.; Sessler, A.M.; Yu, S.S.

    2006-01-01

    In this paper we numerically study the effect of ion motion in an adiabatic focuser, motivated by a recent suggestion that ion motion in an adiabatic focuser might be significant and even preclude operation of the focuser as previously envisioned. It is shown that despite ion motion the adiabatic focuser should work as well as originally envisioned

  12. Focusing liquid microjets with nozzles

    International Nuclear Information System (INIS)

    Acero, A J; Ferrera, C; Montanero, J M; Gañán-Calvo, A M

    2012-01-01

    The stability of flow focusing taking place in a converging–diverging nozzle, as well as the size of the resulting microjets, is examined experimentally in this paper. The results obtained in most aspects of the problem are similar to those of the classical plate-orifice configuration. There is, however, a notable difference between flow focusing in nozzles and in the plate-orifice configuration. In the former case, the liquid meniscus oscillates laterally (global whipping) for a significant area of the control parameter plane, a phenomenon never observed when focusing with the plate-orifice configuration. Global whipping may constitute an important drawback of flow focusing with nozzles because it reduces the robustness of the technique. (paper)

  13. Regulatory focus and generalized trust: the impact of prevention-focused self-regulation on trusting others.

    Science.gov (United States)

    Keller, Johannes; Mayo, Ruth; Greifeneder, Rainer; Pfattheicher, Stefan

    2015-01-01

    The current research suggests that taking self-regulatory mechanisms into account provides insights regarding individuals' responses to threats in social interactions. In general, based on the notion that a prevention-focused orientation of self-regulation is associated with a need for security and a vigilant tendency to avoid losses and other types of negative events we advocate that a prevention-focused orientation, both as a disposition as well as a situationally induced state, lowers generalized trust, thus hindering cooperation within social interactions that entail threats. Specifically, we found that the more individuals' habitual self-regulatory orientation is dominated by a prevention focus, the less likely they are to score high on a self-report measure of generalized trust (Study 1), and to express trust in a trust game paradigm as manifested in lower sums of transferred money (Studies 2 and 3). Similar findings were found when prevention focus was situationally manipulated (Study 4). Finally, one possible factor underlying the impact of prevention-focused self-regulation on generalized trust was demonstrated as individuals with a special sensitivity to negative information were significantly affected by a subtle prevention focus manipulation (versus control condition) in that they reacted with reduced trust in the trust game (Study 5). In sum, the current findings document the crucial relevance of self-regulatory orientations as conceptualized in regulatory focus theory regarding generalized trust and responses to threats within a social interaction. The theoretical and applied implications of the findings are discussed.

  14. Regulatory Focus and Generalized Trust: The Impact of Prevention-focused Self-regulation on Trusting Others

    Directory of Open Access Journals (Sweden)

    Johannes eKeller

    2015-03-01

    Full Text Available The current research suggests that taking self-regulatory mechanisms into account provides insights regarding individuals’ responses to threats in social interactions. In general, based on the notion that a prevention-focused orientation of self-regulation is associated with a need for security and a vigilant tendency to avoid losses and other types of negative events we advocate that a prevention-focused orientation, both as a disposition as well as a situationally induced state, lowers generalized trust, thus hindering cooperation within social interactions that entail threats. Specifically, we found that the more individuals’ habitual self-regulatory orientation is dominated by a prevention focus, the less likely they are to score high on a self-report measure of generalized trust (Study 1, and to express trust in a trust game paradigm as manifested in lower sums of transferred money (Studies 2 and 3. Similar findings were found when prevention focus was situationally manipulated (Study 4. Finally, one possible factor underlying the impact of prevention-focused self-regulation on generalized trust was demonstrated as individuals with a special sensitivity to negative information were significantly affected by a subtle prevention focus manipulation (vs. control condition in that they reacted with reduced trust in the trust game (Study 5. In sum, the current findings document the crucial relevance of self-regulatory orientations as conceptualized in regulatory focus theory regarding generalized trust and responses to threats within a social interaction. The theoretical and applied implications of the findings are discussed.

  15. Stay Focused! The Effects of Internal and External Focus of Attention on Movement Automaticity in Patients with Stroke

    Science.gov (United States)

    Kal, E. C.; van der Kamp, J.; Houdijk, H.; Groet, E.; van Bennekom, C. A. M.; Scherder, E. J. A.

    2015-01-01

    Dual-task performance is often impaired after stroke. This may be resolved by enhancing patients’ automaticity of movement. This study sets out to test the constrained action hypothesis, which holds that automaticity of movement is enhanced by triggering an external focus (on movement effects), rather than an internal focus (on movement execution). Thirty-nine individuals with chronic, unilateral stroke performed a one-leg-stepping task with both legs in single- and dual-task conditions. Attentional focus was manipulated with instructions. Motor performance (movement speed), movement automaticity (fluency of movement), and dual-task performance (dual-task costs) were assessed. The effects of focus on movement speed, single- and dual-task movement fluency, and dual-task costs were analysed with generalized estimating equations. Results showed that, overall, single-task performance was unaffected by focus (p = .341). Regarding movement fluency, no main effects of focus were found in single- or dual-task conditions (p’s ≥ .13). However, focus by leg interactions suggested that an external focus reduced movement fluency of the paretic leg compared to an internal focus (single-task conditions: p = .068; dual-task conditions: p = .084). An external focus also tended to result in inferior dual-task performance (β = -2.38, p = .065). Finally, a near-significant interaction (β = 2.36, p = .055) suggested that dual-task performance was more constrained by patients’ attentional capacity in external focus conditions. We conclude that, compared to an internal focus, an external focus did not result in more automated movements in chronic stroke patients. Contrary to expectations, trends were found for enhanced automaticity with an internal focus. These findings might be due to patients’ strong preference to use an internal focus in daily life. Future work needs to establish the more permanent effects of learning with different attentional foci on re-automating motor

  16. Stay Focused! The Effects of Internal and External Focus of Attention on Movement Automaticity in Patients with Stroke.

    Science.gov (United States)

    Kal, E C; van der Kamp, J; Houdijk, H; Groet, E; van Bennekom, C A M; Scherder, E J A

    2015-01-01

    Dual-task performance is often impaired after stroke. This may be resolved by enhancing patients' automaticity of movement. This study sets out to test the constrained action hypothesis, which holds that automaticity of movement is enhanced by triggering an external focus (on movement effects), rather than an internal focus (on movement execution). Thirty-nine individuals with chronic, unilateral stroke performed a one-leg-stepping task with both legs in single- and dual-task conditions. Attentional focus was manipulated with instructions. Motor performance (movement speed), movement automaticity (fluency of movement), and dual-task performance (dual-task costs) were assessed. The effects of focus on movement speed, single- and dual-task movement fluency, and dual-task costs were analysed with generalized estimating equations. Results showed that, overall, single-task performance was unaffected by focus (p = .341). Regarding movement fluency, no main effects of focus were found in single- or dual-task conditions (p's ≥ .13). However, focus by leg interactions suggested that an external focus reduced movement fluency of the paretic leg compared to an internal focus (single-task conditions: p = .068; dual-task conditions: p = .084). An external focus also tended to result in inferior dual-task performance (β = -2.38, p = .065). Finally, a near-significant interaction (β = 2.36, p = .055) suggested that dual-task performance was more constrained by patients' attentional capacity in external focus conditions. We conclude that, compared to an internal focus, an external focus did not result in more automated movements in chronic stroke patients. Contrary to expectations, trends were found for enhanced automaticity with an internal focus. These findings might be due to patients' strong preference to use an internal focus in daily life. Future work needs to establish the more permanent effects of learning with different attentional foci on re-automating motor control

  17. Decontamination & decommissioning focus area

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-08-01

    In January 1994, the US Department of Energy Office of Environmental Management (DOE EM) formally introduced its new approach to managing DOE`s environmental research and technology development activities. The goal of the new approach is to conduct research and development in critical areas of interest to DOE, utilizing the best talent in the Department and in the national science community. To facilitate this solutions-oriented approach, the Office of Science and Technology (EM-50, formerly the Office of Technology Development) formed five Focus AReas to stimulate the required basic research, development, and demonstration efforts to seek new, innovative cleanup methods. In February 1995, EM-50 selected the DOE Morgantown Energy Technology Center (METC) to lead implementation of one of these Focus Areas: the Decontamination and Decommissioning (D & D) Focus Area.

  18. Nonlinear focal shift beyond the geometrical focus in moderately focused acoustic beams.

    Science.gov (United States)

    Camarena, Francisco; Adrián-Martínez, Silvia; Jiménez, Noé; Sánchez-Morcillo, Víctor

    2013-08-01

    The phenomenon of the displacement of the position along the axis of the pressure, intensity, and radiation force maxima of focused acoustic beams under increasing driving voltages (nonlinear focal shift) is studied for the case of a moderately focused beam. The theoretical and experimental results show the existence of this shift along the axis when the initial pressure in the transducer increases until the acoustic field reaches the fully developed nonlinear regime of propagation. Experimental data show that at high amplitudes and for moderate focusing, the position of the on-axis pressure maximum and radiation force maximum can surpass the geometrical focal length. On the contrary, the on-axis pressure minimum approaches the transducer under increasing driving voltages, increasing the distance between the positive and negative peak pressure in the beam. These results are in agreement with numerical KZK model predictions and the existed data of other authors and can be explained according to the effect of self-refraction characteristic of the nonlinear regime of propagation.

  19. A study of plasma focus

    International Nuclear Information System (INIS)

    Hirano, Katsumi; Majima, Kazuo

    1976-01-01

    The behavior of the plasma acceleration between electrodes, the phenomena due to the pinch effect at the top of the electrodes and the neutron emission mechanism were experimentally studied. The plasma focus device was a Mather type coaxial discharge device, and the instruments used for the present purpose were a Rogoski coil, an image converter camera, a scintillation detector and a silver foil activation counter. The results of the present experiment were as follows. Plasma focus was not definitely made under the same condition. When the focus was seen, a dip was observed in the discharge wave form, and the emissions of X-ray and neutrons were detected. The angular anisotropy of neutron emission was observed, and corresponds to a beam target model. The phenomena showing the occurrence of focus were seen, when the current sheet was produced at a delayed time after discharge, and arrived at the muzzle with large velocity. The relation between the number of emitted neutrons and the velocity of the current sheet was obtained, whereas no systematic relation exists between the number of emitted neutrons and the velocity of pinch. When the focus was not observed, no dip was seen in current wave form, and the emissions of X-ray and neutrons were not detected. The reason of no focus was considered. (Kato, T.)

  20. Synthetic focusing in ultrasound modulated tomography

    KAUST Repository

    Kuchment, Peter; Kunyansky, Leonid

    2010-01-01

    Several hybrid tomographic methods utilizing ultrasound modulation have been introduced lately. Success of these methods hinges on the feasibility of focusing ultrasound waves at an arbitrary point of interest. Such focusing, however, is difficult to achieve in practice. We thus propose a way to avoid the use of focused waves through what we call synthetic focusing, i.e. by reconstructing the would-be response to the focused modulation from the measurements corresponding to realistic unfocused waves. Examples of reconstructions from simulated data are provided. This non-technical paper describes only the general concept, while technical details will appear elsewhere. © 2010 American Institute of Mathematical Sciences.

  1. Synthetic focusing in ultrasound modulated tomography

    KAUST Repository

    Kuchment, Peter

    2010-09-01

    Several hybrid tomographic methods utilizing ultrasound modulation have been introduced lately. Success of these methods hinges on the feasibility of focusing ultrasound waves at an arbitrary point of interest. Such focusing, however, is difficult to achieve in practice. We thus propose a way to avoid the use of focused waves through what we call synthetic focusing, i.e. by reconstructing the would-be response to the focused modulation from the measurements corresponding to realistic unfocused waves. Examples of reconstructions from simulated data are provided. This non-technical paper describes only the general concept, while technical details will appear elsewhere. © 2010 American Institute of Mathematical Sciences.

  2. Self-focusing in laser produced spark

    International Nuclear Information System (INIS)

    Bakos, J.S.; Foeldes, I.B.

    1983-05-01

    The self-focusing effect appearing in different phases of development of laser produced breakdown plasma in air is investigated. Self-focusing during the ionization process is demonstrated. Thermal self-focusing was observed in the later stage of the plasma development at moderate light intensities. Plasma development was investigated by forward and side scattering of the laser light in the plasma. A crossed beam experiment gave evidence of the thermal mechanism of self-focusing. (author)

  3. Collective focusing ion accelerator

    International Nuclear Information System (INIS)

    Goldin, F.J.

    1986-01-01

    The principal subject of this dissertation is the trapping confinement of pure electron plasmas in bumpy toroidal magnetic fields, with particular attention given to the trapping procedure and the behavior of the plasma during the final equilibrium. The most important aspects of the equilibrium studied were the qualitative nature of the plasma configuration and motion and its density, distribution and stability. The motivation for this study was that an unneutralized cloud of electrons contained in a toroidal system, sufficiently dense and stable, may serve to electrostatically focus ions (against centrifugal and self space charge forces) in a cyclic ion accelerator. Such an accelerator, known as a Collective Focusing Ion Accelerator (CFIA) could be far smaller than conventional designs (which use external magnetic fields directly to focus the ions) due to the smaller gyro-radium of an electron in a magnetic field of given strength. The electron cloud generally drifted poloidally at a finite radius from the toroidal minor axis. As this would preclude focusing ions with such clouds, damping this motion was investigated. Finite resistance in the normally perfectly conductive vessel wall did this. In further preparation for a working CFIA, additional experiments studied the effect of ions on the stability of the electron cloud

  4. Data Security by Preprocessing the Text with Secret Hiding

    OpenAIRE

    Ajit Singh; Upasana Jauhari

    2012-01-01

    With the advent of the Internet, an open forum, the massive increase in the data travel across networkmake an issue for secure transmission. Cryptography is the term that involves many encryption method to make data secure. But the transmission of the secure data is an intricate task. Steganography here comes with effect of transmission without revealing the secure data. The research paper provide the mechanism which enhance the security of data by using a crypto+stegano combination to increa...

  5. Implementasi Modified LSB (Least Significant Bit) dan Algoritma DES (Data Encryption Standard) Pada Pengamanan Data Text

    OpenAIRE

    Gulo, Hengky P.F.

    2017-01-01

    The development of computer technology can make progress in the exchange of data or information. The exchange of data or information at this time is very fast, so everyone needs data or information. Data security becomes very important, so frequent misuse of data and the security of third-party interference. To resolve the issue of data security is needed, namely with cryptography and steganography techniques. In this study, the cryptographic algorithm used is the DES algorithm...

  6. Meaning-focused vs Form-focused L2 Instruction: Implications for ...

    African Journals Online (AJOL)

    KATEVG

    focus-on-meaning approach to English language instruction) compare with ... L2 use. Proponents of this view are concerned with the question of how this conversion ... processing, it may draw learners' attention to "notice" the form of the target ...

  7. High harmonics focusing undulator

    Energy Technology Data Exchange (ETDEWEB)

    Varfolomeev, A.A.; Hairetdinov, A.H.; Smirnov, A.V.; Khlebnikov, A.S. [Kurchatov Institute, Moscow (Russian Federation)

    1995-12-31

    It was shown in our previous work that there exist a possibility to enhance significantly the {open_quote}natural{close_quote} focusing properties of the hybrid undulator. Here we analyze the actual undulator configurations which could provide such field structure. Numerical simulations using 2D code PANDIRA were carried out and the enhanced focusing properties of the undulator were demonstrated. The obtained results provide the solution for the beam transport in a very long (short wavelength) undulator schemes.

  8. The Individually Focused Interview

    DEFF Research Database (Denmark)

    Clausen, Aksel Skovgaard

    2012-01-01

    relatively “strong” interviewees (interview persons: IPs) with diverse backgrounds; (2) thorough planning of the interview with well-focused themes; and (3) a thorough and repeated introduction to the interview. The omission of audio transcriptions is an obvious solution to the researcher who wants a breadth...... of range of statements stemming from the use of many more interviewees than is often possible. The Individually Focused Interview (TIFI) also provides more time for involvement in the field and further analysis....

  9. Religion, Human Rights and Constitutional-Contract Politics in Malaysia

    Directory of Open Access Journals (Sweden)

    Marzuki Mohamad

    2008-12-01

    Full Text Available Normal 0 false false false EN-MY X-NONE AR-SA MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Abstract: The debate about human rights in Malaysia took a new turn in the early twenty-first century when it started to focus on the issue of religious freedom. The proponents of secular-liberal notion of religious freedom argued that religious and racial harmony would be better achieved if Malaysians of all races and religions enjoy absolute religious freedom, which includes the right to renounce Islam. However, the secular-liberal approach to religious freedom, contrary to the expectation of its proponents, accentuates religious and racial division in Muslim-majority Malaysia.

  10. Thermal self-focusing with multiple beams

    International Nuclear Information System (INIS)

    Craxton, R.S.; McCrory, R.L.

    1986-07-01

    Self-focusing in underdense plasmas in the presence of overlapping beams is of interest for multibeam laser-irradiation systems. The hydrodynamics/ray-tracing simulation code SAGE is used to model thermal self-focusing in two-dimensional line-focus geometry with beams incident obliquely at different angles. The conjecture that multiple overlapping beams may suppress self-focusing is investigated for parameters appropriate to reactor-sized targets; in particular, the dependence upon intensity, scale length and pulse width is examined. While the full problem is three-dimensional, insight may be gained from two-dimensional simulations

  11. Stability of expanded plasma focus

    International Nuclear Information System (INIS)

    Soliman, H.M.

    1994-01-01

    In this study, the stabilization of the expanded plasma focus formed by 4.5 kJ plasma focus device of Mather type by magnetic field is presented. The experimental results of the induced axial magnetic field and electric probe measurements of the expanded plasma focus show that, the plasma consists of three plasmoids, electron temperature measurements off the plasmoids at a point close to the muzzle are 26 eV, 30 eV and 27 eV respectively and the electron densities are 6.6 x 10 14 , 6.1 x 10 14 / cm 3 respectively. The presence of external axial magnetic field (B 2 = 1.6 kg) at the mid distance between the breech and the muzzle has a less effect on the stability of expanded focus and it causes a restriction for the plasma motion. the electron temperature of the three plasmoids are found to increase in that case by 23%, 18.5% respectively. When this axial magnetic field is applied at the muzzle end, it leads to a more stable expanded plasma focus which consists mainly of one plasmoid with electron temperature of 39 eV and density of 3.4 x 10 14 / cm 3 . 5 figs

  12. A new electrophoretic focusing principle: focusing of nonamphoteric weak ionogenic analytes using inverse electromigration dispersion profiles.

    Science.gov (United States)

    Gebauer, Petr; Malá, Zdena; Bocek, Petr

    2010-03-01

    This contribution introduces a new separation principle in CE which offers focusing of weak nonamphoteric ionogenic species and their inherent transport to the detector. The prerequisite condition for application of this principle is the existence of an inverse electromigration dispersion profile, i.e. a profile where pH is decreasing toward the anode or cathode for focusing of anionic or cationic weak analytes, respectively. The theory presented defines the principal conditions under which an analyte is focused on a profile of this type. Since electromigration dispersion profiles are migrating ones, the new principle offers inherent transport of focused analytes into the detection cell. The focusing principle described utilizes a mechanism different from both CZE (where separation is based on the difference in mobilities) and IEF (where separation is based on difference in pI), and hence, offers another separation dimension in CE. The new principle and its theory presented here are supplemented by convincing experiments as their proof.

  13. Magnetic Focusing Horn

    CERN Multimedia

    1974-01-01

    This magnetic focusing horn was used for the AA (antiproton accumulator). Its development was an important step towards using CERN's Super Proton Synchrotron as a proton - antiproton collider. This eventually led to the discovery of the W and Z particles in 1983. Making an antiproton beam took a lot of time and effort. Firstly, protons were accelerated to an energy of 26 GeV in the PS and ejected onto a metal target. From the spray of emerging particles, a magnetic horn picked out 3.6 GeV antiprotons for injection into the AA through a wide-aperture focusing quadrupole magnet. For a million protons hitting the target, just one antiproton was captured, 'cooled' and accumulated. It took 3 days to make a beam of 3 x 10^11 -, three hundred thousand million - antiprotons.

  14. Focus on Delivery

    DEFF Research Database (Denmark)

    Hasman, Kirsten; Barfoed, Anne

    Background: Compared to other Nordic countries, Denmark has a high incidence of anal sphincter injury. Recent studies indicate that a strict focus on prevention of severe perineal trauma has decreased the incidence (1). This has resulted in changed clinical procedures in several Danish labour wards...... (2). It is, however, not clarified which of the multifaceted aspects of preventing perineal injury that might explain the decrease (3). Aims: We hypothesized that the use of structured reflection on a clinical practice by midwives and midwifery students would increase both parts’ knowledge on how...... attended the delivery, facilitated the midwife’s and the student’s structured reflection. Further, the project midwife held daily simulation workshops with midwives and students. Two focus group interviews with students and midwives were conducted and analyzed using content analysis. Results and conclusion...

