Siga este enlace para ver otros tipos de publicaciones sobre el tema: Hide model.

Artículos de revistas sobre el tema "Hide model"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Hide model".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

DEWELL, G. A., C. A. SIMPSON, R. D. DEWELL, D. R. HYATT, K. E. BELK, J. A. SCANGA, P. S. MORLEY et al. "Risk Associated with Transportation and Lairage on Hide Contamination with Salmonella enterica in Finished Beef Cattle at Slaughter". Journal of Food Protection 71, n.º 11 (1 de noviembre de 2008): 2228–32. http://dx.doi.org/10.4315/0362-028x-71.11.2228.

Texto completo
Resumen
Transportation of cattle to the slaughter plant could influence hide contamination with Salmonella enterica. Fecal and hide samples were obtained from 40 lots of cattle at the feedlot and again at the slaughter plant. Potential risk factors for hide contamination were evaluated. A multilevel Poisson regression model was used to determine whether transportation and lairage were associated with hide contamination by Salmonella. Cattle with hide samples positive for Salmonella at the feedlot had twice the risk of having positive slaughter hide samples compared with cattle without positive feedlot hide samples (relative risk [RR], 1.9). Cattle transported in trailers from which samples positive for Salmonella were collected had twice the risk of having positive slaughter hide samples compared with cattle transported in culture-negative trailers (RR, 2.3). Cattle transported for long distances had twice the risk of having positive hide samples at slaughter compared with cattle transported shorter distances (RR, 2.3). Cattle held in lairage pens contaminated with feces had twice the risk of having positive slaughter hide samples compared with cattle held in clean pens (RR, 1.8). Cattle held off feed longer than 18 h before loading had twice the risk of having positive slaughter hide samples compared with cattle held off feed for shorter times (RR, 1.7). Cattle that were agitated during loading had twice the risk of having positive slaughter hide samples compared with cattle that were calm (RR, 2.2). These findings suggest that variables associated with transportation and lairage can impact the presence of Salmonella on the hides of cattle at slaughter.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

NIBBI, A. "An Early Dynastic Hide-Covered Model Papyrus Boat". Revue d'Égyptologie 44 (1 de enero de 1993): 81–101. http://dx.doi.org/10.2143/re.44.0.2011258.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Mather, A. E., S. W. J. Reid, S. A. McEwen, H. E. Ternent, R. J. Reid-Smith, P. Boerlin, D. J. Taylor, W. B. Steele, G. J. Gunn y D. J. Mellor. "Factors Associated with Cross-Contamination of Hides of Scottish Cattle by Escherichia coli O157". Applied and Environmental Microbiology 74, n.º 20 (22 de agosto de 2008): 6313–19. http://dx.doi.org/10.1128/aem.00770-08.

Texto completo
Resumen
ABSTRACT The putative source of hide contamination for 236 cattle in Scotland followed from the farm through to slaughter was determined using phage and verocytotoxin type data. The majority of cattle (84%) were found to have subtypes of Escherichia coli O157 on their hide that had not been found previously in any animal from the farm of origin, strongly suggesting that contamination occurred once animals had left the farm of origin. Using logistic regression analysis, several variables and factors were found to be strongly associated (P < 0.01) with cross-contamination of cattle hides at the univariate level; commercial transport to slaughter, transport with other animals, use of a crush, line automation, and increasing slaughterhouse throughput were all risk factors, while feeding hay in lairage, processing an animal earlier in a slaughter cohort, and cleaning the landing area poststunning were protective. In the multivariable model, with the slaughterhouse and the farm group included as random effects, factors associated with the cross-contamination of cattle hides were identified. Transport to the slaughterhouse by a commercial hauler had a borderline-significant association with increased odds of an animal having a cross-contaminated hide (odds ratio [OR] [95% confidence interval {CI}] = 5.7 [0.99, 33.0]; P = 0.05). At the slaughterhouse, providing hay to cattle waiting in lairage (OR [95% CI] = 0.04 [<0.01, 1.04]; P = 0.05) and cleaning the landing area (OR [95% CI] = 0.03 [<0.01, 1.15,]; P = 0.06) also had a borderline-significant association with decreased odds of an animal having a cross-contaminated hide. Although the prevalence of carcass contamination remains very low, targeted intervention at the preslaughter stage may have the potential to reduce further the risk to public health.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Kimmel, E., H. Arkin, D. Broday y A. Berman. "A model of evaporative cooling in a wetted hide". Journal of Agricultural Engineering Research 49 (mayo de 1991): 227–41. http://dx.doi.org/10.1016/0021-8634(91)80041-c.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Moroz, Irene M. "The Hide, Skeldon, Acheson dynamo revisited". Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 463, n.º 2077 (8 de agosto de 2006): 113–30. http://dx.doi.org/10.1098/rspa.2006.1758.