  15. Verum focus and polar questions

    Directory of Open Access Journals (Sweden)

    Ion Giurgea

    2012-01-01

    Full Text Available We argue that some word order phenomena in Romanian and Sardinian are the result of a checkingoperation in the left periphery involving verum focus (i.e. focus on the polarity component of the sentence.In particular, this operation accounts for some word order patterns found in polar questions. In Romanian,polarity fronting is realized as head-movement of (V+T to a higher peripheral head which bears a Focusprobe.This licenses VS orders for predications in which VS is not allowed as a neutral order (i-levelpredicates, iteratives, generics. In Sardinian, an entire phrase headed by the lexical predicate (verbal nonfiniteform or non-verbal predicate is fronted before the auxiliary. We argue that this order is obtained bytwo movement operations, head-raising of Aux to Foc and movement of the predicate phrase to SpecFoc. Wealso present the semantics of polarity focus, distinguishing several types of focus (informational, emphatic,contrastive.

  16. Optimal Focusing and Scaling Law for Uniform Photo-Polymerization in a Thick Medium Using a Focused UV Laser

    Directory of Open Access Journals (Sweden)

    Jui-Teng Lin

    2014-02-01

    Full Text Available We present a modeling study of photoinitiated polymerization in a thick polymer-absorbing medium using a focused UV laser. Transient profiles of the initiator concentration at various focusing conditions are analyzed to define the polymerization boundary. Furthermore, we demonstrate the optimal focusing conditions that yield more uniform polymerization over a larger volume than the collimated or non-optimal cases. Too much focusing with the focal length f < f* (an optimal focal length yields a fast process; however, it provides a smaller polymerization volume at a given time than in the optimal focusing case. Finally, a scaling law is derived and shows that f* is inverse proportional to the product of the extinction coefficient and the initiator initial concentration. The scaling law provides useful guidance for the prediction of optimal conditions for photoinitiated polymerization under a focused UV laser irradiation. The focusing technique also provides a novel and unique means for obtaining uniform photo-polymerization within a limited irradiation time.

  17. Final focus nomenclature

    International Nuclear Information System (INIS)

    Erickson, R.

    1986-01-01

    The formal names and common names for all devices in the final focus system of the SLC are listed. The formal names consist of a device type designator, microprocessor designator, and a four-digit unit number

  18. On the Semantics of Focus

    Science.gov (United States)

    Kess, Joseph F.

    1975-01-01

    This article discusses the semantics of the notion of focus, insofar as it relates to Filipino languages. The evolution of this notion is reviewed, and an alternative explanation of it is given, stressing the fact that grammar and semantics should be kept separate in a discussion of focus. (CLK)

  19. Final focus systems for linear colliders

    International Nuclear Information System (INIS)

    Erickson, R.A.

    1987-11-01

    The final focus system of a linear collider must perform two primary functions, it must focus the two opposing beams so that their transverse dimensions at the interaction point are small enough to yield acceptable luminosity, and it must steer the beams together to maintain collisions. In addition, the final focus system must transport the outgoing beams to a location where they can be recycled or safely dumped. Elementary optical considerations for linear collider final focus systems are discussed, followed by chromatic aberrations. The design of the final focus system of the SLAC Linear Collider (SLC) is described. Tuning and diagnostics and steering to collision are discussed. Most of the examples illustrating the concepts covered are drawn from the SLC, but the principles and conclusions are said to be generally applicable to other linear collider designs as well. 26 refs., 17 figs

  20. Final focus nomenclature

    Energy Technology Data Exchange (ETDEWEB)

    Erickson, R.

    1986-08-08

    The formal names and common names for all devices in the final focus system of the SLC are listed. The formal names consist of a device type designator, microprocessor designator, and a four-digit unit number. (LEW)

  1. Compact electron beam focusing column

    Science.gov (United States)

    Persaud, Arun; Leung, Ka-Ngo; Reijonen, Jani

    2001-12-01

    A novel design for an electron beam focusing column has been developed at LBNL. The design is based on a low-energy spread multicusp plasma source which is used as a cathode for electron beam production. The focusing column is 10 mm in length. The electron beam is focused by means of electrostatic fields. The column is designed for a maximum voltage of 50 kV. Simulations of the electron trajectories have been performed by using the 2D simulation code IGUN and EGUN. The electron temperature has also been incorporated into the simulations. The electron beam simulations, column design and fabrication will be discussed in this presentation.

  2. 談全國技專校院圖書館館際合作之執行現況 | Current Interlibrary Loan Study for the Technological and Vocational Education Libraries

    Directory of Open Access Journals (Sweden)

    楊智晶 Chih-Ching Emily Yang

    1999-04-01

    Full Text Available

    頁次:101-111

    ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman';">由於在這資訊爆炸的時代裹,任何一座圖書館單憑其有限的人力、館藏,已無法完全滿足讀者求知的需求。尤其是技專校院圖書館的經費有限,只有透過各校圖書館彼此之間的合作,才能彌補各校經費短缺之困境,運用有效資源,讓各校圖書資訊的運用,達到最高效果。

        ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman';">全國技專校院的圖書館,目前依接教育部支持的「全國技專校院圖書館館際合作計畫」正邁開大步於87ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman';">年12ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman';">月lascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman

  3. Regulatory focus in groupt contexts

    NARCIS (Netherlands)

    Faddegon, Krispijn Johannes

    2009-01-01

    The thesis examines the influence of group processes on the regulatory focus of individual group members. It is demonstrated that the group situation can affect group members' regulatory focus both in a top-down fashion (via the identitiy of the group) and in a bottom-up fashion (emerging from the

  4. An adiabatic focuser

    International Nuclear Information System (INIS)

    Chen, P.; Oide, K.; Sessler, A.M.; Yu, S.S.

    1989-08-01

    Theoretical analysis is made of an intense relativistic electron beam, such as would be available from a linear collider, moving through a plasma of increasing density, but density always less than that of the beam (underdense). In this situation, the plasma electrons are expelled from the beam channel and the electrons are subject to an ever-increasing focusing force provided by the channel ions. Analysis is made on the beam radiation energy loss in the classical, the transition, and the quantum regimes. It is shown that the focuser is insensitive to the beam energy spread behaviors in the nonclassical regimes, the radiation limit on lenses (the Oide limit) can be exceeded. The sensitivity of the system to the topic mismatch and the nonlinearity is also analyzed. Examples are given with SLC-type and TLC-type parameters. 9 refs., 1 tab

  5. CTE's Focus on Continuous Improvement

    Science.gov (United States)

    Foster, John; Kelley, Patricia; Pritz, Sandy; Hodes, Carol

    2011-01-01

    Just one of the ways career and technical education (CTE) is revamping its image is through increased attention to data-driven instructional techniques as a means of improving and focusing instruction on what matters most. Accountability and data have increasingly become a core focus of research, news, and commentary about education in recent…

  6. Three-dimensional light distribution near the focus of a tightly focused beam of few-cycle optical pulses

    International Nuclear Information System (INIS)

    Romallosa, Kristine Marie; Bantang, Johnrob; Saloma, Caesar

    2003-01-01

    Via the Richards-Wolf vector diffraction theory, we analyze the three-dimensional intensity distribution of the focal volume that is produced by a strongly focused 750-nm beam of ultrafast, Gaussian-shaped optical pulses (10 -9 s≥ pulse width τ≥1 fs=10 -15 s). Knowledge of the three-dimensional distribution near focus is essential in determining the diffraction-limited resolution of an optical microscope. The optical spectrum of a short pulse is characterized by side frequencies about the carrier frequency. The effect of spectral broadening on the focused intensity distribution is evaluated via the Linfoot's criteria of fidelity, structural content, and correlation quality and with reference to a 750-nm cw focused beam. Different values are considered for τ and numerical aperture of the focusing lens (0.1≤X NA ≤1.2). At X NA =0.8, rapid deterioration of the focused intensity distribution is observed at τ=1.2 fs. This happens because a 750-nm optical pulse with τ=1.2 fs has an associated coherence length of 359.7 nm which is less than the Nyquist sampling interval of 375 nm that is required to sample 750 nm sinusoid without loss of information. The ill-effects of spectral broadening is weaker in two-photon excitation microscope than in its single-photon counterpart for the same focusing lens and light source

  7. Magnetically focused liquid drop radiator

    Science.gov (United States)

    Botts, Thomas E.; Powell, James R.; Lenard, Roger

    1986-01-01

    A magnetically focused liquid drop radiator for application in rejecting rgy from a spacecraft, characterized by a magnetizable liquid or slurry disposed in operative relationship within the liquid droplet generator and its fluid delivery system, in combination with magnetic means disposed in operative relationship around a liquid droplet collector of the LDR. The magnetic means are effective to focus streams of droplets directed from the generator toward the collector, thereby to assure that essentially all of the droplets are directed into the collector, even though some of the streams may be misdirected as they leave the generator. The magnetic focusing means is also effective to suppress splashing of liquid when the droplets impinge on the collector.

  8. Attentional Focusing Instructions and Force Production

    Directory of Open Access Journals (Sweden)

    David C Marchant

    2011-01-01

    Full Text Available Research progress assessing the role of attentional focusing instructions on skill acquisition and performance has lead researchers to apply this approach to force production tasks. Initial converging evidence indicates that force production tasks are sensitive to verbal instruction; externally focused instructions (onto movement outcomes, or onto the object force is being exerted against are shown to be more beneficial than internally focused instructions (focusing attention onto the movements being executed. These benefits are observed for maximal and accurate force production, as well as the maintenance of force production in prolonged tasks. A range of mechanisms are identified supporting the proposal that an external focus promotes movement efficiency in line with energy and effort conservation. Future research is required to assess how this developing body of work interacts with the broader understanding of psychological and physiological factors implicated in the effective production, maintenance and limitation of maximal or sub-maximal forces.

  9. The Therapeutic Alliance in Schema-Focused Therapy and Transference-Focused Psychotherapy for Borderline Personality Disorder

    Science.gov (United States)

    Spinhoven, Philip; Giesen-Bloo, Josephine; van Dyck, Richard; Kooiman, Kees; Arntz, Arnoud

    2007-01-01

    This study investigated the quality and development of the therapeutic alliance as a mediator of change in schema-focused therapy (SFT) and transference-focused psychotherapy (TFP) for borderline personality disorder. Seventy-eight patients were randomly allocated to 3 years of biweekly SFT or TFP. Scores of both therapists and patients for the…

  10. Direct marketing of parenting programs: comparing a promotion-focused and a prevention-focused strategy.

    Science.gov (United States)

    Salari, Raziye; Backman, Anna

    2017-06-01

    : For parenting programs to achieve a public health impact, it is necessary to develop more effective marketing strategies to increase public awareness of these programs and promote parental participation. In this article, we compared a promotion-focused and a prevention-focused strategy via two studies. : We designed two ads inviting parents to participate in a universal parenting program; one ad focused on the program increasing the likelihood of positive outcomes for children (promotion-focused) and the other on the program reducing the likelihood of negative outcomes (prevention-focused). In study I, the two ads were run online simultaneously. Those who clicked on an ad were directed to a website where they could read about and sign up for the program. In study II, a community sample of 706 parents answered a questionnaire about the ads. : In study I, over 85 days, the prevention ad generated more clicks. There was no difference in the number of pages visited on the website nor in the number of parents who signed up for the program. In study II, parents showed a preference for the promotion ad, perceiving it as more relevant and rating it as more effective in getting them interested in the program. : A prevention strategy may be more effective in drawing public attention, in general. However, a promotion strategy is more likely to reach parents, in particular, and inspire them to consider participating in parenting programs. These strategies should be developed further and tested in both general and clinical populations. © The Author 2016. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  11. Nonverbal communication in the focus-group

    Directory of Open Access Journals (Sweden)

    Alina Simona TECĂU

    2015-12-01

    Full Text Available In the process of analysing the information obtained through focus group qualitative marketing research, a very important source of data is represented by non-verbal communication. Although the literature reveals an abundance of published material that describes how data obtained through focus group should be analysed, one of the least addressed issue is the interpretation of signals from participants: gestures, posture, dynamic and rhythm of speech or even the silence. This Article addresses precisely aspects of non-verbal communication in the focus group's and although not intended to examine in detail the results of a focus group, it shows how some of signals transmitted by participants of such research have been analysed and interpreted.

  12. Microflow Cytometers with Integrated Hydrodynamic Focusing

    Directory of Open Access Journals (Sweden)

    Martin Schmidt

    2013-04-01

    Full Text Available This study demonstrates the suitability of microfluidic structures for high throughput blood cell analysis. The microfluidic chips exploit fully integrated hydrodynamic focusing based on two different concepts: Two-stage cascade focusing and spin focusing (vortex principle. The sample—A suspension of micro particles or blood cells—is injected into a sheath fluid streaming at a substantially higher flow rate, which assures positioning of the particles in the center of the flow channel. Particle velocities of a few m/s are achieved as required for high throughput blood cell analysis. The stability of hydrodynamic particle positioning was evaluated by measuring the pulse heights distributions of fluorescence signals from calibration beads. Quantitative assessment based on coefficient of variation for the fluorescence intensity distributions resulted in a value of about 3% determined for the micro-device exploiting cascade hydrodynamic focusing. For the spin focusing approach similar values were achieved for sample flow rates being 1.5 times lower. Our results indicate that the performances of both variants of hydrodynamic focusing suit for blood cell differentiation and counting. The potential of the micro flow cytometer is demonstrated by detecting immunologically labeled CD3 positive and CD4 positive T-lymphocytes in blood.

  13. Reviewing the Focus: A Summary and Critique of Child-Focused Sexual Abuse Prevention.

    Science.gov (United States)

    Rudolph, Julia; Zimmer-Gembeck, Melanie J

    2016-10-26

    Due to the high incidence, and widespread detrimental health consequences, of child sexual abuse (CSA), effective prevention remains at the forefront of public and mental health research, prevention and intervention agendas. To date much of the focus of prevention has been on school-based education programs designed to teach children skills to evade adult sexual advances, and disclose past or ongoing abuse. Evaluation of sexual abuse prevention programs demonstrate their effectiveness in increasing children's knowledge of CSA concepts and protection skills, but little is known about their effects on children's capacity to prevent abuse. Moreover, concerns persist about the unintended side-effects for young children such as anxiety, worry and wariness of touch. This paper summarizes the recent history of CSA prevention and the critique of child-focused protection programs in order to demonstrate the need to compliment or replace these programs by focusing more on protectors in the children's ecology, specifically parents, in order to create safer environments in which abuse is less likely to occur. © The Author(s) 2016.

  14. Needs of Non Energy-Focused Contractors

    Energy Technology Data Exchange (ETDEWEB)

    Liaukus, C.

    2012-12-01

    To better understand the informational needs of non energy-focused contractors, including what information they need to motivate them to become energy-focused, the BARA team studied the type of information provided by the national programs, trade associations, and manufacturers that were researched for the related technical report: Effective Communication of Energy Efficiency. While that report focused on the delivery method, format, and strategy of the information, this study examines the content being put forward.

  15. Needs of Non-Energy Focused Contractors

    Energy Technology Data Exchange (ETDEWEB)

    Liakus, C. [Building Media and the Building America Retrofit Alliance (BARA), Wilmington, DE (United States)

    2012-12-01

    To better understand the informational needs of non-energy focused contractors, including what information they need to motivate them to become energy-focused, the BARA team studied the type of information provided by the national programs, trade associations, and manufacturers that were researched for the related technical report: Effective Communication of Energy Efficiency. While that report focused on the delivery method, format, and strategy of the information, this study examines the content being put forward.

  16. Analysis and modeling of "focus" in context

    DEFF Research Database (Denmark)

    Hovy, Dirk; Anumanchipalli, Gopala; Parlikar, Alok

    2013-01-01

    This paper uses a crowd-sourced definition of a speech phenomenon we have called focus. Given sentences, text and speech, in isolation and in context, we asked annotators to identify what we term the focus word. We present their consistency in identifying the focused word, when presented with text...... or speech stimuli. We then build models to show how well we predict that focus word from lexical (and higher) level features. Also, using spectral and prosodic information, we show the differences in these focus words when spoken with and without context. Finally, we show how we can improve speech synthesis...

  17. Five focus strategies to organize health care delivery.

    Science.gov (United States)

    Peltokorpi, Antti; Linna, Miika; Malmström, Tomi; Torkki, Paulus; Lillrank, Paul Martin

    2016-01-01

    The focused factory is one of the concepts that decision-makers have adopted for improving health care delivery. However, disorganized definitions of focus have led to findings that cannot be utilized systematically. The purpose of this paper is to discuss strategic options to focus health care operations. First the literature on focus in health care is reviewed revealing conceptual challenges. Second, a definition of focus in terms of demand and requisite variety is defined, and the mechanisms of focus are explicated. A classification of five focus strategies that follow the original idea to reduce variety in products and markets is presented. Finally, the paper examines managerial possibilities linked to the focus strategies. The paper proposes a framework of five customer-oriented focus strategies which aim at reducing variety in different characteristics of care pathways: population; urgency and severity; illnesses and symptoms; care practices and processes; and care outcomes. Empirical research is needed to evaluate the costs and benefits of the five strategies and about system-level effects of focused units on competition and coordination. Focus is an enabling condition that needs to be exploited using specific demand and supply management practices. It is essential to understand how focus mechanisms differ between strategies, and to select focus that fits with organization's strategy and key performance indicators. Compared to previous more resource-oriented approaches, this study provides theoretically solid and practically relevant customer-oriented framework for focusing in health care.

  18. Subsurface contaminants focus area

    International Nuclear Information System (INIS)

    1996-08-01

    The US Department of Enregy (DOE) Subsurface Contaminants Focus Area is developing technologies to address environmental problems associated with hazardous and radioactive contaminants in soil and groundwater that exist throughout the DOE complex, including radionuclides, heavy metals; and dense non-aqueous phase liquids (DNAPLs). More than 5,700 known DOE groundwater plumes have contaminated over 600 billion gallons of water and 200 million cubic meters of soil. Migration of these plumes threatens local and regional water sources, and in some cases has already adversely impacted off-site rsources. In addition, the Subsurface Contaminants Focus Area is responsible for supplying technologies for the remediation of numerous landfills at DOE facilities. These landfills are estimated to contain over 3 million cubic meters of radioactive and hazardous buried Technology developed within this specialty area will provide efective methods to contain contaminant plumes and new or alternative technologies for development of in situ technologies to minimize waste disposal costs and potential worker exposure by treating plumes in place. While addressing contaminant plumes emanating from DOE landfills, the Subsurface Contaminants Focus Area is also working to develop new or alternative technologies for the in situ stabilization, and nonintrusive characterization of these disposal sites

  19. Subsurface contaminants focus area

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-08-01

    The US Department of Enregy (DOE) Subsurface Contaminants Focus Area is developing technologies to address environmental problems associated with hazardous and radioactive contaminants in soil and groundwater that exist throughout the DOE complex, including radionuclides, heavy metals; and dense non-aqueous phase liquids (DNAPLs). More than 5,700 known DOE groundwater plumes have contaminated over 600 billion gallons of water and 200 million cubic meters of soil. Migration of these plumes threatens local and regional water sources, and in some cases has already adversely impacted off-site rsources. In addition, the Subsurface Contaminants Focus Area is responsible for supplying technologies for the remediation of numerous landfills at DOE facilities. These landfills are estimated to contain over 3 million cubic meters of radioactive and hazardous buried Technology developed within this specialty area will provide efective methods to contain contaminant plumes and new or alternative technologies for development of in situ technologies to minimize waste disposal costs and potential worker exposure by treating plumes in place. While addressing contaminant plumes emanating from DOE landfills, the Subsurface Contaminants Focus Area is also working to develop new or alternative technologies for the in situ stabilization, and nonintrusive characterization of these disposal sites.

  20. Material focus

    DEFF Research Database (Denmark)

    Sokoler, Tomas; Vallgårda, Anna K. A.

    2009-01-01

    In this paper we build on the notion of computational composites, which hold a material perspective on computational technology. We argue that a focus on the material aspects of the technology could be a fruitful approach to achieve new expressions and to gain a new view on the technology's role...... in design. We study two of the computer's material properties: computed causality and connectability and through developing two computational composites that utilize these properties we begin to explore their potential expressions....

  1. Self-focusing relativistic electron streams in plasmas

    International Nuclear Information System (INIS)

    Cox, J.L. Jr.

    1975-01-01

    A relativistic electron stream propagating through a dense plasma induces current and charge densities which determine how the stream can self-focus. Magnetic self-focusing is possible because stream-current neutralization, although extensive, is not complete. Electric self-focusing can occur because the stream charge becomes overneutralized when the net current is smaller than a critical value. Under some circumstances, the latter process can cause the stream to focus into a series of electron bunches

  2. Focus On Photoshop Elements Focus on the Fundamentals

    CERN Document Server

    Asch, David

    2011-01-01

    Are you bewildered by the advanced editing options available in Photoshop Elements? Do you want to get the most out of your image without going bleary-eyed in front of a computer screen? This handy guide will explain the ins and outs of using Photoshop Elements, without having to spend hours staring at the screen. Using a fabulous combination of easy-to-follow advice and step-by-step instructions, Focus On Photoshop Elements gives great advice on setting up, storing and sharing your image library and teaches you the basics of RAW image processing and color correction, plus shows you how to edi

  3. Focus groups: a useful tool for curriculum evaluation.

    Science.gov (United States)

    Frasier, P Y; Slatt, L; Kowlowitz, V; Kollisch, D O; Mintzer, M

    1997-01-01

    Focus group interviews have been used extensively in health services program planning, health education, and curriculum planning. However, with the exception of a few reports describing the use of focus groups for a basic science course evaluation and a clerkship's impact on medical students, the potential of focus groups as a tool for curriculum evaluation has not been explored. Focus groups are a valid stand-alone evaluation process, but they are most often used in combination with other quantitative and qualitative methods. Focus groups rely heavily on group interaction, combining elements of individual interviews and participant observation. This article compares the focus group interview with both quantitative and qualitative methods; discusses when to use focus group interviews; outlines a protocol for conducting focus groups, including a comparison of various styles of qualitative data analysis; and offers a case study, in which focus groups evaluated the effectiveness of a pilot preclinical curriculum.

  4. Plasma Focus

    International Nuclear Information System (INIS)

    Bernard, Alain; Jolas, Alain; Garconnet, J.-P.; Mascureau, J. de; Nazet, Christian; Coudeville, Alain; Bekiarian, Andre.

    1977-01-01

    The present report is the edition of the lectures given in a conference on the Focus experiment held at the Centre d'etudes de Limeil, on Oct. 1975. After a survey of the early laboratories one will find the main results obtained in Limeil concerning interferometry, laser scattering, electric and magnetic-measurements, X-ray and neutron emission and also the possible use of explosive current generators instead of capacitor banks at high energy levels. The principal lines of future research are given in the conclusion [fr

  5. Technology of a small plasma focus

    International Nuclear Information System (INIS)

    Lee, S.

    1990-01-01

    This paper reviews plasma focus technology, including the underlying dynamic and energy balance theory, scaling of the neutron yield, cost effectiveness of the design, as well as the main subsystems, e.g., capacitor bank, spark-gap switch and triggering electronics, the plasma focus tube, some simple diagnostics, and a high-voltage charger. It discusses the range of densities and temperatures available with a small plasma focus, and the type of experiments and applications that can be carried out with it. 61 refs, 21 figs

  6. Generalised Category Attack—Improving Histogram-Based Attack on JPEG LSB Embedding

    Science.gov (United States)

    Lee, Kwangsoo; Westfeld, Andreas; Lee, Sangjin

    We present a generalised and improved version of the category attack on LSB steganography in JPEG images with straddled embedding path. It detects more reliably low embedding rates and is also less disturbed by double compressed images. The proposed methods are evaluated on several thousand images. The results are compared to both recent blind and specific attacks for JPEG embedding. The proposed attack permits a more reliable detection, although it is based on first order statistics only. Its simple structure makes it very fast.

  7. Comment on "Cheating prevention in visual cryptography".

    Science.gov (United States)

    Chen, Yu-Chi; Horng, Gwoboa; Tsai, Du-Shiau

    2012-07-01

    Visual cryptography (VC), proposed by Naor and Shamir, has numerous applications, including visual authentication and identification, steganography, and image encryption. In 2006, Horng showed that cheating is possible in VC, where some participants can deceive the remaining participants by forged transparencies. Since then, designing cheating-prevention visual secret-sharing (CPVSS) schemes has been studied by many researchers. In this paper, we cryptanalyze the Hu-Tzeng CPVSS scheme and show that it is not cheating immune. We also outline an improvement that helps to overcome the problem.

  8. IMAGE STEGANOGRAPHY DENGAN METODE LEAST SIGNIFICANT BIT (LSB

    Directory of Open Access Journals (Sweden)

    M. Miftakul Amin

    2014-02-01

    Full Text Available Security in delivering a secret message is an important factor in the spread of information in cyberspace. Protecting that message to be delivered to the party entitled to, should be made a message concealment mechanism. The purpose of this study was to hide a secret text message into digital images in true color 24 bit RGB format. The method used to insert a secret message using the LSB (Least Significant Bit by replacing the last bit or 8th bit in each RGB color component. RGB image file types option considering that messages can be inserted capacity greater than if use a grayscale image, this is because in one pixel can be inserted 3 bits message. Tests provide results that are hidden messages into a digital image does not reduce significantly the quality of the digital image, and the message has been hidden can be extracted again, so that messages can be delivered to the recipient safely.

  9. Improved LSB matching steganography with histogram characters reserved

    Science.gov (United States)

    Chen, Zhihong; Liu, Wenyao

    2008-03-01

    This letter bases on the researches of LSB (least significant bit, i.e. the last bit of a binary pixel value) matching steganographic method and the steganalytic method which aims at histograms of cover images, and proposes a modification to LSB matching. In the LSB matching, if the LSB of the next cover pixel matches the next bit of secret data, do nothing; otherwise, choose to add or subtract one from the cover pixel value at random. In our improved method, a steganographic information table is defined and records the changes which embedded secrete bits introduce in. Through the table, the next LSB which has the same pixel value will be judged to add or subtract one dynamically in order to ensure the histogram's change of cover image is minimized. Therefore, the modified method allows embedding the same payload as the LSB matching but with improved steganographic security and less vulnerability to attacks compared with LSB matching. The experimental results of the new method show that the histograms maintain their attributes, such as peak values and alternative trends, in an acceptable degree and have better performance than LSB matching in the respects of histogram distortion and resistance against existing steganalysis.

  10. Steganography on quantum pixel images using Shannon entropy

    Science.gov (United States)

    Laurel, Carlos Ortega; Dong, Shi-Hai; Cruz-Irisson, M.

    2016-07-01

    This paper presents a steganographical algorithm based on least significant bit (LSB) from the most significant bit information (MSBI) and the equivalence of a bit pixel image to a quantum pixel image, which permits to make the information communicate secretly onto quantum pixel images for its secure transmission through insecure channels. This algorithm offers higher security since it exploits the Shannon entropy for an image.

  11. Self-noise suppression schemes in blind image steganography

    Science.gov (United States)

    Ramkumar, Mahalingam; Akansu, Ali N.

    1999-11-01

    Blind or oblivious data hiding, can be considered as a signaling method where the origin of the signal constellation is not known. The origin however, can be estimated, by means of self-noise suppression techniques. In this paper, we propose such a technique, and present both theoretical and numerical evaluations of its performance in an additive noise scenario. The problem of optimal choice of the parameters of the proposed technique is also explored, and solutions are presented. Though the cover object is assumed to be an image for purposes of illustration, the proposed method is equally applicable for other types of multimedia data, like video, speech or music.

  12. Spatial and Transform Domain based Steganography Using Chaotic ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... further improve security chaotic maps are used for scrambling the ... I. INTRODUCTION. With the rapid growth of internet network and computer ..... techniques, then we will have two layers of protection. In this scheme, the ...

  13. Automatic focusing system of BSST in Antarctic

    Science.gov (United States)

    Tang, Peng-Yi; Liu, Jia-Jing; Zhang, Guang-yu; Wang, Jian

    2015-10-01

    Automatic focusing (AF) technology plays an important role in modern astronomical telescopes. Based on the focusing requirement of BSST (Bright Star Survey Telescope) in Antarctic, an AF system is set up. In this design, functions in OpenCV is used to find stars, the algorithm of area, HFD or FWHM are used to degree the focus metric by choosing. Curve fitting method is used to find focus position as the method of camera moving. All these design are suitable for unattended small telescope.

  14. Instabilities in the plasma focus

    International Nuclear Information System (INIS)

    Kaeppeler, H.J.

    1975-03-01

    The plasma focus was studied by many research teams in view of a possible approach to controlled thermonuclear fusion. Though it is questionable whether the plasma focus will ever lead to a fusion reactor, it nevertheless constitutes a strong source of neutron, X- and gamma radiation for simulating fusion reactor conditions. Furthermore, the plasma focus yields very high temperatures (10 7 K) and densities (> 10 19 cm -3 ) and thus provides interesting conditions for the study of high density plasmas. This review paper starts with a description of the compression stage of the focussing plasma, using a snow-plough model. It is shown that sophisticated MHD calculations substantiate the snowplough theory, but are not suited to describe the phenomena in the final compressed stage. For this purpose, a particle-in-cell calculation is employed, yielding a beam-beam collision model for the neutron production. Experimental evidence indicates that neutron production is associated with the appearence of m = O instabilities and is the direct result of collisions between anomalously accelerated ions. One of the mechanisms of ion acceleration are strong local electric fields. Another possible mechanism can bee seen in beam-plasma instabilities caused by runaway electrons. The analytical derivation of the dispersion relation for plasma focus conditions including runaway effect is discussed (orig.) [de

  15. Line broadening by focusing

    International Nuclear Information System (INIS)

    Brito, A.L. de; Jabs, A.

    1983-01-01

    It is pointed out that the spectral width of a quasi-monochromatic light beam broadens when the beam is focused. A quantitative formula for this broadening is derived from classical wave theory. The effect is shown to explain some experiments on laser beams done by E. Panarella which that author has explained under the ad-hoc hypothesis that the frequency of the photons changes along with the intensity of the light beam. The line broadening by focusing might also contribute to gas ionization by incident light when the ionization potential is well above the mean photon energy. Some remarks are made on some direct applications of the Heisenberg relations in comparison with our treatment. (Author) [pt

  16. A Feminist Critique of Solution-Focused Therapy.

    Science.gov (United States)

    Dermer, Shannon B.; Hemesath, Crystal Wilhite; Russell, Candyce S.

    1998-01-01

    Applying the feminist critique to solution-focused therapy highlights the strengths and weaknesses of this model from a feminist perspective. Although solution-focused therapy and feminist approaches share an emphasis on competence and strengths, solution-focused theory tends to overlook gender and power differences. In general, the model falls…

  17. Particle Accelerator Focus Automation

    Directory of Open Access Journals (Sweden)

    Lopes José

    2017-08-01

    Full Text Available The Laboratório de Aceleradores e Tecnologias de Radiação (LATR at the Campus Tecnológico e Nuclear, of Instituto Superior Técnico (IST has a horizontal electrostatic particle accelerator based on the Van de Graaff machine which is used for research in the area of material characterization. This machine produces alfa (He+ and proton (H+ beams of some μA currents up to 2 MeV/q energies. Beam focusing is obtained using a cylindrical lens of the Einzel type, assembled near the high voltage terminal. This paper describes the developed system that automatically focuses the ion beam, using a personal computer running the LabVIEW software, a multifunction input/output board and signal conditioning circuits. The focusing procedure consists of a scanning method to find the lens bias voltage which maximizes the beam current measured on a beam stopper target, which is used as feedback for the scanning cycle. This system, as part of a wider start up and shut down automation system built for this particle accelerator, brings great advantages to the operation of the accelerator by turning it faster and easier to operate, requiring less human presence, and adding the possibility of total remote control in safe conditions.

  18. Particle Accelerator Focus Automation

    Science.gov (United States)

    Lopes, José; Rocha, Jorge; Redondo, Luís; Cruz, João

    2017-08-01

    The Laboratório de Aceleradores e Tecnologias de Radiação (LATR) at the Campus Tecnológico e Nuclear, of Instituto Superior Técnico (IST) has a horizontal electrostatic particle accelerator based on the Van de Graaff machine which is used for research in the area of material characterization. This machine produces alfa (He+) and proton (H+) beams of some μA currents up to 2 MeV/q energies. Beam focusing is obtained using a cylindrical lens of the Einzel type, assembled near the high voltage terminal. This paper describes the developed system that automatically focuses the ion beam, using a personal computer running the LabVIEW software, a multifunction input/output board and signal conditioning circuits. The focusing procedure consists of a scanning method to find the lens bias voltage which maximizes the beam current measured on a beam stopper target, which is used as feedback for the scanning cycle. This system, as part of a wider start up and shut down automation system built for this particle accelerator, brings great advantages to the operation of the accelerator by turning it faster and easier to operate, requiring less human presence, and adding the possibility of total remote control in safe conditions.

  19. The importance of the right focusing technique. At-a-glance information on focusing techniques in X-ray procedures

    International Nuclear Information System (INIS)

    Lichte-Wichmann, M.

    1993-01-01

    Sharp pictures providing all the information relevant to a particular case obviate repeat exposures, help to keep the radiation dose to a minimum and prevent false diagnoses. In her book, the author gives practical guidance on focusing techniques that is equally valuable to beginners and experienced investigators or medical X-ray assistants and physicians. A substantial part of the book is devoted to detailed instructions on how an object is brought into focus as well as on the criteria of proper focusing and the possibilities of identifying and avoiding false focusing techniques. The problems arising when uncommon X-ray pictures have to be taken are explained by diagrammatic representations. (orig.) [de

  20. Plasma lenses for focusing relativistic electron beams

    International Nuclear Information System (INIS)

    Govil, R.; Wheeler, S.; Leemans, W.

    1997-01-01

    The next generation of colliders require tightly focused beams with high luminosity. To focus charged particle beams for such applications, a plasma focusing scheme has been proposed. Plasma lenses can be overdense (plasma density, n p much greater than electron beam density, n b ) or underdense (n p less than 2 n b ). In overdense lenses the space-charge force of the electron beam is canceled by the plasma and the remaining magnetic force causes the electron beam to self-pinch. The focusing gradient is nonlinear, resulting in spherical aberrations. In underdense lenses, the self-forces of the electron beam cancel, allowing the plasma ions to focus the beam. Although for a given beam density, a uniform underdense lens produces smaller focusing gradients than an overdense lens, it produces better beam quality since the focusing is done by plasma ions. The underdense lens can be improved by tapering the density of the plasma for optimal focusing. The underdense lens performance can be enhanced further by producing adiabatic plasma lenses to avoid the Oide limit on spot size due to synchrotron radiation by the electron beam. The plasma lens experiment at the Beam Test Facility (BTF) is designed to study the properties of plasma lenses in both overdense and underdense regimes. In particular, important issues such as electron beam matching, time response of the lens, lens aberrations and shot-to-shot reproducibility are being investigated

  1. A matter of focus: Power-holders feel more responsible after adopting a cognitive other-focus, rather than a self-focus

    NARCIS (Netherlands)

    Scholl, Annika; Sassenberg, Kai; Scheepers, Daan; Ellemers, Naomi|info:eu-repo/dai/nl/086631276; de Wit, Frank

    Social power implies responsibility. Yet, power-holders often follow only their own interests and overlook this responsibility. The present research illuminates how a previously adopted cognitive focus guides perceived responsibility when a person receives high (vs. low) power. In three experiments,

  2. Design of a new type synchronous focusing mechanism

    Science.gov (United States)

    Zhang, Jintao; Tan, Ruijun; Chen, Zhou; Zhang, Yongqi; Fu, Panlong; Qu, Yachen

    2018-05-01

    Aiming at the dual channel telescopic imaging system composed of infrared imaging system, low-light-level imaging system and image fusion module, In the fusion of low-light-level images and infrared images, it is obvious that using clear source images is easier to obtain high definition fused images. When the target is imaged at 15m to infinity, focusing is needed to ensure the imaging quality of the dual channel imaging system; therefore, a new type of synchronous focusing mechanism is designed. The synchronous focusing mechanism realizes the focusing function through the synchronous translational imaging devices, mainly including the structure of the screw rod nut, the shaft hole coordination structure and the spring steel ball eliminating clearance structure, etc. Starting from the synchronous focusing function of two imaging devices, the structure characteristics of the synchronous focusing mechanism are introduced in detail, and the focusing range is analyzed. The experimental results show that the synchronous focusing mechanism has the advantages of ingenious design, high focusing accuracy and stable and reliable operation.

  3. Investigation of a staged plasma-focus apparatus

    International Nuclear Information System (INIS)

    Lee, J.H.; McFarland, D.R.; Harries, W.L.

    1978-01-01

    A new staged plasma-focus geometry combining two Mather-type plasma-focus guns has been constructed, and the current-sheet dynamics investigated. The production of simultaneous pairs of plasma foci has been achieved. The intensities of X-ray and fusion-neutron emission were measured and found to agree with the scaling law for a plasma focus. Advantages of this new geometry include the possibility of using plasma-focus type pinches in multiple arrays at power levels beyond the validity regime of the current scaling law for a single gun. (author)

  4. Developing the collaboration skills using the Serious Game MetaVals

    Directory of Open Access Journals (Sweden)

    Margarida Romero

    2013-02-01

    Full Text Available 0 0 1 117 645 USAL 5 1 761 14.0 Normal 0 21 false false false ES JA X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-ansi-language:ES; mso-fareast-language:EN-US;} Developing collaboration skills is one of the main objectives of current competence-oriented educational systems. This development relates also to the communication and social skills. Because of their practice-based orientation, skills and competences require active learning methodologies to be developed, such the use of Serious Games (SG in Game Based Learning (GBL methodologies. SGs have been analysed as innovative tools allowing supporting the collaboration skills, although knowledge and curriculum orientation is still dominating the pedagogical research on the use of SG in formal educational contexts. This paper aims to analyse the impact of SG in the collaboration skills, through the analysis of a specific case study focused on the MetaVals SG.

  5. Tanks Focus Area annual report FY2000

    International Nuclear Information System (INIS)

    2000-01-01

    The U.S. Department of Energy (DOE) continues to face a major radioactive waste tank remediation effort with tanks containing hazardous and radioactive waste resulting from the production of nuclear materials. With some 90 million gallons of waste in the form of solid, sludge, liquid, and gas stored in 287 tanks across the DOE complex, containing approximately 650 million curies, radioactive waste storage tank remediation is the nation's highest cleanup priority. Differing waste types and unique technical issues require specialized science and technology to achieve tank cleanup in an environmentally acceptable manner. Some of the waste has been stored for over 50 years in tanks that have exceeded their design lives. The challenge is to characterize and maintain these contents in a safe condition and continue to remediate and close each tank to minimize the risks of waste migration and exposure to workers, the public, and the environment. In 1994, the DOE's Office of Environmental Management (EM) created a group of integrated, multiorganizational teams focusing on specific areas of the EM cleanup mission. These teams have evolved into five focus areas managed within EM's Office of Science and Technology (OST): Tanks Focus Area (TFA); Deactivation and Decommissioning Focus Area; Nuclear Materials Focus Area; Subsurface Contaminants Focus Area; and Transuranic and Mixed Waste Focus Area

  6. Spatial filters for focusing ultrasound images

    DEFF Research Database (Denmark)

    Jensen, Jørgen Arendt; Gori, Paola

    2001-01-01

    , but the approach always yields point spread functions better or equal to a traditional dynamically focused image. Finally, the process was applied to in-vivo clinical images of the liver and right kidney from a 28 years old male. The data was obtained with a single element transducer focused at 100 mm....... A new method for making spatial matched filter focusing of RF ultrasound data is proposed based on the spatial impulse response description of the imaging. The response from a scatterer at any given point in space relative to the transducer can be calculated, and this gives the spatial matched filter...... for synthetic aperture imaging for single element transducers. It is evaluated using the Field II program. Data from a single 3 MHz transducer focused at a distance of 80 mm is processed. Far from the transducer focal region, the processing greatly improves the image resolution: the lateral slice...

  7. Development of the FOCUS (Focus on the Outcomes of Communication under Six), a Communication Outcome Measure for Preschool Children

    Science.gov (United States)

    Thomas-Stonell, Nancy L.; Oddson, Bruce; Robertson, Bernadette; Rosenbaum, Peter L.

    2010-01-01

    Aim: Our aim was to develop an outcome measure, called Focus on the Outcomes of Communication Under Six (FOCUS), that captures real-world changes in preschool children's communication. Conceptually grounded in the World Health Organization International Classification of Functioning, Disability and Health framework, the FOCUS items were derived…

  8. Care ‘going market’: Finnish elderly-care policies in transition

    Directory of Open Access Journals (Sweden)

    Anneli Anttonen

    2011-06-01

    -font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The article evaluates marketization and its effects on elderly-care policies in Finland, where the welfare state has been the most important mechanism in mitigating failures caused by the functioning of market. In addition, since the 1960s the public sector has been regarded as the guarantee for citizens' social rights and the common good. Therefore, marketization, denoting to market logics intervened with social-care practices that construct care as a commodity and the individual in need of care as a consumer, is a critical juncture for an evaluation of the underlying pattern change. To evaluate the change this article employs a framework of institutional policy analysis. By focusing on institutional framing of care policies, institutionalized responsibilities, policy discourses, and policy outcomes and by using textual and statistical data, this article aims to reach a detailed but comprehensive picture on marketization and its influence in the Finnish social-care regime. All institutional aspects analysed in the study show a clear transition from universal social policies based on public responsibility to market-friendly policies and the marketization of social care. However, they also imply that marketization is regulated by public authorities. On the basis of these results, we argue that Finnish elderly-care policies is going through a profound change, in magnitude similar to what occurred 30-40 years ago when the politics of universalism was breaking through. The new direction points to the market and a deep-going reform of social-care service provision is taking place, and the earlier state-centred welfare production mode is at least partly withering away. In this respect the pattern of social-care service

  9. Veselago focusing of anisotropic massless Dirac fermions

    Science.gov (United States)

    Zhang, Shu-Hui; Yang, Wen; Peeters, F. M.