Texto completo
Resumen
Hide et al . (Hide, Skeldon & Acheson 1996 Proc. R. Soc. A 452 , 1369–1395) introduced a nonlinear system of three coupled ordinary differential equations to model a self-exciting Faraday disk homopolar dynamo. A very small selection of its possible behaviours was presented in that paper. Subsequent studies have extended the system to incorporate the effects of a nonlinear motor, an external battery and magnetic field, the coupling of two or more identical dynamos together, among other things. In this paper, we return to the original model with a view to perform a more extensive analysis of the Hide et al . dynamo. For the first time, we present bifurcation transition diagrams, so that the two examples of chaotic dynamo action (shown in figure 9 in that paper) can now be placed into context. We exhibit the coexistence of multiple attractors and also identify the lowest order unstable periodic orbits pertaining to some specific cases.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Farida, Siti Ning y Herlina Suksmawati. "Destination Branding of Shopping Tourism in Magetan Regency". Prosiding Semnasfi 1, n.º 1 (9 de mayo de 2018): 109. http://dx.doi.org/10.21070/semnasfi.v1i1.1143.

Texto completo
Resumen
Magetan Regency has been well known by the people of archipelago as the region of fine raw leather materials artisan ranging from the process of raw materials into the finished products, as well as various types of processed equate leather vastly produced in this area. The goal of this research is to describe the formation stage and element of destination branding of shopping tourism formation in hide industry center in Magetan regency. The theory utilized in this study is the model of message production and goals-plans-action model from Dillard. This qualitative research is the main data collection through interview. The outcomes of this study reveal the establishment stage of hide industry center as the destination branding of Magetan Regency, beginning with determining the market segmentation, then further into the identity build and the last is to implement the existence of hide industry center as destination branding. The establishment elements of hide industry center as a destination branding Magetan regency is on products owned by the hide industry center. The characteristics and advantages of products owned by the leather industry centers create the brand identity and brand essence as well as brand culture element in Magetan’s destination branding.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

DEWELL, G. A., C. A. SIMPSON, R. D. DEWELL, D. R. HYATT, K. E. BELK, J. A. SCANGA, P. S. MORLEY et al. "Impact of Transportation and Lairage on Hide Contamination with Escherichia coli O157 in Finished Beef Cattle". Journal of Food Protection 71, n.º 6 (1 de junio de 2008): 1114–18. http://dx.doi.org/10.4315/0362-028x-71.6.1114.

Texto completo
Resumen
Transportation of cattle from the feedlot to the slaughter plant could influence hide contamination of Escherichia coli O157. A study was initiated to investigate the influence of transportation and lairage on shedding and hide contamination of E. coli O157. Fecal and hide samples were obtained from 40 pens of harvest-ready beef cattle at the feedlot prior to transport and again at the slaughter plant immediately after slaughter. Potential risk factors for hide contamination at the feedlot, during transport, and at slaughter were evaluated. A multilevel Poisson regression model was used to evaluate if transportation and lairage were associated with hide contamination by E. coli O157 in finished beef cattle. Lots of cattle held in E. coli O157–positive lairage pens had eight times greater risk of having positive slaughter hide samples compared with cattle held in culture-negative pens (relative risk, 8.0; 95% confidence interval, 1.6 to 38.8). Lots of cattle that were held in lairage pens contaminated with feces had three times greater risk for positive slaughter hide samples compared with cattle held in clean pens (relative risk, 3.1; 95% confidence interval, 1.2 to 7.9). Lots of cattle that were transported for long distances (&gt;160.9 km) had twice the risk of having positive hide samples at slaughter compared with cattle transported a shorter distance (relative risk, 2.4; 95% confidence interval, 1.1 to 5.1). These findings suggest that transportation and lairage should be considered in E. coli O157 control strategies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

MOROZ, IRENE M. "ON THE BEHAVIOR OF A SELF-EXCITING FARADAY DISK HOMOPOLAR DYNAMO WITH BATTERY IN THE PRESENCE OF AN EXTERNAL MAGNETIC FIELD". International Journal of Bifurcation and Chaos 11, n.º 06 (junio de 2001): 1695–705. http://dx.doi.org/10.1142/s0218127401002948.