    2018-05-01

    Massless Dirac fermions (MDFs) emerge as quasiparticles in various novel materials such as graphene and topological insulators, and they exhibit several intriguing properties, of which Veselago focusing is an outstanding example with a lot of possible applications. However, up to now Veselago focusing merely occurred in p-n junction devices based on the isotropic MDF, which lacks the tunability needed for realistic applications. Here, motivated by the emergence of novel Dirac materials, we investigate the propagation behaviors of anisotropic MDFs in such a p-n junction structure. By projecting the Hamiltonian of the anisotropic MDF to that of the isotropic MDF and deriving an exact analytical expression for the propagator, precise Veselago focusing is demonstrated without the need for mirror symmetry of the electron source and its focusing image. We show a tunable focusing position that can be used in a device to probe masked atom-scale defects. This study provides an innovative concept to realize Veselago focusing relevant for potential applications, and it paves the way for the design of novel electron optics devices by exploiting the anisotropic MDF.

  10. The Relationship Between Personality Type And Leadership Focus

    Directory of Open Access Journals (Sweden)

    Grant Sieff

    2006-11-01

    Full Text Available Optimising focus is a key success driver for many organisation leaders. The relationship between personality type and leadership focus is examined. Personality type is assessed with Form M of the Myers-Briggs Type Indicator instrument, and leadership focus is explored through the development and application of a Leadership Focus Questionnaire. South African executives form the target population for this study. Both functionalist and interpretive approaches are applied. Three primary theoretical hypotheses about leadership focus, concerning (1 optimising the balance of focus between external and internal priorities, (2 the fit between the leadership personality type and the organisation type, and (3 the capacity to manage a multiple focus, are considered. Results show that Extraverted personality types are more comfortable with the challenges of focus in the leadership role than are Introverted types, and Extraverted, Sensing, Thinking and Judging types experience a greater degree of fit with their organisations than do Introverted, Intuitive, Feeling and Perceiving types.

  11. Focus groups in organizational research

    Directory of Open Access Journals (Sweden)

    L. Kamfer

    1989-05-01

    Full Text Available Focus groups are commonly used in marketing research. In this article an application of the focus group technique within an organizational context is described. Nine focus groups were conducted during the planning stage of a survey intended to establish employee perceptions of advancement policies and practices in a major South African manufacturing company. Fourteen themes emerged from a content analysis of the discussions. Two of these reflected aspects requiring commitment decisions from management toward the survey. The others indicated areas of concern which should be included in the survey. In this way, the focus groups contributed useful information for the subsequent sample survey. Opsomming Fokusgroepe word algemeen in bemarkingsnavorsing aangewend. In hierdie studie word 'n toepassingvan die fokusgroeptegniek in die konteks van 'n opname binne 'n organisasie beskryf. Nege fokusgroepbesprekings is gevoer tydens die beplanningstadium van 'n opname wat binne 'n Suid-Afrikaanse vervaardigingsonderneming gedoen is. Die doel van die opname was om die persepsies van werknemers teenoor die bestaande personeel- en bestuursontwikkelingsbeleid en -praktyke van die maatskappy te bepaal. Veertien temas is deur middel van 'n inhoudontleding gei'dentifiseer. Twee hiervan het aspekte aangedui waaroor bestuur beginselbesluite t.o.v. die opname sou moes neem. Die ander het probleemareas aangedui wat by die ondersoek selfingesluit behoort te word. Sodoende het die fokusgroepe inligting verskafwat vir die latere vraelysopname belangrik was.

  12. Hiding Information Using different lighting Color images

    Science.gov (United States)

    Majead, Ahlam; Awad, Rash; Salman, Salema S.

    2018-05-01

    The host medium for the secret message is one of the important principles for the designers of steganography method. In this study, the best color image was studied to carrying any secret image.The steganography approach based Lifting Wavelet Transform (LWT) and Least Significant Bits (LSBs) substitution. The proposed method offers lossless and unnoticeable changes in the contrast carrier color image and imperceptible by human visual system (HVS), especially the host images which was captured in dark lighting conditions. The aim of the study was to study the process of masking the data in colored images with different light intensities. The effect of the masking process was examined on the images that are classified by a minimum distance and the amount of noise and distortion in the image. The histogram and statistical characteristics of the cover image the results showed the efficient use of images taken with different light intensities in hiding data using the least important bit substitution method. This method succeeded in concealing textual data without distorting the original image (low light) Lire developments due to the concealment process.The digital image segmentation technique was used to distinguish small areas with masking. The result is that smooth homogeneous areas are less affected as a result of hiding comparing with high light areas. It is possible to use dark color images to send any secret message between two persons for the purpose of secret communication with good security.

  13. Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital

    Directory of Open Access Journals (Sweden)

    Alim Muadzani

    2016-08-01

    Full Text Available Information has now become an  important comodity in human life, with the rapid development of communications technology has enable people to communicate and exchange information more easily. Internet is very popular and used by billions users worldwide, the information passing through the internet is very large, and some certain people trying to get this information for profit. The information need to be secured to prevent the others to get the information that send through the internet, steganography can be used to  hide the information before sending it and the receiver can recover the hidden data. Digital steganography using computer can use a variety of digital file, digital image file is one of them. With the infomation being hidden inside the image-carrier, the others will not aware about the hidden information. Application created using C# programming leanguage and the steganoraphy method using Least Significant Bit Insertion (LSBI. Microsoft Visual Studio used as Integrated Development Environtment (IDE to code and design the user interface. Software develpment model using Extreme Programming, and the testing using black box method. Application designed to hide text or image inside an image-carrier and the hidden text or image can be recovered. The result of this research are an application that can hide text or image into  image-carrier, and the hidden text or image can be recovered. Based on the testing application can run as expected and fulfill all the requirements.

  14. 學術性電子期刊經濟行為之剖析(上 | Economic Analyses of Scholarly Electronic Journal: Part 1

    Directory of Open Access Journals (Sweden)

    景祥祜、石嘉琳、張簡誌誠 Hsiang-Hoo S. Ching、Chia-Lin Shih、J. J. Chang-Chien

    2001-04-01

    Full Text Available

    頁次:37-50

    ascii-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">由於資訊與通信科技的發展與應用,導致資訊傳播模式產生重大變革,並促成學術性電子期刊的出現,直接衝擊傳統學術性期刊機構的生存,其應如何調適才可以因應未來趨勢ascii-theme-font: minor-fareast; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">?ascii-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">而學術研究者與圖書館館員面對新的資訊商品或勞務形式,以有限的預算,如何選擇可以滿足其所服務學術社群並獲得最大效用?ascii-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">又因學術性電子期刊具備公共財的特性,為擴大其外部性,政府補助政策又該如何妥適規畫ascii-theme-font: minor-fareast; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">?ascii-font-family: 'Times New Roman'; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor

  15. Identifying Information Focuses in Listening Comprehension

    Science.gov (United States)

    Zhang, Hong-yan

    2011-01-01

    The study explains the process of learners' listening comprehension within Halliday's information theory in functional grammar, including the skills of identifying focuses while listening in college English teaching. Identifying information focuses in listening is proved to improve the students' communicative listening ability by the means of a…

  16. Tanks Focus Area annual report FY2000

    Energy Technology Data Exchange (ETDEWEB)

    None

    2000-12-01

    The U.S. Department of Energy (DOE) continues to face a major radioactive waste tank remediation effort with tanks containing hazardous and radioactive waste resulting from the production of nuclear materials. With some 90 million gallons of waste in the form of solid, sludge, liquid, and gas stored in 287 tanks across the DOE complex, containing approximately 650 million curies, radioactive waste storage tank remediation is the nation's highest cleanup priority. Differing waste types and unique technical issues require specialized science and technology to achieve tank cleanup in an environmentally acceptable manner. Some of the waste has been stored for over 50 years in tanks that have exceeded their design lives. The challenge is to characterize and maintain these contents in a safe condition and continue to remediate and close each tank to minimize the risks of waste migration and exposure to workers, the public, and the environment. In 1994, the DOE's Office of Environmental Management (EM) created a group of integrated, multiorganizational teams focusing on specific areas of the EM cleanup mission. These teams have evolved into five focus areas managed within EM's Office of Science and Technology (OST): Tanks Focus Area (TFA); Deactivation and Decommissioning Focus Area; Nuclear Materials Focus Area; Subsurface Contaminants Focus Area; and Transuranic and Mixed Waste Focus Area.

  17. Focus group report - part II

    International Nuclear Information System (INIS)

    1997-12-01

    The Waste Policy Institute, through a cooperative agreement with the U.S. Department of Energy (DOE) Office of Science and Technology (OST) conducted a focus group with members of the Hanford Advisory Board (HAB), interviews with tribal government representatives, and a survey of Oak Ridge Local Oversight Committee (LOC) and Site Specific Advisory Board (SSAB) members. The purpose was to understand what members of the interested and involved public want to know about technology development and ways to get that information to them. These data collection activities were used as a follow-up to two previously held focus groups with the general public near Idaho National Engineering and Environmental Laboratory (INEEL) and the Savannah River Site (SRS). Most participants from the first two focus groups said they did not have time and/or were not interested in participating in technology decision-making. They said they would prefer to defer to members of their communities who are interested and want to be involved in technology decision-making

  18. The sporting body: body image and eating disorder symptomatology among female athletes from leanness focused and nonleanness focused sports.

    Science.gov (United States)

    Kong, Peiling; Harris, Lynne M

    2015-01-01

    Female athletes experience pressure to conform to social and sporting norms concerning body weight. This study compared general and sporting body dissatisfaction and disordered eating symptomatology among 320 elite, recreational, and noncompetitive female athletes aged 17 to 30 years competing in leanness focused sports and nonleanness focused sports. Participants completed an online questionnaire including demographic questions, the Eating Attitudes Test, and the Figure Rating Scale. Athletes from leanness focused sports reported higher levels of body dissatisfaction and greater disordered eating symptomatology regardless of participation level. Elite athletes reported higher levels of body dissatisfaction and greater disordered eating symptomatology regardless of sport type, and differences between recreational and noncompetitive athletes were not found. More than 60% of elite athletes from leanness focused and nonleanness focused sports reported pressure from coaches concerning body shape. The findings have important implications for identifying risk factors for eating disorders among female athletes, where athletes who compete at elite level and those who compete in leanness focused sports at any level may be at higher risk for developing eating disorders.

  19. Broadband and flexible acoustic focusing by metafiber bundles

    Science.gov (United States)

    Sun, Hong-Xiang; Chen, Jia-He; Ge, Yong; Yuan, Shou-Qi; Liu, Xiao-Jun

    2018-06-01

    We report a broadband and flexible acoustic focusing through metafiber bundles in air, in which each metafiber consists of eight circular and narrow rectangular cavities. The fractional bandwidth of the acoustic focusing could reach about 0.2, which arises from the eigenmodes of the metafiber structure. Besides, owing to the flexible characteristic of the metafibers, the focus position can be manipulated by bending the metafiber bundles, and the metafiber bundles could bypass rigid scatterers inside the lens structure. More interestingly, the acoustic propagation and focusing directions can be changed by using a designed right-angled direction converter fabricated by the metafibers, and a waveform converter and a focusing lens of the cylindrical acoustic source are realized based on the metafiber bundles. The proposed focusing lens has the advantages of broad bandwidth, flexible structure, and high focusing performance, showing great potentials in versatile applications.

  20. Focus: Digital

    DEFF Research Database (Denmark)

    Technology has been an all-important and defining element within the arts throughout the 20th century, and it has fundamentally changed the ways in which we produce and consume music. With this Focus we investigate the latest developments in the digital domain – and their pervasiveness and rapid...... production and reception of contemporary music and sound art. With ‘Digital’ we present four composers' very different answers to how technology impact their work. To Juliana Hodkinson it has become an integral part of her sonic writing. Rudiger Meyer analyses the relationships between art and design and how...

  1. Focus Group Guide

    Science.gov (United States)

    2017-07-01

    home for the arrival of school- aged children. TIP: Do not conduct focus groups in a command conference room in the command group area. Doing so...organizational effectiveness and equal opportunity/equal employment opportunity/fair treatment and sexual assault and response factors (which are listed on the... Sexual Harassment (C) Sex Harassment Retaliation (D) Discrimination - Sex (E) Discrimination - Race (F) Discrimination - Disability (G

  2. An elastic, low-background vertical focusing element for a doubly focusing neutron monochromator

    International Nuclear Information System (INIS)

    Smee, Stephen A.; Brand, Paul C.; Barry, Dwight D.; Broholm, Collin L.; Anand, Dave K.

    2001-01-01

    A novel, variable radius of curvature, device for the focusing of neutrons is presented. This elastic element consists of a thin variable thickness, constant width, aluminum blade to which diffracting crystals can be attached. When buckled, the blade assumes a circular focal shape, the radius of which is easily controlled by the relative displacement of supporting pivots. Precision electromechanical and optical measurements show that the slope of the buckled blade conforms to a circular arc to within 0.15 degree sign for radii in the range 900 mm< R<10 000 mm. This easily scalable, low mass mechanism is well suited for use in a focusing neutron monochromator, as the parasitic scattering typically associated with traditional lead screw and lever mechanisms is greatly reduced

  3. Focusing effects in laser-electron Thomson scattering

    Directory of Open Access Journals (Sweden)

    Chris Harvey

    2016-09-01

    Full Text Available We study the effects of laser pulse focusing on the spectral properties of Thomson scattered radiation. Modeling the laser as a paraxial beam we find that, in all but the most extreme cases of focusing, the temporal envelope has a much bigger effect on the spectrum than the focusing itself. For the case of ultrashort pulses, where the paraxial model is no longer valid, we adopt a subcycle vector beam description of the field. It is found that the emission harmonics are blue shifted and broaden out in frequency space as the pulse becomes shorter. Additionally the carrier envelope phase becomes important, resulting in an angular asymmetry in the spectrum. We then use the same model to study the effects of focusing beyond the limit where the paraxial expansion is valid. It is found that fields focussed to subwavelength spot sizes produce spectra that are qualitatively similar to those from subcycle pulses due to the shortening of the pulse with focusing. Finally, we study high-intensity fields and find that, in general, the focusing makes negligible difference to the spectra in the regime of radiation reaction.

  4. Some optical diagnostics for the plasma focus

    International Nuclear Information System (INIS)

    Korzhavin, V.M.

    1980-01-01

    Some aspects of studying plasma focus dynamics are reported. Particular efforts were made to develop an infrared (IR) diagnostics. The plasma focus is formed in a discharge chamber, when shock waves and plasma sheath cumulate on the axis as a result of the break-down of filling gas by the application of high voltage. The current J was measured with a Rogovsky coil, and the voltage U was measured with a capacitor divider. The current derivative was measured with magnetic probes, and X-ray and neutron emission intensities were measured with a plastic scintillator. The total neutron yield were measured by the activation method. The time-integrated soft X-ray pictures of plasma focus were taken with a pin-hole camera. The formation and disruption of plasma focus were studied by multi-picture speed photography. Laser interferometry was used to study the time-space distribution of plasma density. For the study of turbulence phenomena in plasma focus, a new type IR detector was employed. The results of measurements suggest that there exists some superthermal radiation during the second compression of plasma focus, but it is not so strong. (Kato, T.)

  5. NPP Tropical Forest: Manaus, Brazil, 1963-1990 , R1

    Data.gov (United States)

    National Aeronautics and Space Administration — This data set includes six ASCII files (.txt format). Five files contain productivity values for several types of tropical Amazon rainforest near Manaus, Brazil...

  6. Auto-focusing accelerating hyper-geometric laser beams

    International Nuclear Information System (INIS)

    Kovalev, A A; Kotlyar, V V; Porfirev, A P

    2016-01-01

    We derive a new solution to the paraxial wave equation that defines a two-parameter family of three-dimensional structurally stable vortex annular auto-focusing hyper-geometric (AH) beams, with their complex amplitude expressed via a degenerate hyper-geometric function. The AH beams are found to carry an orbital angular momentum and be auto-focusing, propagating on an accelerating path toward a focus, where the annular intensity pattern is ‘sharply’ reduced in diameter. An explicit expression for the complex amplitude of vortex annular auto-focusing hyper-geometric-Gaussian beams is derived. The experiment has been shown to be in good agreement with theory. (paper)

  7. Focusing of electromagnetic waves

    International Nuclear Information System (INIS)

    Dhayalan, V.

    1996-01-01

    The focusing of electromagnetic waves inside a slab has been examined together with two special cases in which the slab is reduced to a single interface or a single medium. To that end the exact solutions for the fields inside a layered medium have been used, given in terms of the outside current source in order to obtain the solutions for the focused electric field inside a slab. Both exact and asymptotic solutions of the problem have been considered, and the validity of the latter has been discussed. The author has developed a numerical algorithm for evaluation of the diffraction integral with special emphasis on reducing the computing time. The numerical techniques in the paper can be readily applied to evaluate similar diffraction integrals occurring e.g. in microstrip antennas. 46 refs

  8. Noise-based Stego-ECC

    Directory of Open Access Journals (Sweden)

    Rahardjo Budi

    2014-03-01

    Full Text Available A novel method of inserting noise into stream of ciphered text is proposed. The goal of inserting noise is to increase the level of uncertainty, thus making it harder for an attacker to detect data and noise. This form of steganography is implemented using Elliptic Curve Cryptography (ECC. The process of embedding the noise to the message in the encryption process and removing the noise from the message in the decryption process is proposed in this work by modifying ElGamal to allow auto detection of data and noise.

  9. Facility Focus: Food Service.

    Science.gov (United States)

    College Planning & Management, 2002

    2002-01-01

    Describes the Hawthorn Court Community Center at Iowa State University, Ames, and the HUB-Robeson Center at Pennsylvania State University. Focuses on the food service offered in these new student-life buildings. Includes photographs. (EV)

  10. Quantitative evaluation of pairs and RS steganalysis

    Science.gov (United States)

    Ker, Andrew D.

    2004-06-01

    We give initial results from a new project which performs statistically accurate evaluation of the reliability of image steganalysis algorithms. The focus here is on the Pairs and RS methods, for detection of simple LSB steganography in grayscale bitmaps, due to Fridrich et al. Using libraries totalling around 30,000 images we have measured the performance of these methods and suggest changes which lead to significant improvements. Particular results from the project presented here include notes on the distribution of the RS statistic, the relative merits of different "masks" used in the RS algorithm, the effect on reliability when previously compressed cover images are used, and the effect of repeating steganalysis on the transposed image. We also discuss improvements to the Pairs algorithm, restricting it to spatially close pairs of pixels, which leads to a substantial performance improvement, even to the extent of surpassing the RS statistic which was previously thought superior for grayscale images. We also describe some of the questions for a general methodology of evaluation of steganalysis, and potential pitfalls caused by the differences between uncompressed, compressed, and resampled cover images.

  11. Mobile code security

    Science.gov (United States)

    Ramalingam, Srikumar

    2001-11-01

    A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

  12. Focus group report, Part I

    International Nuclear Information System (INIS)

    1997-07-01

    The Waste Policy Institute, through a cooperative agreement with the U.S. Department of Energy's (DOE) Office of Science and Technology (OST), conducted two focus groups with people who live or work near DOE sites. The purpose of the focus groups was to gain a better understanding of the general community's information needs about the development of innovative technologies that are used in the cleanup of the sites. The authors wanted to better understand of what role these people want to play in the development of new technologies, how OST communication products can help facilitate that role, and the usefulness of current OST communication products. WPI held the focus groups in communities near the Idaho National Engineering and Environmental Laboratory (INEEL) and the Savannah River Site (SRS) because they are among the DOE sites that cannot be cleaned up before 2006. To include many facets of the communities, WPI randomly selected participants from membership lists of organized groups in each community including: elected officials, school boards, unions, chambers of commerce, economic development organizations, environmental organizations, health and human service organizations, and area clergy. While in the communities, WPI also interviewed stakeholders such as tribal representatives and a Citizens Advisory Board (CAB) member. Qualitative data gathered during the focus group sessions give some indication of general stakeholder opinions. However, the authors caution readers not to make broad assumptions about the general stakeholder audience based on the opinions of a limited number of general community stakeholders

  13. Generation connected with images

    Directory of Open Access Journals (Sweden)

    Adriana RECAMÁN PAYO

    2011-12-01

    Full Text Available 0 0 1 197 1086 Instituto Universitario de Ciencias de la Educación 9 2 1281 14.0 Normal 0 21 false false false ES JA X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-ansi-language:ES; mso-fareast-language:EN-US;} In learning contexts studying the image as a focus of sensitive knowledge and formative purposes is crucial to achieve high levels of quality and educational excellence. As Renobell (2005 stated, image analysis encourages the development of critical capacity and contributes to developing a personal style for the gradual acquisition of a visual culture. Images educate and consequently, their presence in the field of education should not be a mere accompaniment to the text. They should not be limited to adorn or illustrate a linguistic content but to complement and deepen it, activating the thought and the reflection of the reader. In Internet culture, image as a focus of knowledge, of shared use, of social content and educational purposes, contribute to explain the implications and vivacity around this technological environment, which plays a leading role in the current social changes and movements. The culture of the network has changed our perceptual sensitivity to interpret images, which are now more complex, integrated, multidimensional and dynamic than ever. The interactivity, the strong relationship with the text content, the graphic sequentiality, the associated sound effects or the iconical text design reveal the

  14. User-friendly software for SANS data reduction and analysis

    International Nuclear Information System (INIS)

    Biemann, P.; Haese-Seiller, M.; Staron, P.

    1999-01-01

    At the Geesthacht Neutron Facility (GeNF) a new software is being developed for the reduction of two-dimensional small-angle neutron scattering (SANS) data. The main motivation for this work was to created software for users of our SANS facilities that is easy to use. Another motivation was to provide users with software they can also use at their home institute. Therefore, the software is implemented on a personal computer running WINDOWS. The program reads raw data from an area detector in binary or ascii format and produces ascii files containing the scattering curve. The cross section can be averaged over the whole area of the detector or over users defined sectors only. Scripts can be created for processing large numbers of files. (author)

  15. Phase analysis and focusing of synchrotron radiation

    CERN Document Server

    Chubar, O; Snigirev, A

    1999-01-01

    High accuracy calculations of synchrotron radiation (SR) emitted by a relativistic electron show that the phase of the frequency domain electric field of SR differs from the phase of radiation of a virtual point source. These differences may result in the reduction of focusing efficiency of diffraction-limited SR, if the focusing is performed by conventional optical components optimised for point sources. We show that by applying a phase correction locally, one may transform the phase of SR electric field at a desired polarisation to that of a point source. Such corrections are computed for undulator radiation (planar and helical) and bending magnet radiation (central part and edges). The focusing of the corrected SR wavefront can result in the increase of peak intensity in the focused spot up to several times compared to the focusing without correction. For non-diffraction-limited radiation, the effect of the phase corrections is reduced. Due to this reason, the use of the proposed phase corrections in exist...

  16. Axial sheath dynamics in a plasma focus

    International Nuclear Information System (INIS)

    Soliman, H.M.; El-Khalafawy, T.A.; Masoud, M.M.

    1990-01-01

    This paper presents the result of investigation with a 10 kJ Mather type plasma focus. It is operated in hydrogen gas at ambient pressure of 0.15--1 torr and charging voltage of 8--11 kV. Radial distribution of the current sheath density with axial distance has been estimated. Plasma rotation in the expansion chamber in the absence of external magnetic field has been detected. A plasma flare from the plasma focus region propagating in the radial direction has been observed. Streak photography shows two plasma streams flowing simultaneously out of the muzzle. The mean energy of the electron beam ejected from the pinch region of the focused plasma, was measured by retarding field analyzer to be 0.32 keV. The electron temperature of the plasma focus at peak compression was determined by measuring the X-ray intensity as a function of absorber thickness at a distance of 62 cm from the focus. The electron temperature has been found to 3 keV

  17. Target focusing configuration for X-ray laser experiments

    International Nuclear Information System (INIS)

    Seppala, L.G.

    1985-01-01

    X-ray laser experiments imposed a new demand on the Novette focusing optics. These optics had to provide highly uniform, double-sided illumination on a target region 1.0 cm long by 100 to 200 μm wide. This line focus requirement had to be achieved without degrading the diagnostic reflection from the last surface of the focus lens and without potential ghost focus problems. The only optical configuration that preserves the diagnostic reflection is shown. A negative focal length cylinder lens is placed between the focus lens and the debris shield, with the concave surface facing toward the focus lens. Any ghost reflections from the cylinder lens or debris shield are degraded by astigmatism, making them less hazardous. In practice, the uniformity of illumination is probably about the same for a positive or a negative cylinder lens. The minimum Novette focused spot was approximately 50 to 75 μm in diameter, and the fabrication errors in the 80-cm-diam precision cylinder lens produced a line focus 25 μm wide. a negative cylinder lens design was chosen, however, to optimize the illumination uniformity in the case of line widths of several hundred microns

  18. The use of focused ethnography in nursing research.

    Science.gov (United States)

    Cruz, Edward Venzon; Higginbottom, Gina

    2013-03-01

    To provide an overview of the relevance and strengths of focused ethnography in nursing research. The paper provides descriptions of focused ethnography and discusses using exemplars to show how focused ethnographies can enhance and understand nursing practice. Orthodox ethnographic approaches may not always be suitable or desirable for research in diverse nursing contexts. Focused ethnography has emerged as a promising method for applying ethnography to a distinct issue or shared experience in cultures or sub-cultures and in specific settings, rather than throughout entire communities. Unfortunately, there is limited guidance on using focused ethnography, particularly as applied to nursing research. Research studies performed by nurses using focused ethnography are summarised to show how they fulfilled three main purposes of the genre in nursing research. Additional citations are provided to help demonstrate the versatility of focused ethnography in exploring distinct problems in a specific context in different populations and groups of people. The unique role that nurses play in health care, coupled with their skills in enquiry, can contribute to the further development of the discipline. Focused ethnography offers an opportunity to gain a better understanding and appreciation of nursing as a profession, and the role it plays in society. Focused ethnography has emerged as a relevant research methodology that can be used by nurse researchers to understand specific societal issues that affect different facets of nursing practice. As nurse researchers endeavour to understand experiences in light of their health and life situations, focused ethnography enables them to understand the interrelationship between people and their environments in the society in which they live.

  19. NPP Grassland: Pampa De Leman, Argentina, 1980-1982, R1

    Data.gov (United States)

    National Aeronautics and Space Administration — This data set contains two ASCII files (.txt format). One file contains monthly productivity data measured on an arid dwarf-shrub steppe in northern Patagonia,...

  20. 2007 USGS/NASA Experimental Advanced Airborne Research Lidar (EAARL): Fire Island National Seashore, NY and Sandy Hook, NJ

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — ASCII xyz point cloud data were produced from remotely sensed, geographically referenced elevation measurements cooperatively by the U.S. Geological Survey (USGS)...

  1. Multibeam Mapping of the West Florida Shelf, Gulf of Mexico, Twin Ridges Area

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — XYZ ASCII format high-resolution bathymetry data generated from the 2002 multibeam sonar survey of the West Florida Shelf, Gulf of Mexico.

  2. Guidelines on Active Content and Mobile Code: Recommendations of the National Institute of Standards and Technology

    National Research Council Canada - National Science Library

    Jansen, Wayne

    2001-01-01

    .... One such category of technologies is active content. Broadly speaking, active content refers to electronic documents that, unlike past character documents based on the American Standard Code for Information Interchange (ASCII...

  3. FigS7.txt

    Data.gov (United States)

    U.S. Environmental Protection Agency — This is an ascii file with georeferencing information containing the data plotted in Figure S7 of the supplemental information manuscript section. This dataset is...

  4. NPP Grassland: Konza Prairie, USA, 1984-1990, R1

    Data.gov (United States)

    National Aeronautics and Space Administration — This data set contains three ASCII files (.txt format). Two files contain above-ground biomass and productivity data for a humid temperate tall-grass prairie...

  5. Underway sea surface temperature and salinity data from thermosalinographs collected from multiple platforms assembled by NOAA Atlantic Oceanographic and Meteorological Laboratory (AOML)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This collection contains sea surface oceanographic data in netCDF and ASCII formatted files assembled by the NOAA Atlantic Oceanographic and Meteorological...

  6. Multibeam Mapping of the West Florida Shelf, Gulf of Mexico, Madison Swanson Area

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — XYZ ASCII format high-resolution bathymetry data generated from the 2002 multibeam sonar survey of the West Florida Shelf, Gulf of Mexico.

  7. 2007 USGS/NPS/NASA Experimental Advanced Airborne Research Lidar (EAARL): Naval Live Oaks Area, FL

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — ASCII xyz point cloud data were produced from remotely sensed, geographically referenced elevation measurements cooperatively by the U.S. Geological Survey (USGS),...

  8. Competitive mindsets, creativity, and the role of regulatory focus

    NARCIS (Netherlands)

    Bittner, Jenny; Heidemeier, Heike

    2013-01-01

    We examined how regulatory focus and intentions to compete rather than cooperate with group members relate to creativity. Study 1 showed that a promotion focus (i.e., a focus on ideals) activated a cooperative mindset, whereas a prevention focus (i.e., a focus on responsibilities) activated a

  9. Different Approaches to Cross-Lingual Focus Groups

    Directory of Open Access Journals (Sweden)

    Maira Quintanilha

    2015-12-01

    Full Text Available Focus groups are a useful data-generation strategy in qualitative health research when it is important to understand how social contexts shape participants’ health. However, when cross-lingual focus groups are conducted across cultural groups, and in languages in which the researcher is not fluent, questions regarding the usefulness and rigor of the findings can be raised. In this article, we will discuss three different approaches to cross-lingual focus groups used in a community-based participatory research project with pregnant and postpartum, African immigrant women in Alberta, Canada. In two approaches, we moderated focus groups in women’s mother tongue with the support of real-time interpreters, but in the first approach, audio recording was used and in the second approach, audio recording was not used. In the third approach, a bilingual moderator facilitated focus groups in women’s mother tongue, with transcription and translation of audio-recorded data upon completion of data generation. We will describe each approach in detail, including their advantages and challenges, and recontextualize what we have learned within the known literature. We expect the lessons learned in this project may assist others in planning and implementing cross-lingual focus groups, especially in the context of community-based participatory research.

  10. Final focus test beam

    International Nuclear Information System (INIS)

    1991-03-01

    This report discusses the following: the Final Focus Test Beam Project; optical design; magnets; instrumentation; magnetic measurement and BPM calibration; mechanical alignment and stabilization; vacuum system; power supplies; control system; radiation shielding and personnel protection; infrastructure; and administration

  11. Structural Analysis of Extended Plasma Focus Chamber

    International Nuclear Information System (INIS)

    Mohd Azhar Ahmad; Abdul Halim Baijan; Siti Aiasah Hashim

    2016-01-01

    Accelerator Development Centre (ADC) of Nuclear Malaysia intends to upgrade the plasma focus device. It involves the extension part placed on top of the existing plasma focus vacuum chamber. This extended vacuum chamber purposely to give an extra space in conducting experiments on the existing plasma focus chamber. The aim of upgrading the plasma focus device is to solve the limitation in research and analysis of sample due to its done in an open system that cause analysis of samples is limited and less optimal. This extended chamber was design in considering the ease of fabrication as well as durability of its structural. Thus, this paper discusses the structural analysis in term of pressure loading effect in extended chamber. (author)

  12. Plasma focus as a pulsed power source

    International Nuclear Information System (INIS)

    Sahlin, H.; McFarland, G.; Barlett, R.; Gullickson, R.

    1975-01-01

    The plasma focus is a remarkable natural phenomena that achieves significant space-time compression of both particle and field energy. Depending on the mode of operation, about 20 percent of the bank energy can be concentrated into the kinetic energy of a thin, dense, cylindrically convergent gas shell, or into a small-diameter, high-ν/γ relativistic electron burst and oppositely directed ion burst. The kinetic energy of the fast ions and electrons can exceed the applied voltage by a factor of greater than 100. The different modes of energy concentration by the plasma focus are presented and discussed both in terms of their role in the direct yield of the focus and for the case of a plasma focus supplemented by various fusionable targets

  13. 2004 USGS/NASA Experimental Advanced Airborne Research Lidar (EAARL): Northern Gulf of Mexico, Post-Hurricane Ivan

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — ASCII xyz point cloud data were produced from remotely-sensed, geographically-referenced elevation measurements in cooperation with the U.S. Geological Survey (USGS)...

  14. FigS8.txt

    Data.gov (United States)

    U.S. Environmental Protection Agency — This is an ASCII file with georeferencing information containing data plotted in Figure S8 of the supplemental information section of the manuscript. This dataset is...

  15. Advanced CORK (ACORK) Data from the Nankai Trough, Ocean Drilling Program (ODP) Holes 808I and 1173B

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The ASCII datasets contain pressure values measured at 10-min intervals at the seafloor and several subseafloor depths in two "Advanced CORK" hydrologic...

  16. NPP Multi-Biome: Production and Mortality for Eastern U.S. Forests, 1962-1996, R1

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: This data set contains two ASCII files (tab-delimited .txt format) that provide annual mean above-ground wood increments for temperate forests in 1,956...

  17. Suppression of radiation excitation in focusing environment

    International Nuclear Information System (INIS)

    Huang, Z.; Ruth, R.D.

    1996-12-01

    Radiation damping and quantum excitation in an electron damping ring and a straight focusing channel are reviewed. They are found to be the two limiting cases in the study of a general bending and focusing combined system. In the intermediate regime where the radiation formation length is comparable to the betatron wavelength, quantum excitation can be exponentially suppressed by focusing field. This new regime may have interesting applications in the generation of ultra-low emittance beams

  18. Nova frequency conversion and focusing system

    International Nuclear Information System (INIS)

    Summers, M.A.; Seppala, L.G.; Williams, J.D.

    1985-01-01

    New developments in crystal array technology provided significant improvements in the mechanical design and optical performance of the Nova 2 omega/3 omega array hardware. The final Nova array configuration was tested on the Novette laser and on the first arm of Nova. Ten Nova 2 omega/3 omega crystal arrays were assembled and tested for crystal alignment and wave front distortion before installation on the Nova target chamber. Ten Nova focus lens positioners were assembled and tested last year. The positioning accuracy and repeatability of each assembly were evaluated before installation on the target chamber. A cylindrical focusing system was also developed for installation in the Nova lens positioner assembly. Finally, 10 completed frequency conversion and focusing systems were activated

  19. Final Focus Systems in Linear Colliders

    International Nuclear Information System (INIS)

    Raubenheimer, Tor

    1998-01-01

    In colliding beam facilities, the ''final focus system'' must demagnify the beams to attain the very small spot sizes required at the interaction points. The first final focus system with local chromatic correction was developed for the Stanford Linear Collider where very large demagnifications were desired. This same conceptual design has been adopted by all the future linear collider designs as well as the SuperConducting Supercollider, the Stanford and KEK B-Factories, and the proposed Muon Collider. In this paper, the over-all layout, physics constraints, and optimization techniques relevant to the design of final focus systems for high-energy electron-positron linear colliders are reviewed. Finally, advanced concepts to avoid some of the limitations of these systems are discussed

  20. Focus on Organic Conductors

    Directory of Open Access Journals (Sweden)

    Shinya Uji, Takehiko Mori and Toshihiro Takahashi

    2009-01-01

    Full Text Available Organic materials are usually thought of as electrical insulators. Progress in chemical synthesis, however, has brought us a rich variety of conducting organic materials, which can be classified into conducting polymers and molecular crystals. Researchers can realize highly conducting molecular crystals in charge-transfer complexes, where suitable combinations of organic electron donor or acceptor molecules with counter ions or other organic molecules provide charge carriers. By means of a kind of chemical doping, the charge-transfer complexes exhibit high electrical conductivity and, thanks to their highly crystalline nature, even superconductivity has been observed. This focus issue of Science and Technology of Advanced Materials is devoted to the research into such 'organic conductors'The first organic metal was (TTF(TCNQ, which was found in 1973 to have high conductivity at room temperature and a metal–insulator transition at low temperatures. The first organic superconductor was (TMTSF2PF6, whose superconductivity under high pressures was reported by J´erome in 1980. After these findings, the research on organic conductors exploded. Hundreds of organic conductors have been reported, among which more than one hundred exhibit superconductivity. Recently, a single-component organic conductor has been found with metallic conductivity down to low temperatures.In these organic conductors, in spite of their simple electronic structures, much new physics has arisen from the low dimensionality. Examples are charge and spin density waves, characteristic metal–insulator transitions, charge order, unconventional superconductivity, superconductor–insulator transitions, and zero-gap conductors with Dirac cones. The discovery of this new physics is undoubtedly derived from the development of many intriguing novel organic conductors. High quality single crystals are indispensable to the precise measurement of electronic states.This focus issue

  1. Expanded studies of linear collider final focus systems at the Final Focus Test Beam

    International Nuclear Information System (INIS)

    Tenenbaum, P.G.

    1995-12-01

    In order to meet their luminosity goals, linear colliders operating in the center-of-mass energy range from 3,50 to 1,500 GeV will need to deliver beams which are as small as a few Manometers tall, with x:y aspect ratios as large as 100. The Final Focus Test Beam (FFTB) is a prototype for the final focus demanded by these colliders: its purpose is to provide demagnification equivalent to those in the future linear collider, which corresponds to a focused spot size in the FFTB of 1.7 microns (horizontal) by 60 manometers (vertical). In order to achieve the desired spot sizes, the FFTB beam optics must be tuned to eliminate aberrations and other errors, and to ensure that the optics conform to the desired final conditions and the measured initial conditions of the beam. Using a combination of incoming-beam diagnostics. beam-based local diagnostics, and global tuning algorithms, the FFTB beam size has been reduced to a stable final size of 1.7 microns by 70 manometers. In addition, the chromatic properties of the FFTB have been studied using two techniques and found to be acceptable. Descriptions of the hardware and techniques used in these studies are presented, along with results and suggestions for future research

  2. Expanded studies of linear collider final focus systems at the Final Focus Test Beam

    Energy Technology Data Exchange (ETDEWEB)

    Tenenbaum, Peter Gregory [Stanford Univ., CA (United States)

    1995-12-01

    In order to meet their luminosity goals, linear colliders operating in the center-of-mass energy range from 3,50 to 1,500 GeV will need to deliver beams which are as small as a few Manometers tall, with x:y aspect ratios as large as 100. The Final Focus Test Beam (FFTB) is a prototype for the final focus demanded by these colliders: its purpose is to provide demagnification equivalent to those in the future linear collider, which corresponds to a focused spot size in the FFTB of 1.7 microns (horizontal) by 60 manometers (vertical). In order to achieve the desired spot sizes, the FFTB beam optics must be tuned to eliminate aberrations and other errors, and to ensure that the optics conform to the desired final conditions and the measured initial conditions of the beam. Using a combination of incoming-beam diagnostics. beam-based local diagnostics, and global tuning algorithms, the FFTB beam size has been reduced to a stable final size of 1.7 microns by 70 manometers. In addition, the chromatic properties of the FFTB have been studied using two techniques and found to be acceptable. Descriptions of the hardware and techniques used in these studies are presented, along with results and suggestions for future research.

  3. Plasma-focused cyclic accelerators

    International Nuclear Information System (INIS)

    Mondelli, A.A.; Chernin, D.P.

    1985-01-01

    The use of ambient plasma to neutralize the transverse forces of an intense particle beam has been known for many years. Most recently, the so-called ion-focused regime (IFR) for beam propagation has been used as a means of focusing intense electron beams in linear accelerators and suggested for injecting an electron beam across magnetic field lines into a high-current cyclic accelerator. One technique for generating the required background plasma for IFR propagation is to use a laser to ionize ambient gas in the accelerator chamber. This paper discusses an alternative means of plasma production for IFR, viz. by using RF breakdown. For this approach the accelerator chamber acts as a waveguide. This technique is not limited to toroidal accelerators. It may be applied to any accelerator or recirculator geometry as well as for beam steering and for injection or extraction of beams in closed accelerator configurations

  4. Night Vision Goggles Objectives Lens Focusing Methodology

    National Research Council Canada - National Science Library

    Pinkus, Alan; Task, H. L

    2000-01-01

    ...: interpupillary distance, tilt, eye relief, height, eyepiece and objective lens focus. Currently, aircrew use a Hoffman 20/20 test unit to pre-focus their NVG objective lenses at optical infinity before boarding their aircraft...

  5. Computational numerical modelling of plasma focus

    International Nuclear Information System (INIS)

    Brollo, Fabricio

    2005-01-01

    Several models for calculation of the dynamics of Plasma Focus have been developed. All of them begin from the same physic principle: the current sheet run down the anode length, ionizing and collecting the gas that finds in its way.This is known as snow-plow model.Concerning pinch's compression, a MHD model is proposed.The plasma is treated as a fluid , particularly as a high ionized gas.However, there are not many models that, taking into account thermal equilibrium inside the plasma, make approximated calculations of the maximum temperatures reached in the pinch.Besides, there are no models which use those temperatures to estimate the termofusion neutron yield for the Deuterium or Deuterium-Tritium gas filled cases.In the PLADEMA network (Dense Magnetized Plasmas) a code was developed with the objective of describe the plasma focus dynamics, in a conceptual engineering stage.The codes calculates the principal variables (currents, time to focus, etc) and estimates the neutron yield in Deuterium-filled plasma focus devices.It can be affirmed that the code's experimental validation, in its axial and radial stages, was very successfully. However, it was accepted that the compression stage should be formulated again, to find a solution for a large variation of a parameter related with velocity profiles for the particles trapped inside the pinch.The objectives of this work can be stated in the next way : - Check the compression's model hypothesis. Develop a new model .- Implement the new model in the code. Compare results against experimental data of Plasma Focus devices from all around the world [es

  6. Synchrotron radiation focusing by a Bragg--Fresnel lens

    International Nuclear Information System (INIS)

    Aristov, V.V.; Basov, Y.A.; Snigirev, A.A.

    1989-01-01

    Since the discovery of x rays and until the present time the possibilities of their controlling and focusing have been widely discussed. In the hard spectrum region (λ∼1 A) the main focusing schemes are the following: geometrical focusing based on incoherent interaction of wave packets reflected by different regions of bending crystals and coherent (dynamic) focusing performed at the cost of the effect of refraction index angular dispersion near the exact Bragg angle value -θ B . A main disadvantage of geometrical focusing is low spatial resolution (∼0.1 mm) and temperature stability. In the case of coherent focusing a main disadvantage is a narrow angular aperture (∼10 sec. of arc) at spatial resolution (∼1--10 μm). Recently, advances in the development of diffraction physics and microstructuring technology open up possibilities for fabricating effective focusing x-ray optical elements---Bragg--Fresnel lenses (BFL)---with high spatial resolution (∼0.1 μm) at a wide angular aperture and high temperature stability. The present paper describes the main principles of Bragg--Fresnel optics (BFO). It presents the results on the synchrotron experiment and on observation of focusing. In this work the peculiarities of BFL diffraction contrast formation are investigated and image transmission using a BFL is performed. Possibilities of developing x-ray optical schemes of ultrahigh resolution on the basis of BFL elements are also discussed

  7. Tacoma, Washiington 1 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1-second Tacoma Washington Elevation Grid provides bathymetric data in ASCII raster format of 1-second resolution in geographic coordinates. This grid is...