Texto completo
Resumen
Goldbrum et al. [2000] investigated the biasing effects of including an external battery on the behavior of a self-exciting Faraday disk homopolar dynamo, originally introduced by Hide et al. [1996]. In this paper we return to the model of Hide [1997] and consider the additional effects of incorporating an external magnetic field on the dynamo.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Chambaz, A., P. A. Dufey, M. Kreuzer y J. Gresham. "Sources of variation influencing the use of real-time ultrasound to predict intramuscular fat in live beef cattle". Canadian Journal of Animal Science 82, n.º 2 (1 de junio de 2002): 133–39. http://dx.doi.org/10.4141/a01-058.

Texto completo
Resumen
A total of 123 steers of six European breeds (Angus, Simmental, Charolais, Limousin, Blonde d'Aquitaine, Piedmontese) were used (i) to evaluate the precision of the ultrasound-predicted intramuscular fat (USIMF) and its sources of variation using the current Pie QUIP technology and (ii) to develop improved models for predicting USIMF. Steers were slaughtered when they reached the target value of 3.5% USIMF. Hide samples were obtained 3 d before slaughter by shot-biopsy. After slaughter, a sample of the longissimus muscle was used to determine actual chemical intramuscular fat (EEIMF), collagen content and solubility. Among the variables available during a chute-side scanning session, hide thickness and ultrasound subcutaneous fat thickness at the 12th and 13th ribs were shown to be significantly correlated with EEIMF. These two variables were selected as possible independent variables to evaluate the construction of new models. The model with the best fit included USIMF, hide thickness and liveweight and had a standard error of prediction of 0.96%, which is similar to other published technologies. Breed group and collagen-related traits did not influence USIMF estimation. Finally, the revised Pie QUIP technology should be considered as one technology of choice to predict EEIMFcontent in live animals. Key words: Beef, cattle, ultrasound, intramuscular fat, hide thickness, collagen
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

BOSILEVAC, JOSEPH M., STEVEN D. SHACKELFORD, DAYNA M. BRICHTA y MOHAMMAD KOOHMARAIE. "Efficacy of Ozonated and Electrolyzed Oxidative Waters To Decontaminate Hides of Cattle before Slaughter†". Journal of Food Protection 68, n.º 7 (1 de julio de 2005): 1393–98. http://dx.doi.org/10.4315/0362-028x-68.7.1393.

Texto completo
Resumen
The hides of cattle are the primary source of pathogens such as Escherichia coli O157:H7 that contaminate preevisceration carcasses during commercial beef processing. A number of interventions that reduce hide contamination and subsequent carcass contamination are currently being developed. The objective of this study was to determine the efficacy of ozonated and electrolyzed oxidizing (EO) waters to decontaminate beef hides and to compare these treatments with similar washing in water without the active antimicrobial compounds. Cattle hides draped over barrels were used as the model system. Ozonated water (2 ppm) was applied at 4,800 kPa (700 lb in2) and 15°C for 10 s. Alkaline EO water and acidic EO water were sequentially applied at 60°C for 10 s at 4,800 and 1,700 kPa (250 lb in2), respectively. Treatment using ozonated water reduced hide aerobic plate counts by 2.1 log CFU/100 cm2 and reduced Enterobacteriaceae counts by 3.4 log CFU/100 cm2. EO water treatment reduced aerobic plate counts by 3.5 log CFU/100 cm2 and reduced Enterobacteriaceae counts by 4.3 log CFU/100 cm2. Water controls that matched the wash conditions of the ozonated and EO treatments reduced aerobic plate counts by only 0.5 and 1.0 log CFU/100 cm2, respectively, and each reduced Enterobacteriaceae counts by 0.9 log CFU/100 cm2. The prevalence of E. coli O157 on hides was reduced from 89 to 31% following treatment with ozonated water and from 82 to 35% following EO water treatment. Control wash treatments had no significant effect on the prevalence of E. coli O157:H7. These results demonstrate that ozonated and EO waters can be used to decontaminate hides during processing and may be viable treatments for significantly reducing pathogen loads on beef hides, thereby reducing pathogens on beef carcasses.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Ruiz-Zafra, Angel, Manuel Noguera, Kawtar Benghazi y Sergio F. Ochoa. "A Model-Driven Approach for Wearable Systems Developments". International Journal of Distributed Sensor Networks 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/637130.