  8. Humboldt, California 1 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1-second Humboldt, California Elevation Grid provides bathymetric data in ASCII raster format of 1-second resolution in geographic coordinates. This grid is...

  9. TOMS EP UV Aerosol Index Daily and Monthly Zonal Means V008 (TOMSEPL3zaer) at GES DISC

    Data.gov (United States)

    National Aeronautics and Space Administration — This data product contains TOMS/EP UV Aerosol Index Daily and Monthly Zonal Means Version 8 data in ASCII format.The Total Ozone Mapping Spectrometer (TOMS) Version...

  10. 24 arc-second Kenai Peninsula Bororugh Alaska Elevation Grid

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 24 arc-second Kenai Peninsula Bororugh Alaska Elevation Grid provides bathymetric data in ASCII raster format of 24 second resolution in geographic coordinates....

  11. 2001 USGS/NASA Airborne Topographic Mapper (ATM) Lidar: Coastal Alabama, Florida, Louisiana, Mississippi, Texas

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This is a non-bare earth data set. ASCII xyz point cloud data were produced from remotely sensed, geographically referenced elevation measurements cooperatively by...

  12. Southwestern Washington 6 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 6-second Southwest Washington Elevation Grid provides bathymetric data in ASCII raster format of 6-second resolution in geographic coordinates. This grid is...

  13. Tacoma, Washiington 3 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 3-second Tacoma Washington Elevation Grid provides bathymetric data in ASCII raster format of 3-second resolution in geographic coordinates. This grid is...

  14. Northern California 6 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 6-second Northern California Elevation Grid provides bathymetric data in ASCII raster format of 6-second resolution in geographic coordinates. This grid is...

  15. San Francisco Bay, California 1 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1-second San Francisco Bay, California Elevation Grid provides bathymetric data in ASCII raster format of 1-second resolution in geographic coordinates. This...

  16. SAFARI 2000 Freshwater Wetlands, 1-Deg (Stillwell-Soller et al.)

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: This data set consists of a southern Africa subset of the Global Distribution of Freshwater Wetlands database 1-degree data and is available in ASCII GRID...

  17. 2 minute Southcentral Alaska Elevation Grid

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 2-minute Southcentral Alaska Elevation Grid provides bathymetric data in ASCII raster format of 2-minute resolution in geographic coordinates. This grid is...

  18. Northern California 36 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 36-second Northern California Elevation Grid provides bathymetric data in ASCII raster format of 36-second resolution in geographic coordinates. This grid is...

  19. Greenland 5 km DEM, Ice Thickness, and Bedrock Elevation Grids

    Data.gov (United States)

    National Aeronautics and Space Administration — A Digital Elevation Model (DEM), ice thickness grid, and bedrock elevation grid of Greenland acquired as part of the PARCA program are available in ASCII text format...

  20. Focusing of Shear Shock Waves

    Science.gov (United States)

    Giammarinaro, Bruno; Espíndola, David; Coulouvrat, François; Pinton, Gianmarco

    2018-01-01

    Focusing is a ubiquitous way to transform waves. Recently, a new type of shock wave has been observed experimentally with high-frame-rate ultrasound: shear shock waves in soft solids. These strongly nonlinear waves are characterized by a high Mach number, because the shear wave velocity is much slower, by 3 orders of magnitude, than the longitudinal wave velocity. Furthermore, these waves have a unique cubic nonlinearity which generates only odd harmonics. Unlike longitudinal waves for which only compressional shocks are possible, shear waves exhibit cubic nonlinearities which can generate positive and negative shocks. Here we present the experimental observation of shear shock wave focusing, generated by the vertical motion of a solid cylinder section embedded in a soft gelatin-graphite phantom to induce linearly vertically polarized motion. Raw ultrasound data from high-frame-rate (7692 images per second) acquisitions in combination with algorithms that are tuned to detect small displacements (approximately 1 μ m ) are used to generate quantitative movies of gel motion. The features of shear shock wave focusing are analyzed by comparing experimental observations with numerical simulations of a retarded-time elastodynamic equation with cubic nonlinearities and empirical attenuation laws for soft solids.

  1. High efficiency focus neutron generator

    Science.gov (United States)

    Sadeghi, H.; Amrollahi, R.; Zare, M.; Fazelpour, S.

    2017-12-01

    In the present paper, the new idea to increase the neutron yield of plasma focus devices is investigated and the results are presented. Based on many studies, more than 90% of neutrons in plasma focus devices were produced by beam target interactions and only 10% of them were due to thermonuclear reactions. While propounding the new idea, the number of collisions between deuteron ions and deuterium gas atoms were increased remarkably well. The COMSOL Multiphysics 5.2 was used to study the given idea in the known 28 plasma focus devices. In this circumstance, the neutron yield of this system was also obtained and reported. Finally, it was found that in the ENEA device with 1 Hz working frequency, 1.1 × 109 and 1.1 × 1011 neutrons per second were produced by D-D and D-T reactions, respectively. In addition, in the NX2 device with 16 Hz working frequency, 1.34 × 1010 and 1.34 × 1012 neutrons per second were produced by D-D and D-T reactions, respectively. The results show that with regards to the sizes and energy of these devices, they can be used as the efficient neutron generators.

  2. 以標準化Metadata 為核心發展金融機構Ontology 之探討 | Developing the Ontology for Financial Institutions based on Standardized Metadata

    Directory of Open Access Journals (Sweden)

    馮國卿、劉文卿 Kuo-Ching Feng、Wenching Liou

    2003-10-01

    Full Text Available

    頁次:45-59

       ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">索引典(Thesaurusascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">與知識本體論(Ontologyascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">兩者皆可提供結構化的詞彙用以描述特定領域知識(Domain Knowledgeascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor

  3. Finding beam focus errors automatically

    International Nuclear Information System (INIS)

    Lee, M.J.; Clearwater, S.H.; Kleban, S.D.

    1987-01-01

    An automated method for finding beam focus errors using an optimization program called COMFORT-PLUS. The steps involved in finding the correction factors using COMFORT-PLUS has been used to find the beam focus errors for two damping rings at the SLAC Linear Collider. The program is to be used as an off-line program to analyze actual measured data for any SLC system. A limitation on the application of this procedure is found to be that it depends on the magnitude of the machine errors. Another is that the program is not totally automated since the user must decide a priori where to look for errors

  4. Focus on Form in task-based language teaching

    NARCIS (Netherlands)

    van de Guchte, M.

    2015-01-01

    This dissertation presents research on the way in which learners focus on grammar in task-based language teaching (TBLT). Such a focus on grammar during meaningful task performance is called a Focus on Form (FonF). For this PhD research project we conducted three experimental studies which

  5. Autofocus system and autofocus method for focusing on a surface

    Science.gov (United States)

    O'Neill, Mary Morabito

    2017-05-23

    An autofocus system includes an imaging device, a lens system and a focus control actuator that is configured to change a focus position of the imaging device in relation to a stage. The electronic control unit is configured to control the focus control actuator to a plurality of predetermined focus positions, and activate the imaging device to obtain an image at predetermined positions and then apply a spatial filter to the obtained images. This generates a filtered image for the obtained images. The control unit determines a focus score for the filtered images such that the focus score corresponds to a degree of focus in the obtained images. The control unit identifies a best focus position by comparing the focus score of the filtered images, and controls the focus control actuator to the best focus position corresponding to the highest focus score.

  6. Focusing procedures in time-of-flight mass spectrometry

    International Nuclear Information System (INIS)

    Ioanoviciu, D.

    2002-01-01

    Time-of-flight mass spectrometry is a fast growing field due to its ability to handle very fast processes and due to its theoretically unlimited mass range. The performances of the time-of-flight mass analysers are heavily dependent on the progress in ion optics, a periodically reviewed field. In this presentation the various focusing procedures in time-of-flight mass spectrometry are reviewed. For ions of the same charge and mass flight time differences result from different potentials at the location of formation and from the initial velocity spread. There is no simultaneous space and velocity focusing in time-of-flight mass spectrometry. Space focusing of first and second order can be reached in time-of-flight mass analysers having two homogeneous electric field ion sources followed by a field free space in front of the detector. Single and double stage homogeneous electric field mirrors can focus in time ions of different energies. These different energies result when ions leaving different initial sites and arriving simultaneously to an intermediate space focus. Convenient mass dispersion can be obtained by including a mirror. Initial velocity focusing is obtained by the delayed extraction procedure in drift space and mirror time-of-flight mass analysers. Post source pulse focusing aims at the same purpose. Ion source electrodes of hyperbolic shape, operated by high voltage pulses can bring major improvements of the resolution, especially at high masses. For each focusing procedure the geometric and/or electric conditions are given as well as the aberrations allowing the mass resolution determination. The various focusing procedures are compared and a prediction of their future performances was tempted. (author)

  7. The final focus test beam project

    International Nuclear Information System (INIS)

    Burke, D.

    1991-05-01

    An overview is given of the Final Focus Test Beam (FFTB) that is being constructed as a prototype final focus system for a future electron-positron linear collider. This beam line will use as input the 50 GeV electron beam from the SLC linac, and is designed to reduce the transverse dimensions of the beam spot at the focal point to 1 μm. 5 refs., 2 figs., 1 tab

  8. The Realization of Focus in Asturian Spanish

    Directory of Open Access Journals (Sweden)

    Covadonga Sánchez-Alvarado

    2018-01-01

    Full Text Available Spanish was classified as a language that only exploits syntactic mechanisms to mark focus. Recent experimental studies, nonetheless, have shown that speakers of different dialects are also able to use prosody to different degrees. This study aims to provide further understanding on the role played by prosody in the realization of focus in Spanish by looking at Asturian Spanish, a dialect in contact with another Romance language, Asturian. The data from a contextualized sentence completion task revealed that a phonological distinction between specific pitch categories (L+focus being elicited (i.e., informational/non-corrective vs. contrastive/corrective. Nonetheless, it also showed that speakers exploit different prosodic features (i.e., pitch range, alignment, and duration to mark focus constituents, although their use differs as a result of that constituents’ function. These findings provide further support for the consideration of languages and specific dialects in a continuum based on the degree to which they use prosody to mark focus and to explore more in detail the phonetic implementation of focal accents.

  9. Dialogicality in Focus

    DEFF Research Database (Denmark)

    The phenomenon which dialogism addresses is human interaction. It enables us to conceptualise human interaction as intersubjective, symbolic, cultural, transformative and conflictual, in short, as complex. The complexity of human interaction is evident in all domains of human life, for example, i......, because rather than applying dialogism to this or that domain, the present volume focuses on dialogicality itself to interrogate the concepts and methods which are taken for granted in the burgeoning literature. (Imprint: Nova Press)...

  10. CRISPR-FOCUS: A web server for designing focused CRISPR screening experiments

    OpenAIRE

    Cao, Qingyi; Ma, Jian; Chen, Chen-Hao; Xu, Han; Chen, Zhi; Li, Wei; Liu, X. Shirley

    2017-01-01

    The recently developed CRISPR screen technology, based on the CRISPR/Cas9 genome editing system, enables genome-wide interrogation of gene functions in an efficient and cost-effective manner. Although many computational algorithms and web servers have been developed to design single-guide RNAs (sgRNAs) with high specificity and efficiency, algorithms specifically designed for conducting CRISPR screens are still lacking. Here we present CRISPR-FOCUS, a web-based platform to search and prioriti...

  11. Instructions to Adopt an External Focus Enhance Muscular Endurance

    Science.gov (United States)

    Marchant, David C.; Greig, Matt; Bullough, Jonathan; Hitchen, Daniel

    2011-01-01

    The influence of internal (movement focus) and external (outcome focus) attentional-focusing instructions on muscular endurance were investigated using three exercise protocols with experienced exercisers. Twenty-three participants completed a maximal repetition, assisted bench-press test on a Smith's machine. An external focus of attention…

  12. TOMS/EP UV Reflectivity Daily and Monthly Zonal Means V008

    Data.gov (United States)

    National Aeronautics and Space Administration — This data product contains TOMS/EP UV Reflectivity Daily and Monthly Zonal Means Version 8 data in ASCII format. (The shortname for this Level-3 Earth Probe TOMS...

  13. Monthly Total Precipitation Observation for Climate Prediction Center (CPC)Forecast Divisions

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This ASCII dataset contains monthly total precipitation for 102 Forecast Divisions within the conterminous U.S. It is derived from the monthly NCDC climate division...

  14. NPP Grassland: Canas, Costa Rica, 1969-1970, R1

    Data.gov (United States)

    National Aeronautics and Space Administration — This data set contains two ASCII text files; one providing above-ground biomass, productivity, and bioelement concentration data for a derived savanna at Cañas (10.4...

  15. Hawaii 36 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 36-second Hawaii Elevation Grid provides bathymetric data in ASCII raster format of 36-second resolution in geographic coordinates. This grid is strictly for...

  16. Sitka, Alaska 9 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Sitka, Alaska Elevation Grid provides bathymetric data in ASCII raster format of 9 arc-second resolution in geographic coordinates. This grid is strictly for...

  17. Central Oregon 6 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 6-second Central Coastal Oregon Elevation Grid provides bathymetric data in ASCII raster format of 6-second resolution in geographic coordinates. This grid is...

  18. Seldovia, Alaska 3 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 3-second Seldovia Alaska Elevation Grid provides bathymetric data in ASCII raster format of 3-second resolution in geographic coordinates. This grid is strictly...

  19. Strait of Juan de Fuca 36 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 36-second Strait of Juan de Fuca Washington Elevation Grid provides bathymetric data in ASCII raster format of 36-second resolution in geographic coordinates....

  20. Sitka, Alaska 1 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Sitka, Alaska Elevation Grid provides bathymetric data in ASCII raster format of 1 arc-second resolution in geographic coordinates. This grid is strictly for...

  1. Northern Oregon 6 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 6-second North Coast Oregon Elevation Grid provides bathymetric data in ASCII raster format of 6-second resolution in geographic coordinates. This grid is...

  2. Seldovia, Alaska 1 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Seldovia, Alaska Elevation Grid provides bathymetric data in ASCII raster format of 1 arc-second resolution in geographic coordinates. This grid is strictly for...

  3. Sitka, Alaska 3 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Sitka, Alaska Elevation Grid provides bathymetric data in ASCII raster format of 3 arc-second resolution in geographic coordinates. This grid is strictly for...

  4. Hawaii 6 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 6-second Hawaii Elevation Grid provides bathymetric data in ASCII raster format of 6-second resolution in geographic coordinates. This grid is strictly for...

  5. Crescent City, California 1 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1-second Crescent City, California Elevation Grid provides bathymetric data in ASCII raster format of 1-second resolution in geographic coordinates. This grid is...

  6. Publications | Page 278 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Multi-level participation for building adaptive capacity : formal ... to adaptive capacity helps formulate a theory of participation based on resilience thinking. ... kinds of ASCII text files for further analysis, with several pre-processing options.

  7. Multibeam Mapping of the West Florida Shelf-The Edges, Gulf of Mexico, Appalachicola, Florida.

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — XYZ ASCII format high-resolution bathymetry data generated from the 2010 multibeam sonar survey of the West Florida Shelf-The Edges, Gulf of Mexico, Appalachicola,...

  8. 2003 NCFMP Lidar: NC Statewide Phase 2

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Airborne LIDAR terrain mapping data acquired January through March 2003. Point data (XYZ) in ASCII format. Horizontal datum NAD83(1995) North Carolina State Plane...

  9. Monthly Mean Temperature Observation for Climate Prediction Center (CPC) Forecast Divisions

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This ASCII dataset contains monthly mean temperatures for 102 Forecast Divisions within the conterminous U.S. and is derived from the monthly NCDC climate division...

  10. Technology of focus detection for 193nm projection lithographic tool

    Science.gov (United States)

    Di, Chengliang; Yan, Wei; Hu, Song; Xu, Feng; Li, Jinglong

    2012-10-01

    With the shortening printing wavelength and increasing numerical aperture of lithographic tool, the depth of focus(DOF) sees a rapidly drop down trend, reach a scale of several hundred nanometers while the repeatable accuracy of focusing and leveling must be one-tenth of DOF, approximately several dozen nanometers. For this feature, this article first introduces several focusing technology, Obtained the advantages and disadvantages of various methods by comparing. Then get the accuracy of dual-grating focusing method through theoretical calculation. And the dual-grating focusing method based on photoelastic modulation is divided into coarse focusing and precise focusing method to analyze, establishing image processing model of coarse focusing and photoelastic modulation model of accurate focusing. Finally, focusing algorithm is simulated with MATLAB. In conclusion dual-grating focusing method shows high precision, high efficiency and non-contact measurement of the focal plane, meeting the demands of focusing in 193nm projection lithography.

  11. Tolerancia de plantas de feijoa (Acca sellowiana [Berg] Burret a la salinidad por NaCl

    Directory of Open Access Journals (Sweden)

    Casierra-Posada Fánor Ernesto

    2006-12-01

    Full Text Available

    ascii-theme-font: major-latin; mso-fareast-font-family: Baskerville; mso-hansi-theme-font: major-latin; mso-bidi-font-family: Baskerville;">Los efectos de la salinidad por NaCl sobre la producción y la distribución de la biomasa, la toma de agua y el área foliar total fueron investigados en plantas de feijoa (ascii-theme-font: major-latin; mso-fareast-font-family: Baskerville-Italic; mso-hansi-theme-font: major-latin; mso-bidi-font-family: Baskerville-Italic;">Acca sellowiana ascii-theme-font: major-latin; mso-fareast-font-family: Baskerville; mso-hansi-theme-font: major-latin; mso-bidi-font-family: Baskerville;">[Berg] Burret cultivadas en materas con suelo bajo condiciones de invernadero, durante ocho meses. Los tratamientos con la sal comenzaron 60 d después del transplante. El NaCl fue agregado en diferentes concentraciones: 0, 20, 40, 60, 80 mM de NaCl en el suelo. Estas concentraciones correspondieron a conductividades eléctricas de 2,8; 4,6; 6,1; 8,4 y 11,1 dSascii-theme-font: major-latin; mso-fareast-font-family: Baskerville; mso-hansi-theme-font: major-latin; mso-bidi-font-family: Baskerville-Bold;">· ascii-theme-font: major-latin; mso-fareast-font-family: Baskerville; mso-hansi-theme-font: major-latin; mso-bidi-font-family: Baskerville;">m-1, respectivamente. Para evitar el choque osmótico, el tratamiento salino fue impuesto progresivamente, aumentando la concentración de sal cada semana hasta alcanzar la

  12. Prosodic Marking of Narrow Focus in Seoul Korean

    Directory of Open Access Journals (Sweden)

    Hae-Sung Jeon

    2017-01-01

    Full Text Available This paper explores prosodic marking of narrow (corrective focus in Seoul Korean. Korean lacks lexical stress and it has a phonologized association between the Accentual Phrase (AP initial segment and intonation. In the experiment, 4 speakers read sentences including a two-item list which were designed to elicit either an L or H AP-initial tone. The durational variations, the pitch events at prosodic boundaries, and 'F''0 'span in 32 sentences read neutrally and 64 sentences read with one of the items under focus were analyzed. The results show that the focused constituent consistently initiates a new prosodic phrase. In comparison to the neutrally spoken or defocused counterpart, the focused constituent was more likely to be realized as an Intonational Phrase (IP in some contexts. Bitonal IP boundary tones were more likely to occur under focus than monotonal tones. In addition, in focused constituents, durational expansion particularly at the phrase-edges, expansion in 'F''0 'span, and raising of the phrase-initial pitch were observed. On the other hand, defocused constituents were not phonetically reduced compared to the neutral counterparts. The results imply that the phonetic cues spreading over the focused constituent complement the exaggerated prosodic boundaries.

  13. PREFACE: Focus section on Hadronic Physics Focus section on Hadronic Physics

    Science.gov (United States)

    Roberts, Craig; Swanson, Eric

    2007-07-01

    Hadronic physics is the study of strongly interacting matter and its underlying theory, Quantum Chromodynamics (QCD). The field had its beginnings after World War Two, when hadrons were discovered in ever increasing numbers. Today, it encompasses topics like the quark-gluon structure of hadrons at varying scales, the quark-gluon plasma and hadronic matter at extreme temperature and density; it also underpins nuclear physics and has significant impact on particle physics, astrophysics, and cosmology. Among the goals of hadronic physics are to determine the parameters of QCD, understand the origin and characteristics of confinement, understand the dynamics and consequences of dynamical chiral symmetry breaking, explore the role of quarks and gluons in nuclei and in matter under extreme conditions and understand the quark and gluon structure of hadrons. In general, the process is one of discerning the relevant degrees of freedom and relating these to the fundamental fields of QCD. The emphasis is on understanding QCD, rather than testing it. The papers gathered in this special focus section of Journal of Physics G: Nuclear and Particle Physics attempt to cover this broad range of subjects. Alkofer and Greensite examine the issue of quark and gluon confinement with the focus on models of the QCD vacuum, lattice gauge theory investigations, and the relationship to the AdS/CFT correspondence postulate. Arrington et al. review nucleon form factors and their role in determining quark orbital momentum, the strangeness content of the nucleon, meson cloud effects, and the transition from nonperturbative to perturbative QCD dynamics. The physics associated with hadronic matter at high temperature and density and at low Bjorken-x at the Relativistic Heavy Ion Collider (RHIC), the SPS at CERN, and at the future LHC is summarized by d'Enterria. The article of Lee and Smith examines experiment and theory associated with electromagnetic meson production from nucleons and

  14. Final focus systems for linear colliders

    International Nuclear Information System (INIS)

    Helm, R.; Irwin, J.

    1992-08-01

    Final focus systems for linear colliders present many exacting challenges in beam optics, component design, and beam quality. Efforts to resolve these problems as they relate to a new generation of linear colliders are under way at several laboratories around the world. We will outline criteria for final focus systems and discuss the current state of understanding and resolution of the outstanding problems. We will discuss tolerances on alignment, field quality and stability for optical elements, and the implications for beam parameters such as emittance, energy spread, bunch length, and stability in position and energy. Beam-based correction procedures, which in principle can alleviate many of the tolerances, will be described. Preliminary results from the Final Focus Test Beam (FFTB) under construction at SLAC will be given. Finally, we mention conclusions from operating experience at the Stanford Linear Collider (SLC)

  15. Final focus systems for linear colliders

    International Nuclear Information System (INIS)

    Helm, R.; Irwing, J.

    1992-01-01

    Final focus systems for linear colliders present many exacting challenges in beam optics, component design, and beam quality. Efforts to resolve these problems as they relate to a new generation of linear colliders are under way at several laboratories around the world. We outline criteria for final focus systems and discuss the current state of understanding and resolution of the outstanding problems. We discuss tolerances on alignment, field quality and stability for optical elements, and the implications for beam parameters such as emittance, energy spread , bunch length, and stability in position and energy. Beam-based correction procedures, which in principle can alleviate many of the tolerances, are described. Preliminary results from the Final Focus Test Beam (FFTB) under construction at SLAC are given. Finally, we mention conclusions from operating experience at the Stanford Linear Collider (SLC). (Author) 16 refs., 4 tabs., 6 figs

  16. Radiation damping in focusing-dominated systems

    International Nuclear Information System (INIS)

    Huang, Zhirong; Chen, Pisin; Ruth, R.D.

    1995-01-01

    A quasi-classical method is developed to calculate the radiation damping of a relativistic particle in a straight, continuous focusing system. In one limiting case where the pitch angle of the particle θ p is much larger than the radiation opening angle 1/γ, the radiation power spectrum is similar to synchrotron radiation and the relative damping rate of the transverse action is proportional to the relative energy loss rate. In the other limiting case where θ p much-lt 1/γ, the radiation is dipole in nature and the relative damping rate of the transverse action is energy-independent and is much faster than the relative energy rate. Quantum excitation to the transverse action is absent in this focusing channel. These results can be extended to bent systems provided that the focusing field dominates over the bending field

  17. A new microcomputer program for processing data in neutron activation analysis

    International Nuclear Information System (INIS)

    Beeley, P.A.; Page, J.A.; Heimlich, M.S.; Queen's Univ., Kingston, ON; Edward, J.B.; Bennett, L.G.I.

    1993-01-01

    A new utility program for processing data in neutron activation analysis (NAA) has been developed for use on MS-DOS microcomputers. Peak areas are read from ASCII data files of gamma-ray spectra which have been processed by a Gaussian peak fitting program, GAMANAL-PC. Elemental concentrations are then calculated by this new program, QUACANAL, via a semi-absolute algorithm that uses pre-determined activation constants. User-defined ASCII library files are employed to specify the elements of interest required for analysis, and (n, p) and (n, α) interferences are taken into account. The program has been written in turbo PASCAL, is menu driven and contains options for processing data from cyclic NAA. An interactive philosophy has been used in designing the program. (author) 12 refs.; 2 figs.; 1 tab

  18. Discrete and modal focusing effects: principles and applications

    DEFF Research Database (Denmark)

    Stamate, Eugen

    2012-01-01

    Charge flux distribution on the surface of biased electrodes of different geometries immersed in a plasma is investigated by three-dimensional simulations and experiments. It is demonstrated that the sheath surrounding the electrodes that interface insulators acts as an electrostatic lens, focusing...... the charges to distinct locations on the electrode surface depending on the entrance coordinates at the sheath edge. Two focusing effects are identified. Discrete focusing leads to the formation of a passive surface of no ion impact, near the edge of the electrodes interfacing insulators. Modal focusing...... results in the formation of certain ‘modal spots’ and/or ‘modal lines’. Several phenomenological aspects and potential applications are reviewed and further discussed, including charge focusing by a three-dimensional plasma–sheath–lens, ion dose uniformity during plasma immersion ion implantation, mass...

  19. Focus Group Evidence: Implications for Design and Analysis

    Science.gov (United States)

    Ryan, Katherine E.; Gandha, Tysza; Culbertson, Michael J.; Carlson, Crystal

    2014-01-01

    In evaluation and applied social research, focus groups may be used to gather different kinds of evidence (e.g., opinion, tacit knowledge). In this article, we argue that making focus group design choices explicitly in relation to the type of evidence required would enhance the empirical value and rigor associated with focus group utilization. We…

  20. Self-focusing Past and Present - Fundamentals and Prospects

    CERN Document Server

    Boyd, Robert W

    2007-01-01

    Self-focusing has been an area of active scientific investigation for years. From a practical point of view, self-focusing effects impose a limit on the power that can be transmitted through a material medium. This book presents a comprehensive treatment of this topic and reviews both theoretical and experimental investigations of self-focusing.

  1. Adaptive photoacoustic imaging using the Mallart-Fink focusing factor

    Science.gov (United States)

    Li, Meng-Lin

    2008-02-01

    Focusing errors caused by sound velocity heterogeneities widen the mainlobe and elevate the sidelobes, thus degrading both spatial and contrast resolutions in photoacoustic imaging. We propose an adaptive array-based photoacoustic imaging technique that uses the Mallart-Fink (MF) focusing factor weighting to reduce the effect of such focusing errors. The definition of the MF focusing factor indicates that the MF focusing factor at the main lobe of the point-spread function is high (close to 1, without speckle noise being present, which is the case in photoacoustic imaging), whereas it is low at the sidelobes. Based on this property, the elevated sidelobes caused by sound velocity heterogeneities in the tissue can be suppressed after being multiplied by the corresponding map of the MF focusing factor on each imaging point; thus the focusing quality can be improved. This technique makes no assumption of sources of focusing errors and directly suppresses the unwanted sidelobe contributions. Numerical experiments with near field phase screen and displaced phase screen models were performed here to verify the proposed adaptive weighting technique. The effect of the signal-to-noise ratio on the MF focusing factor is also discussed.

  2. PREFACE: Focus section on superconducting power systems Focus section on superconducting power systems

    Science.gov (United States)

    Cardwell, D. A.; Amemiya, N.; Fair, R.

    2012-01-01

    This focus section of Superconductor Science and Technology looks at the properties, technology and applications of (RE)BCO and MgB2 based superconductors for power engineering systems. Both bulk and conductor forms of material are addressed, including elements of materials fabrication and processing, and the measurement of their applied properties for various levels of system application. The areas of research include ac losses in type II materials in power devices, cables and coated conductors, the development of high current dc cables and the application of superconductors in levitation devices, motors and fault current limiters. This focus section presents a broad cross-section of contemporary issues, that represent state-of-the-art for power applications of superconductors, and highlights the areas that require further development if commercial applications of these rapidly emerging materials are to be realised. It contains papers from some of the major groups in the field, including contributions from Europe, the USA and Japan, and describes devices that are relatively close to market.

  3. Strait of Juan de Fuca 1 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1-second Strait of Juan de Fuca Washington Elevation Grid provides bathymetric data in ASCII raster format of 1-second resolution in geographic coordinates. This...

  4. Temperature, salinity, and dissolved oxygen profile data collected via CTD casts from R/V Bell Shimada in the Pacific Ocean along the U.S. West Coast during the West Coast Ocean Acidification cruise 2012 as Part of the North American Carbon Program from September 5, 2012 to September 16, 2012 (NODC Accession 0099810)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — One ASCII listing contains 1-dbar averaged CTD data. File cc112.lst contains 1-dbar averaged profiles of pressure, temperature, salinity, and oxygen data. Each...

  5. Multibeam Mapping of Pulley Ridge, Gulf of Mexico, Key West, Florida

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — XYZ ASCII format high-resolution bathymetry data generated from the 2003, 2007, and 2009 combined multibeam sonar survey of Pulley Ridge, Gulf of Mexico, Key West,...

  6. Homer, Alaska 8 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 8-second Homer Alaska Elevation Grid provides bathymetric data in ASCII raster format of 8-second resolution in geographic coordinates. This grid is strictly for...

  7. Newport, Oregon 1/3 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1/3-second Newport, Oregon Elevation Grid provides bathymetric data in ASCII raster format of 1/3-second resolution in geographic coordinates. This grid is...

  8. Bathymetry Mapping of the West Florida Shelf (Steamboat Lumps), Gulf of Mexico (NODC Accession 0001410)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — XYZ ASCII format data generated from the 2001 multibeam sonar survey of the West Florida Shelf, Gulf of Mexico. The data include high-resolution bathymetry and...

  9. Backscatter Mapping of the West Florida Shelf (Southern Region), Gulf of Mexico (NODC Accession 0001410)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — XYZ ASCII format data generated from the 2001 multibeam sonar survey of the West Florida Shelf, Gulf of Mexico. The data include high-resolution bathymetry and...

  10. Seaside, Oregon 1/3 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1/3-second Seaside Oregon Elevation Grid provides bathymetric data in ASCII raster format of 1/3-second resolution in geographic coordinates. This grid is...

  11. Nawiliwili, Hawaii 1/3 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1/3-second Nawiliwili Hawaii Elevation Grid provides bathymetric data in ASCII raster format of 1/3-second resolution in geographic coordinates. This grid is...

  12. Oahu, Hawaii 1 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1-second Oahu Hawaii Elevation Grid provides bathymetric data in ASCII raster format of 1-second resolution in geographic coordinates. This grid is strictly for...

  13. Kodiak, Alaska 3 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 3-second Kodiak Alaska Elevation Grid provides bathymetric data in ASCII raster format of 2.67-second resolution in geographic coordinates. This grid is strictly...

  14. Seward, Alaska 3 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 3 arc-second Seward Alaska Elevation Grid provides bathymetric data in ASCII raster format of 2.67-second resolution in geographic coordinates. This grid is...

  15. SAFARI 2000 Land Cover from AVHRR, 8-km, 1984 (DeFries et al.)

    Data.gov (United States)

    National Aeronautics and Space Administration — This data set consists of a southern African subset of the University of Maryland (UMD) 8-km Global Land Cover product in ASCII GRID and binary image files formats.

  16. SAFARI 2000 Land Cover from AVHRR, 8-km, 1984 (DeFries et al.)

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: This data set consists of a southern African subset of the University of Maryland (UMD) 8-km Global Land Cover product in ASCII GRID and binary image files...

  17. Southwestern Washington 1/3 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1/3-second Southwest Washington Elevation Grid provides bathymetric data in ASCII raster format of 1/3-second resolution in geographic coordinates. This grid is...

  18. [THE ENVIRONMENTAL BASES AND MECHANISM FOR NATURAL OPISTHORCHIASIS FOCUS PULSATION IN THE COMBINED FOCUS OF OPISTHORCHIASIS AND TULAREMIA].

    Science.gov (United States)

    Ushakov, A V

    2015-01-01

    A cyclic change in the epizootic activity of a tularemia activity underlies the mechanism of natural opisthorchiasis focus pulsation in the combined focus of opisthorchiasis and tularemia in the ecosystem of the Konda River. This is due to mass breeding and depression in the water vole (Arvicola terrestris) population. The mass breeding is predetermined by high population reproduction constants. The rodents' potential fecundity occurs with the high capacity of lands, which is caused by the hydrological regime of rivers. The size depression is predetermined by the epizootics of tularemia. The water vole is a host of the pathogens of opisthorchiasis and tularemia. So the mass rodent breeding in the combined infection and invasion focus causes an increase in the number of real invasion sources. The epizootic of tularemia is responsible for elimination of these invasion sources and for decreases in the flow of invasion material, the infection rate of Codiella and hence the amount of their produced cercarae, the extensive and intensive indicators of fish contamination, and the intensity of an epizootic process in the opisthorchiasis focus.

  19. FAMILY INFLUENCE ON FORMATION OF CHILDREN'S MANIPULATIVE ATTITUDES

    Directory of Open Access Journals (Sweden)

    Liubov Ivanovna Ryumshina

    2013-06-01

    Full Text Available The article raises the issue of children's manipulation, and examines the conditions contributing to the formation of the manipulative attitudes. As such are analyzed: importance of these attitudes for the child, existence of manipulative attitudes in parents, family microclimate and position to the manipulations in society.According to the results of an empirical study, the characteristics of the family, provoking the development of manipulative behavior in children, are described. The members of this family hardly cooperate with each other and others, are focused on self-interests, and try to satisfy them without much effort, and by using the people around them. It is accompanied by the insincerity and lack of attention to the child, and most of all to his needs, feelings and emotional stress. Normal 0 false false false RU X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Обычная таблица"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-fareast-language:EN-US;}

  20. Discrete and modal focusing effects: principles and applications

    International Nuclear Information System (INIS)

    Stamate, E

    2012-01-01

    Charge flux distribution on the surface of biased electrodes of different geometries immersed in a plasma is investigated by three-dimensional simulations and experiments. It is demonstrated that the sheath surrounding the electrodes that interface insulators acts as an electrostatic lens, focusing the charges to distinct locations on the electrode surface depending on the entrance coordinates at the sheath edge. Two focusing effects are identified. Discrete focusing leads to the formation of a passive surface of no ion impact, near the edge of the electrodes interfacing insulators. Modal focusing results in the formation of certain ‘modal spots’ and/or ‘modal lines’. Several phenomenological aspects and potential applications are reviewed and further discussed, including charge focusing by a three-dimensional plasma–sheath–lens, ion dose uniformity during plasma immersion ion implantation, mass spectrometry and plasma monitoring. (paper)

  1. Task-focused modeling in automated agriculture

    Science.gov (United States)

    Vriesenga, Mark R.; Peleg, K.; Sklansky, Jack

    1993-01-01

    Machine vision systems analyze image data to carry out automation tasks. Our interest is in machine vision systems that rely on models to achieve their designed task. When the model is interrogated from an a priori menu of questions, the model need not be complete. Instead, the machine vision system can use a partial model that contains a large amount of information in regions of interest and less information elsewhere. We propose an adaptive modeling scheme for machine vision, called task-focused modeling, which constructs a model having just sufficient detail to carry out the specified task. The model is detailed in regions of interest to the task and is less detailed elsewhere. This focusing effect saves time and reduces the computational effort expended by the machine vision system. We illustrate task-focused modeling by an example involving real-time micropropagation of plants in automated agriculture.

  2. Bringing customer focus to power generation

    Energy Technology Data Exchange (ETDEWEB)

    Mahoney, J.V. [USGen Power Services (United States)

    1997-02-01

    The restructuring of the power generation industry and the impact it will have on a company`s success was discussed. Some companies are following one of three distinct strategies for survival, the GENCO, MARKETCO and TRADECO. The GENCO focuses on aggregating low cost, kick butt generation assets that could be either regionally concentrated or geographically distributed. The TRADECO invests in few, or even no, assets. Its only objective is to maximize net income. The MARKETCO structure focuses on understanding and meeting customers` needs. The MARKETCO puts as much value in aggregating `load` as it does on assets. It was suggested that the MARKETCO was the quickest path to success in the restructured electric industry, since it is plainly evident that in the New Millenium the customer will be king, and companies will not survive unless they focus the majority of their efforts on the customer.

  3. Applications of focused ion beams in microelectronics

    International Nuclear Information System (INIS)

    Broughton, C.; Beale, M.I.J.; Deshmukh, V.G.I.

    1986-04-01

    We present the conclusions of the RSRE programme on the application of focused ion beams in microelectronics and review the literature published in this field. We discuss the design and performance of focused beam implanters and the viability of their application to semiconductor device fabrication. Applications in the areas of lithography, direct implantation and micromachining are discussed in detail. Comparisons are made between the use of focused ion beams and existing techniques for these fabrication processes with a strong emphasis placed on the relative throughputs. We present results on a novel spot size measurement technique and the effect of beam heating on resist. We also present the results of studies into implantation passivation of resist to oxygen plasma attack as basis for a dry development lithography scheme. A novel lithography system employing flood electron exposure from a photocathode which is patterned by a focused ion beam which can also be used to repair mask defects is considered. (author)

  4. Laser-nucleated acoustic cavitation in focused ultrasound.

    Science.gov (United States)

    Gerold, Bjoern; Kotopoulis, Spiros; McDougall, Craig; McGloin, David; Postema, Michiel; Prentice, Paul

    2011-04-01

    Acoustic cavitation can occur in therapeutic applications of high-amplitude focused ultrasound. Studying acoustic cavitation has been challenging, because the onset of nucleation is unpredictable. We hypothesized that acoustic cavitation can be forced to occur at a specific location using a laser to nucleate a microcavity in a pre-established ultrasound field. In this paper we describe a scientific instrument that is dedicated to this outcome, combining a focused ultrasound transducer with a pulsed laser. We present high-speed photographic observations of laser-induced cavitation and laser-nucleated acoustic cavitation, at frame rates of 0.5×10(6) frames per second, from laser pulses of energy above and below the optical breakdown threshold, respectively. Acoustic recordings demonstrated inertial cavitation can be controllably introduced to the ultrasound focus. This technique will contribute to the understanding of cavitation evolution in focused ultrasound including for potential therapeutic applications. © 2011 American Institute of Physics

  5. CT-FC: more Comprehensive Traversal Focused Crawler

    Directory of Open Access Journals (Sweden)

    NFN Kuspriyanto

    2012-03-01

    Full Text Available In todays world, people depend more on the WWW information, including professionals who have to analyze the data according their domain to maintain and improve their business. A data analysis would require information that is comprehensive and relevant to their domain. Focused crawler as a topical based Web indexer agent is used to meet this applications information need. In order to increase the precision, focused crawler face the problem of low recall. The study on WWW hyperlink structure characteristics indicates that many Web documents are not strong connected but through co-citation & co-reference. Conventional focused crawler that uses forward crawling strategy could not visit the documents in these characteristics. This study proposes a more comprehensive traversal framework. As a proof, CT-FC (a focused crawler with the new traversal framework ran on DMOZ data that is representative to WWW characteristics. The results show that this strategy can increase the recall significantly.

  6. NATIVE LANGUAGE INFLUENCE IN LEARNERS'. ASSESSMENT OF ENGLISH FOCUS

    Directory of Open Access Journals (Sweden)

    M. L. Garcia Lecumberri

    2001-06-01

    Full Text Available Accentual focus is a frequent linguistic device in English which may also be used in Spanish but less widely and less frequently. Given this disparity, it was expected that native language influence would manifest itself in FL leamers' focus assessrnents as cornpared to native English speakers. Other factors were also expected to account of listener perceptions, such as task type and linguistic competence. Two focus domains were used to test hypotheses: utterance initial and utterance medial focus. Focus identification was tested using two tasks which differed in their cognitive demands: multiple choice and open questions. Acceptability was estirnated by asking listeners to rate utterances on a five point scale. English NL listeners displayed better focus identification rates as cornpared to FL learners. This result may be understood both as an effect of native competence advantage and also as a reflection of native language influence. Both listener groups found utterance initial focus easier to identi@ and considered it to be more acceptable than medial focus. Both groups showed worse results in the open test, which is interpreted as a consequence of this task being more demanding on listeners' explicit knowledge. These trends were much more pronounced amongst FL leamers. It is suggested that the potential ambiguity of English medial focus is partly responsible for the bias against it. Additionally, Spanish listeners results show the their NL influence in this bias as well as in the good results for initial focus and acceptability estirnations.

  7. Focus on Russia

    International Nuclear Information System (INIS)

    Van Koningsbrugge, H.

    2008-01-01

    A few articles in this magazine focus on the developments and policies in Russia. The titles of some of the articles are 'Between state power and liberal reform' on the task of the new Russian president to find a new balance between government interference and market economy; 'Green light for green energy' on the willingness of the Russian government to stimulate renewable energy; 'Russian power play' on the role of Gazprom in the liberalization of the Russian power market; 'Gazprom's risky strategy' on it's pricing strategy

  8. Non-hydrodynamic model of plasma focus structure

    International Nuclear Information System (INIS)

    Imshennik, V.S.; Zueva, N.M.; Lokutsievskij, O.V.; Mikhajlova, M.S.