Texto completo
Resumen
This paper proposes a model-driven approach for developing high-level software interfaces that allow developers to interact with wearable devices easily. These components hide the heterogeneity of the devices interfaces and provide developers with a simple and homogeneous way to interoperate with these digital peripherals. The use of this approach also allows reducing risks and development efforts.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Fodor, Zoltán, Kieran Holland, Julius Kuti, Dániel Nógrádi, Chris Schroeder y Chik Him Wong. "Can the nearly conformal sextet gauge model hide the Higgs impostor?" Physics Letters B 718, n.º 2 (diciembre de 2012): 657–66. http://dx.doi.org/10.1016/j.physletb.2012.10.079.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Yang, Fan, Long Yang y Ping Li. "The Dynamic Game of Knowledge Hiding Behavior from Organizational Members: To Hide or Not to Hide?" Complexity 2021 (6 de septiembre de 2021): 1–15. http://dx.doi.org/10.1155/2021/1713890.

Texto completo
Resumen
In the era of the knowledge economy, it is urgent for organizations to solve the problem of knowledge hiding of internal members to accelerate the speed and efficiency of knowledge dissemination and innovation and adapt to rapid changes in the market. At present, research on knowledge hiding has received extensive attention from Western countries, but there are few relevant studies in China. Based on the hypothesis of bounded rationality, this paper constructs an evolutionary game model of second-level knowledge hiding of organizational members and analyzes the main factors affecting the stable equilibrium point using MATLAB numerical simulation. The results show that knowledge leakage risk is positively correlated with knowledge hiding. The ability of knowledge absorption and transformation is positively correlated with the behavior of knowledge hiding. There is a negative correlation between collaborative innovation ability and knowledge hiding. There is a negative correlation between knowledge stock and knowledge hiding. Only when the incentive reaches a certain level can organizational members be encouraged to give up knowledge hiding. This paper provides a more comprehensive and dynamic picture of the evolutionary game of knowledge hiding among members in the organization and provides a new idea of knowledge management for organizational managers.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Halas, V., J. Dijkstra, L. Babinszky, M. W. A. Verstegen y W. J. J. Gerrits. "Modelling of nutrient partitioning in growing pigs to predict their anatomical body composition. 1. Model description". British Journal of Nutrition 92, n.º 4 (octubre de 2004): 707–23. http://dx.doi.org/10.1079/bjn20041237.

Texto completo
Resumen
A dynamic mechanistic model was developed for growing and fattening pigs. The aim of the model was to predict growth rate and the chemical and anatomical body compositions from the digestible nutrient intake of gilts (20–105 kg live weight). The model represents the partitioning of digestible nutrients from intake through intermediary metabolism to body protein and body fat. State variables of the model were lysine, acetyl-CoA equivalents, glucose, volatile fatty acids and fatty acids as metabolite pools, and protein in muscle, hide–backfat, bone and viscera and body fat as body constituent pools. It was assumed that fluxes of metabolites follow saturation kinetics depending on metabolite concentrations. In the model, protein deposition rate depended on the availability of lysine and of acetyl-CoA. The anatomical body composition in terms of muscle, organs, hide–backfat and bone was predicted from the chemical body composition and accretion using allometric relationships. Partitioning of protein, fat, water and ash in muscle, organs, hide–backfat and bone fractions were driven by the rates of muscle protein and body fat deposition. Model parameters were adjusted to obtain a good fit of the experimental data from literature. Differential equations were solved numerically for a given set of initial conditions and parameter values. In the present paper, the model is presented, including its parameterisation. The evaluation of the model is described in a companion paper.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Bursztyn, Leonardo, Georgy Egorov y Robert Jensen. "Cool to be Smart or Smart to be Cool? Understanding Peer Pressure in Education". Review of Economic Studies 86, n.º 4 (25 de mayo de 2018): 1487–526. http://dx.doi.org/10.1093/restud/rdy026.

Texto completo
Resumen
Abstract We model and test two school-based peer cultures: one that stigmatizes effort and one that rewards ability. The model shows that either may reduce participation in educational activities when peers can observe participation and performance. We design a field experiment that allows us to test for, and differentiate between, these two concerns. We find that peer pressure reduces takeup of an SAT prep package virtually identically across two very different high school settings. However, the effects arise from very distinct mechanisms: a desire to hide effort in one setting and a desire to hide low ability in the other.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

GOLDBRUM, PAUL, IRENE M. MOROZ y RAYMOND HIDE. "ON THE BIASING EFFECT OF A BATTERY ON A SELF-EXCITING FARADAY DISK HOMOPOLAR DYNAMO LOADED WITH A LINEAR SERIES MOTOR". International Journal of Bifurcation and Chaos 10, n.º 08 (agosto de 2000): 1875–85. http://dx.doi.org/10.1142/s0218127400001146.

Texto completo
Resumen
We extend the study of Hide et al. [1996] for a self-exciting Faraday disk homopolar dynamo with a linear motor connected in series with the coil to cases when a battery is included in the circuit, using the set of nonlinear equations for biased systems given in [Hide, 1997]. The presence of the battery introduces asymmetry into the model, creating two distinct branches of equilibrium solutions, two distinct branches of oscillatory solutions and two different codimension-two bifurcations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

de Paor, A. M. "Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory". Nonlinear Processes in Geophysics 5, n.º 2 (30 de junio de 1998): 75–80. http://dx.doi.org/10.5194/npg-5-75-1998.

Texto completo
Resumen
Abstract. Hide (Nonlinear Processes in Geophysics, 1998) has produced a new mathematical model of a self-exciting homopolar dynamo driving a series- wound motor, as a continuing contribution to the theory of the geomagnetic field. By a process of exact perturbation analysis, followed by combination and partial solution of differential equations, the complete nonlinear quenching of current fluctuations reported by Hide in the case that a parameter ε has the value 1 is proved via the Popov theorem from feedback system stability theory.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Kim, Yeonjeong y A. T. Panter. "Moral Character Judgments Using the Hidden Information Distribution and Evaluation (HIDE) Model". Academy of Management Proceedings 2017, n.º 1 (agosto de 2017): 17562. http://dx.doi.org/10.5465/ambpp.2017.283.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Ellerman, David. "The Arrow-Debreu model: How math can hide a fatal conceptual error". Forum for Social Economics 29, n.º 2 (enero de 2000): 33–48. http://dx.doi.org/10.1007/bf02779102.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

GARNAEV, ANDREY y ROBBERT FOKKINK. "A SEARCHER VERSUS HIDER GAME WITH INCOMPLETE INFORMATION ABOUT SEARCH RESOURCES". Asia-Pacific Journal of Operational Research 30, n.º 02 (abril de 2013): 1250052. http://dx.doi.org/10.1142/s0217595912500522.

Texto completo
Resumen
We introduce a search game in which a hider has partial information about a searcher's resource. The hider can be a terrorist trying to hide and the searcher can be special forces trying to catch him. The terrorist does not know the number of forces involved in the search but just its distribution. We model this situation by a noncooperative game. In a related setup, which is motivated by wireless networks applications, the terrorist inserts a malicious node in a network, reducing network connectivity and thereby undermining its security. Meanwhile, the network operator applies appropriate measures to detect malicious nodes and maintain network performance. We investigate how the information about the total search resources that are available to the hider can influence the behavior of both players. For the case, where the distribution has two mass points, we prove that the game has a unique equilibrium and moreover, we describe explicitly this equilibrium, its structure and some other properties.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Shi, Yan, Gang Hu, Jia Fu Zhu y Yong Chen. "The Method of Calculating Polluted Insulator's Flashover Voltage Based on ANN". Applied Mechanics and Materials 513-517 (febrero de 2014): 4439–42. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.4439.