    1985-01-01

    Experimental and theoretical plasma focus study has resulted in the necessity of creating a non-hydrodynamic plasma focus structure model (MKHD model). This model describes the final stage of plasma focus, which starts immediately after maximum plasma compression. It is related to a very limited space near the neck of the sausage instability. The MKHD model is two-dimensional, axially symmetric and collisionless with respect to the ions and magnetohydrodynamic with respect to the electrons; it accounts for the pinch instability of the sausage type (m=0 mode). The MKHD model, first of all, explains the long time of the plasma focus existence and non-thermonuclear peculiarities in the neutron yield. The initial and boundary conditions are formulated in accordance with the experiments and the results of computations in the 2D MHD model. A non-stationary process of plasma focus dynamics is studied numerically for a relatively long time - about 20 ns; this time is, in principle, not restricted. The computations show that the external edge of the neck expands rather slowly (at a speed that is lower than the thermal ion velocity, by an order of magnitude), and the magnetic field energy is converted to the kinetic energy of the chaotic ion motion (which is doubled for the time of computation). A 'supra-thermal' tail (with the deuterium ion energy higher than 10 keV) forms slowly at the ion distribution function; this tail determines a substantial part of the total neutron yield. The formation of stable vortices, which actually determine the structure of the plasma flow during the developed non-hydrodynamic stage of the plasma focus, is also found in the computations. These properties of the development of the sausage instability, as found in the numerical experiment with the MKHD plasma focus model, are in qualitative agreement with the behaviour of an instability of the same type in the MHD models of the Z-pinch

  9. Focal CT abnormality and epileptogenic focus

    International Nuclear Information System (INIS)

    Yagi, Kazuichi; Mihara, Tadahiro; Tottori, Takayasu; Matsuda, Kazumi; Watanabe, Yutaka; Seino, Masakazu

    1989-01-01

    In 31 patients with temporal lobe epilepsy, the precise site of epileptogenic focus was determined by means of a depth EEG recording as one of the presurgical evaluations. In 13 patients, a CT scan revealed focal lesions; 7 in the left temporal lobe and 6 in the right temporal lobe. In 5 of the 7 patients and in 5 of the 6 patients the epileptogenic foci were determined in the temporal lobe on the side of a CT lesion. However, in 2 of the patients with a CT lesion in the left temporal lobe, independent epileptogenic foci were found in both the temporal lobes, and in the other patient with a CT lesion in the right temporal lobe, they were found in the right frontal and left temporal lobes. Thus, the CT lesions agreed in lateralization and focality with the epileptogenic foci in 10 of the 13 patients (77%), but they disagreed in 3 (23%). A CT lesion disclosed in the temporal lobe does not necessarily indicate the side and/or site where the epileptogenic focus may be localized. Although exceptions may be made, spatial disagreement was exemplified between the CT lesion and epileptogenic focus. Therefore, extreme caution has to be taken on the side and/or site of the epileptogenic focus when functional surgical indication is to be made. (author)

  10. Invited paper: Plasma focus in China

    International Nuclear Information System (INIS)

    Jinji, Y.

    1983-01-01

    Plasma focus research in China began in the seventies. There are now 3 devices in two institutions, Tsinghua University in Beijing and the Institute of Mining and Metallurgy in Changsha. The research works can be divided into two groups: the engineering problems related to plasma focus devices and the plasma phenomena and process of the focus. Under the first subject, insulation and plasma spark gaps are studied. By casting silicon rubber onto the ends of the transmission cable, the length of insulation can be appreciably reduced. With the method of simulating charges, the electric field distribution of a field distortion type spark gap was calculated. Comparison of the field distribution before and after triggering was represented. It shows that the electric field strength of the gap after triggering may reach 14-80 times as high as that before triggering. Thus the characteristic of the gap may be improved remarkably. In respect of the phenomena of the plasma focus, neutron emission and X-ray emission were measured. It was shown that the proportion of X-ray with higher energy depends upon the material of the inner electrode. Two kinds of stud materials, tungsten and molybendum, were adopted. Measured results of the distribution of X-ray energy were represented respectively for the two materials used. Evidently, the distribution changed with the inserted materials

  11. Synthesis of focusing-and-deflection columns

    International Nuclear Information System (INIS)

    Szilagyi, M.; Mui, P.H.

    1995-01-01

    Szilagyi and Szep have demonstrated that focusing lenses of high performances can be constructed from a column of circular plate electrodes. Later, Szilagyi modified that system to include dipole, quadrupole, and octupole components by partitioning each plate into eight equal sectors. It has already been shown that the additional quadrupole components can indeed bring about substantial improvements in the focusing of charged particle beams. In this article, that design procedure is expanded to construct columns capable of both focusing and deflecting particle beams by just introducing additional dipole components. In this new design, the geometry of the system remains unchanged. The only extra complication is the demand for more individual controls of the sector voltages. Two sample designs, one for negative ions and one for electrons, are presented showing that in both cases a ±2.3 mrad diverging beam can be focused down to a spot of less than 50 nm in radius over a scanning circular area of radius 0.25 mm. The details of the two systems are given in Sec. IV along with the source conditions. The performance of the negative ion system is found to be comparable to the published data. For the relativistic electron system, the interaction of individual components to reduce various aberrations is investigated. copyright 1995 American Vacuum Society

  12. Hilo, Hawaii 1/3 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1/3-second Hilo, Hawaii Elevation Grid provides bathymetric data in ASCII raster format of 1/3-second resolution in geographic coordinates. This grid is strictly...

  13. NPP Grassland: Beacon Hill, U.K., 1972-1993, R1

    Data.gov (United States)

    National Aeronautics and Space Administration — This data set contains two ASCII text files, one providing productivity measurements for a chalk grassland on Beacon Hill, West Sussex, U.K. (50.92 N, -0.85 W) and...

  14. Method of Storing Raster Image in Run Lengths Having Variable Numbers of Bytes and Medium with Raster Image Thus Stored

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The invention implements a run-length file format with improved space-sav qualities. The file starts with a header in ASCII format and includes information such as...

  15. TERRAIN Submission for VAN BUREN COUNTY, IA

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — This is collection level metadata for LAS and ASCII data files from the statewide Iowa Lidar Project. The Iowa Light Detection and Ranging (LiDAR) Project collects...

  16. Iowa LiDAR Mapping Project

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — This is collection level metadata for LAS and ASCII data files from the statewide Iowa Lidar Project. The Iowa Light Detection and Ranging (LiDAR) Project collects...

  17. San Diego, California 1/3 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1/3-second San Diego, California Elevation Grid provides bathymetric data in ASCII raster format of 1/3-second resolution in geographic coordinates. This grid is...

  18. Pearl Harbor, Hawaii 1 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1/3-second Pearl Harbor Hawaii Elevation Grid provides bathymetric data in ASCII raster format of 1/3-second resolution in geographic coordinates. This grid is...

  19. Kailua-Kona, Hawaii 1/3 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1/3-second Kailua-Kona Hawaii Elevation Grid provides bathymetric data in ASCII raster format of 1/3-second resolution in geographic coordinates. This grid is...

  20. Gridded multibeam bathymetry of Apra Harbor, Guam U.S. Territory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Gridded bathymetry from Apra Harbor, Guam U.S. Territory. The netCDF and Arc ASCII grids include multibeam bathymetry from the Reson SeaBat 8125 multibeam sonar...

  1. 77 FR 281 - Proposed Consent Decree, Clean Air Act Citizen Suit

    Science.gov (United States)

    2012-01-04

    ... holidays. Comments on a disk or CD-ROM should be formatted in Word or ASCII file, avoiding the use of... U.S. Virgin Islands had failed to submit CAA SIPs for improving visibility in mandatory Federal...

  2. Guam 1/3 arc-second DEM

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 1/3-second Guam Elevation Grid provides bathymetric data in ASCII raster format of 1/3-second resolution in geographic coordinates. This grid is strictly for...

  3. Child-Focused and Context-Focused Behaviors of Physical and Occupational Therapists during Treatment of Young Children with Cerebral Palsy

    NARCIS (Netherlands)

    Kruijsen-Terpstra, Anne J A; Ellens, Mariëlle; Ketelaar, Marjolijn; Verschuren, Olaf; Di Rezze, Briano; Gorter, Jan Willem; Visser-Meily, Anne M A; Jongmans, Marian J.

    2016-01-01

    Aims: To (1) describe the child- and context-focused behaviors of physical and occupational therapists, and (2) compare the behaviors of therapists in a standard therapy session with those of therapists trained to deliver child- and context-focused services. Method: Videos of 49 therapy sessions

  4. Child-Focused and Context-Focused Behaviors of Physical and Occupational Therapists during Treatment of Young Children with Cerebral Palsy

    NARCIS (Netherlands)

    Kruijsen-Terpstra, Anne J A; Ellens, Mariëlle; Ketelaar, Marjolijn; Verschuren, Olaf; Di Rezze, Briano; Gorter, Jan Willem; Visser-Meily, Anne M A; Jongmans, Marian J

    2016-01-01

    AIMS: To (1) describe the child- and context-focused behaviors of physical and occupational therapists, and (2) compare the behaviors of therapists in a standard therapy session with those of therapists trained to deliver child- and context-focused services. METHOD: Videos of 49 therapy sessions

  5. Simultaneous spatio-temporal focusing for tissue manipulation

    Directory of Open Access Journals (Sweden)

    Squier J.

    2013-11-01

    Full Text Available Simultaneous spatiotemporal focusing (SSTF is applied to lens tissue and compared directly with standard femtosecond micromachining of the tissue at the same numerical aperture. Third harmonic generation imaging is used for spatio-temporal characterization of the processing conditions obtained with both a standard and SSTF focus.

  6. HINS Linac front end focusing system R&D

    Energy Technology Data Exchange (ETDEWEB)

    Apollinari, G.; Carcagno, R.H.; Dimarco, J.; Huang, Y.; Kashikhin, V.V.; Orris, D.F.; Page, T.M.; Rabehl, R.; Sylvester, C.; Tartaglia, M.A.; Terechkine, I.; /Fermilab /Argonne

    2008-08-01

    This report summarizes current status of an R&D program to develop a focusing system for the front end of a superconducting RF linac. Superconducting solenoids will be used as focusing lenses in the low energy accelerating sections of the front end. The development of focusing lenses for the first accelerating section is in the production stage, and lens certification activities are in preparation at FNAL. The report contains information about the focusing lens design and performance, including solenoid, dipole corrector, and power leads, and about cryogenic system design and performance. It also describes the lens magnetic axis position measurement technique and discusses scope of an acceptance/certification process.

  7. SKEW QUADRUPOLE FOCUSING LATTICES AND APPLICATIONS

    International Nuclear Information System (INIS)

    Parker, B.

    2001-01-01

    In this paper we revisit using skew quadrupole fields in place of traditional normal upright quadrupole fields to make beam focusing structures. We illustrate by example skew lattice decoupling, dispersion suppression and chromatic correction using the neutrino factory Study-II muon storage ring design. Ongoing BNL investigation of flat coil magnet structures that allow building a very compact muon storage ring arc and other flat coil configurations that might bring significant magnet cost reduction to a VLHC motivate our study of skew focusing

  8. Ion beam generation and focusing

    International Nuclear Information System (INIS)

    Miller, P.A.; Mendel, C.W.; Swain, D.W.; Goldstein, S.A.

    1975-01-01

    Calculations have shown that efficiently generated and focused ion beams could have significant advantages over electron beams in achieving ignition of inertially-confined thermonuclear fuel. Efficient ion beam generation implies use of a good ion source and suppression of net electron current. Net electron flow can be reduced by allowing electrons to reflex through a highly transparent anode or by use of transverse magnetic fields (either beam self-fields or externally applied fields). Geometric focusing can be achieved if the beam is generated by appropriately shaped electrodes. Experimental results are presented which demonstrate ion beam generation in both reflexing and pinched-flow diodes. Spherically shaped electrodes are used to concentrate a proton beam, and target response to proton deposition is studied

  9. Designing focusing solenoids for superconducting RF accelerators

    Energy Technology Data Exchange (ETDEWEB)

    Davis, G.; Kashikhin, V.V.; Page, T.; Terechkine, I.; Tompkins, J.; Wokas, T.; /Fermilab

    2006-08-01

    The design of a focusing solenoid for use in a superconducting RF linac requires resolving a range of problems with conflicting requirements. Providing the required focusing strength contradicts the goal of minimizing the stray field on the surfaces of adjacent superconducting RF cavities. The requirement of a compact solenoid, able to fit into a gap between cavities, contradicts the need of mechanical support necessary to restrain electromagnetic forces that can result in coil motion and subsequent quenching. In this report we will attempt to address these and other issues arising during the development of focusing solenoids. Some relevant test data will also be presented.

  10. Focus Groups as Transformative Spiritual Encounters

    Directory of Open Access Journals (Sweden)

    Sharon Moloney PhD

    2011-03-01

    Full Text Available Focus groups are a valuable method for exploring the construction and negotiation of meanings. In her doctoral research the author explored how Australian women's experiences of menstruation, birth, and spirituality are invested with meaning and how that meaning influences and shapes those experiences. The focus group has been described as a potentially liminal space, which enables the discussion of taboo subjects by breaking the ice and giving people permission to comment. In addition, she discovered that the groups could be occasions of empowerment and transformation for both participants and researcher. In a way that far exceeded her expectations, the group format was ideally suited to feminist research and the organic inquiry methodology she used. Some groups became deeply spiritual encounters that were nourishing and transformative for all. This article explores how focus groups can be vehicles of spiritual transformation, examining one group in particular to highlight the points raised.

  11. On the self-focusing of electric helicons

    International Nuclear Information System (INIS)

    Tsintadze, N.L.; El-Ashry, M.Y.; Garuchava, D.P.

    1987-07-01

    The present work is devoted to the investigation of the stationary self-focusing of circularly polarized helicons in a magnetized plasma in the case of ultra-relativistic intensities. It is shown that the larger intensity and effective width at the boundary is the much faster growing self-focusing. (author). 8 refs

  12. Focus, accent, and argument structure: effects on language comprehension.

    Science.gov (United States)

    Birch, S; Clifton, C

    1995-01-01

    Four experiments investigated the effect of syntactic argument structure on the evaluation and comprehension of utterances with different patterns of pitch accents. Linguistic analyses of the relation between focus and prosody note that it is possible for certain accented constituents within a broadly focused phrase to project focus to the entire phrase. We manipulated focus requirements and accent in recorded question-answer pairs and asked listeners to make linguistic judgments of prosodic appropriateness (Experiments 1 and 3) or to make judgments based on meaningful comprehension (Experiments 2 and 4). Naive judgments of prosodic appropriateness were generally consistent with the linguistic analyses, showing preferences for utterances in which contextually new noun phrases received accent and old noun phrases did not, but suggested that an accented new argument NP was not fully effective in projecting broad focus to the entire VP. However, the comprehension experiments did demonstrate that comprehension of a sentence with broad VP focus was as efficient when only a lexical argument NP received accent as when both NP and verb received accent. Such focus projection did not occur when the argument NP was an "independent quantifier" such as nobody or everything. The results extend existing demonstrations that the ease of understanding spoken discourse depends on appropriate intonational marking of focus to cases where certain structurally-defined words can project focus-marking to an entire phrase.

  13. [Aerodynamic focusing of particles and heavy molecules

    International Nuclear Information System (INIS)

    de la Mora, J.F.

    1990-01-01

    By accelerating a gas containing suspended particles or large molecules through a converging nozzle, the suspended species may be focused and therefore used to write fine lines on a surface. Our objective was to study the limits on how narrow this focal region could be as a function of particle size. We find that, for monodisperse particles with masses m p some 3.6 x 10 5 times larger than the molecular mass m of the carrier gas (diameters above some 100 angstrom), there is no fundamental obstacle to directly write submicron features. However, this conclusion has been verified experimentally only with particles larger than 0.1 μm. Experimental, theoretical and numerical studies on the defocusing role of Brownian motion for very small particles or heavy molecules have shown that high resolution (purely aerodynamic) focusing is impossible with volatile molecules whose masses are typically smaller than 1000 Dalton. For these, the minimal focal diameter after optimization appears to be 5√(m/m p ) times the nozzle diameter d n . But combinations of focused lasers and aerodynamic focusing appear as promising for direct writing with molecular precursors. Theoretical and numerical schemes capable of predicting the evolution of the focusing beam, including Brownian motion effects, have been developed, although further numerical work would be desirable. 11 refs

  14. Does Varying Attentional Focus Affect Skill Acquisition in Children? A Comparison of Internal and External Focus Instructions and Feedback

    Science.gov (United States)

    Agar, Charles; Humphries, Charlotte A.; Naquin, Millie; Hebert, Edward; Wood, Ralph

    2016-01-01

    Recently, researchers have concluded that motor skill performance is enhanced when learners adopt an external attentional focus, compared to adopting an internal focus. We extended the line of inquiry to children and examined if skill learning in children was differentially affected by providing instructions and feedback that direct attentional…

  15. Development of TPF-1 plasma focus for education

    Science.gov (United States)

    Picha, R.; Promping, J.; Channuie, J.; Poolyarat, N.; Sangaroon, S.; Traikool, T.

    2017-09-01

    The plasma focus is a device that uses high voltage and electromagnetic force to induce plasma generation and acceleration, in order to cause nuclear reactions. Radiation of various types (X-ray, gamma ray, electrons, ions, neutrons) can be generated using this method during the pinch phase, thus making the plasma focus able to serve as a radiation source. Material testing, modification, and identification are among the current applications of the plasma focus. Other than being an alternative option to isotopic sources, the plasma focus, which requires multidisciplinary team of personnel to design, operate, and troubleshoot, can also serve as an excellent learning device for physics and engineering students in the fields including, but not limited to, plasma physics, nuclear physics, electronics engineering, and mechanical engineering. This work describes the parameters and current status of Thai Plasma Focus 1 (TPF-1) and the characteristics of the plasma being produced in the machine using a Rogowski coil.

  16. A wavelet domain adaptive image watermarking method based on chaotic encryption

    Science.gov (United States)

    Wei, Fang; Liu, Jian; Cao, Hanqiang; Yang, Jun

    2009-10-01

    A digital watermarking technique is a specific branch of steganography, which can be used in various applications, provides a novel way to solve security problems for multimedia information. In this paper, we proposed a kind of wavelet domain adaptive image digital watermarking method using chaotic stream encrypt and human eye visual property. The secret information that can be seen as a watermarking is hidden into a host image, which can be publicly accessed, so the transportation of the secret information will not attract the attention of illegal receiver. The experimental results show that the method is invisible and robust against some image processing.

  17. PM1 steganographic algorithm using ternary Hamming Code

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2015-12-01

    Full Text Available PM1 algorithm is a modification of well-known LSB steganographic algorithm. It has increased resistance to selected steganalytic attacks and increased embedding efficiency. Due to its uniqueness, PM1 algorithm allows us to use of larger alphabet of symbols, making it possible to further increase steganographic capacity. In this paper, we present the modified PM1 algorithm which utilizies so-called syndrome coding and ternary Hamming code. The modified algorithm has increased embedding efficiency, which means fewer changes introduced to carrier and increased capacity.[b]Keywords[/b]: steganography, linear codes, PM1, LSB, ternary Hamming code

  18. DFRFT: A Classified Review of Recent Methods with Its Application

    Directory of Open Access Journals (Sweden)

    Ashutosh Kumar Singh

    2013-01-01

    Full Text Available In the literature, there are various algorithms available for computing the discrete fractional Fourier transform (DFRFT. In this paper, all the existing methods are reviewed, classified into four categories, and subsequently compared to find out the best alternative from the view point of minimal computational error, computational complexity, transform features, and additional features like security. Subsequently, the correlation theorem of FRFT has been utilized to remove significantly the Doppler shift caused due to motion of receiver in the DSB-SC AM signal. Finally, the role of DFRFT has been investigated in the area of steganography.

  19. Aplikasi Kriptografi dan Steganografi Menggunakan Metode Least Significant Bit (LSB dan One Time Pad (OTP

    Directory of Open Access Journals (Sweden)

    Ali Mahmudi

    2016-05-01

    Full Text Available With the development of technology, especially in the IT field, the more developed also the current exchange of information using internet technology. Security of information transmitted via the Internet network is a must to maintain the confidentiality and originality of the information. Technology to maintain the security of the information used in this paper is a cryptography and steganography. Application cryptography to secure information on the text, then the information is hidden in digital images. So that only users who have a lock / unlock passwords only, can read the message in greeting such information.

  20. IJIMAI Editor's Note - Vol. 3 Issue 5

    Directory of Open Access Journals (Sweden)

    Rubén Gonzalez-Crespo

    2015-12-01

    Full Text Available The research works presented in this issue are based on various topics of interest, among which are included: DSL, Machine Learning, Information hiding, Steganography, SMA, RTECTL, SMT-based bounded model checking, STS, Spatial sound, X3D, X3DOM, Web Audio API, Web3D, Real-time, Realistic 3D, 3D Audio, Apache Wave, API, Collaborative, Pedestrian Inertial, Navigation System, Indoor Location, Learning Algorithms, Information Fusion, Agile development, Scrum, Cross Functional Teams, Knowledge Transfer, Technological Innovation, Technology Transfer, Social Networks Analysis, Project Management, Links in Social Networks, Rights of Knowledge Sharing and Web 2.0.