Texto completo
Resumen
According to the test result about class insulator string of 32 units, a method of calculating 50% ac flashover voltage U50 based on radial basis function network is put forward in this paper. Inputs of the model are equivalent salt deposit density ρESDD and nonsoluble deposit density ρNSDD ,the output of the model is 50% ac flashover voltage of polluted insulator strings, the Orthogonal least squares algorithm was used to select right hide layer neurons and center vectors, and the weight from hide layer neurons to output layer neurons are determined by pseud-inverse method. The calculating result is in concordance with the test result, it is indicated that the model can give some references to access the pollution condition of external insulation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Gloag, Ros, Laurie-Anne Keller y Naomi E. Langmore. "Cryptic cuckoo eggs hide from competing cuckoos". Proceedings of the Royal Society B: Biological Sciences 281, n.º 1792 (7 de octubre de 2014): 20141014. http://dx.doi.org/10.1098/rspb.2014.1014.

Texto completo
Resumen
Interspecific arms races between cuckoos and their hosts have produced remarkable examples of mimicry, with parasite eggs evolving to match host egg appearance and so evade removal by hosts. Certain bronze-cuckoo species, however, lay eggs that are cryptic rather than mimetic. These eggs are coated in a low luminance pigment that camouflages them within the dark interiors of hosts' nests. We investigated whether cuckoo egg crypsis is likely to have arisen from the same coevolutionary processes known to favour egg mimicry. We added high and low luminance-painted eggs to the nests of large-billed gerygones ( Gerygone magnirostris ), a host of the little bronze-cuckoo ( Chalcites minutillus ). Gerygones rarely rejected either egg type, and did not reject natural cuckoo eggs. Cuckoos, by contrast, regularly removed an egg from clutches before laying their own and were five times more likely to remove a high luminance model than its low luminance counterpart. Given that we found one-third of all parasitized nests were exploited by multiple cuckoos, our results suggest that competition between cuckoos has been the key selective agent for egg crypsis. In such intraspecific arms races, crypsis may be favoured over mimicry because it can reduce the risk of egg removal to levels below chance.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Abdulmajeed, Nadia mohammed. "Domino, novel steganography system". ALUSTATH JOURNAL FOR HUMAN AND SOCIAL SCIENCES 219, n.º 1 (8 de noviembre de 2018): 17–24. http://dx.doi.org/10.36473/ujhss.v219i1.497.

Texto completo
Resumen
Primary objective of the proposed system is to achieve higher level of confidentiality in absence of standard encryption techniques which add up to complexity of the stego system. In this system the principle of dominoes is adopted in the way of the selection of the pixel of the image to hide the ciphertext. Where domino stones models are prepared in advance, which are two-dimensional matrices (2*6), and selecting one of them and start the projection of the model on the image and hide the ciphertext in the pixel corresponding to the points in the domino model Experimental results show that the proposed system effectively achieve the objective. Even though the proposed system gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image can be seen by the human vision system (HVS), so this method can be considered as a success and can be adopted in the field of steganography.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

STEPHENS, T. P., T. A. MCALLISTER y K. STANFORD. "Development of an Experimental Model To Assess the Ability of Escherichia coli O157:H7–Inoculated Fecal Pats To Mimic a Super Shedder within a Feedlot Environment". Journal of Food Protection 71, n.º 3 (1 de marzo de 2008): 648–52. http://dx.doi.org/10.4315/0362-028x-71.3.648.

Texto completo
Resumen
This study was conducted to develop an experimental model that could assess the ability of Escherichia coli O157:H7–inoculated fecal pats to mimic a super shedder (&gt;104 CFU/g of feces) within a feedlot environment. The day before the study began, 48 steers that had been negative for E. coli O157:H7 in feces for three consecutive weeks were sorted into three treatment groups, with two replicate pens per treatment and 8 steers per pen. Steers within the pens (20.50 by 10.75 m) were exposed to control feces or feces inoculated with two levels of a mixture of five strains of nalidixic acid–resistant E. coli O157:H7 (low level, 102 CFU/g; high level, 105 CFU/g). Five 300-g fecal pats were introduced into the pens twice daily (10:00 a.m. and 2:30 p.m.) on days 0 through 6 and days 14 through 20. Pats were placed in the pen at random locations to mimic defecation of a steer within the pen. Fecal grab samples, hide swab samples (500-cm2 area of the rump), natural fecal pat samples (freshly voided), and rope samples (1.22-m-long manila rope) where obtained at multiple times during the 49-day trial to evaluate the spread of nalidixic acid–resistant E. coli O157:H7 throughout the feedlot environment and among penmates. Immunomagnetic separation and selective media were used to detect E. coli O157:H7. Nalidixic acid–resistant E. coli O157:H7 was detected in 13 high-level treatment fecal grab samples, 7 high-level treatment hide swab samples, 1 low-level hide swab sample, and 2 high-level rope samples. For both fecal grab and hide swab samples, the overall prevalence of
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Ross, George. "Danger, One EU Crisis May Hide Another: Social Model Anxieties and Hard Cases". Comparative European Politics 4, n.º 4 (23 de noviembre de 2006): 309–30. http://dx.doi.org/10.1057/palgrave.cep.6110088.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Kufenko, Vadim. "Hide-and-Seek with time-series filters: a model-based Monte Carlo study". Empirical Economics 59, n.º 5 (22 de julio de 2019): 2335–61. http://dx.doi.org/10.1007/s00181-019-01736-y.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Mary, A. Geetha, D. P. Acharjya y N. Ch S. N. Iyengar. "Privacy preservation in fuzzy association rules using rough computing and DSR". Cybernetics and Information Technologies 14, n.º 1 (1 de marzo de 2014): 52–71. http://dx.doi.org/10.2478/cait-2014-0005.

Texto completo
Resumen
Abstract In the present age of Internet, data is accumulated at a dramatic pace. The accumulated huge data has no relevance, unless it provides certain useful information pertaining to the interest of the organization. But the real challenge lies in hiding sensitive information in order to provide privacy. Therefore, attribute reduction becomes an important aspect for handling such huge database by eliminating superfluous or redundant data to enable a sensitive rule hiding in an efficient manner before it is disclosed to the public. In this paper we propose a privacy preserving model to hide sensitive fuzzy association rules. In our model we use two processes, named a pre-process and post-process to mine fuzzified association rules and to hide sensitive rules. Experimental results demonstrate the viability of the proposed research.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Gal, Shmuel, Steve Alpern y Jérôme Casas. "Prey should hide more randomly when a predator attacks more persistently". Journal of The Royal Society Interface 12, n.º 113 (diciembre de 2015): 20150861. http://dx.doi.org/10.1098/rsif.2015.0861.

Texto completo
Resumen
When being searched for and then (if found) pursued by a predator, a prey animal has a choice between choosing very randomly among hiding locations so as to be hard to find or alternatively choosing a location from which it is more likely to successfully flee if found. That is, the prey can choose to be hard to find or hard to catch, if found. In our model, capture of prey requires both finding it and successfully pursuing it. We model this dilemma as a zero-sum repeated game between predator and prey, with the eventual capture probability as the pay-off to the predator. We find that the more random hiding strategy is better when the chances of repeated pursuit, which are known to be related to area topography, are high. Our results extend earlier results of Gal and Casas, where there was at most only a single pursuit. In that model, hiding randomly was preferred by the prey when the predator has only a few looks. Thus, our new multistage model shows that the effect of more potential looks is opposite. Our results can be viewed as a generalization of search games to the repeated game context and are in accordance with observed escape behaviour of different animals.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Saha, Aniruddha, Akshayvarun Subramanya y Hamed Pirsiavash. "Hidden Trigger Backdoor Attacks". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 07 (3 de abril de 2020): 11957–65. http://dx.doi.org/10.1609/aaai.v34i07.6871.

Texto completo
Resumen
With the success of deep learning algorithms in various domains, studying adversarial attacks to secure deep models in real world applications has become an important research topic. Backdoor attacks are a form of adversarial attacks on deep networks where the attacker provides poisoned data to the victim to train the model with, and then activates the attack by showing a specific small trigger pattern at the test time. Most state-of-the-art backdoor attacks either provide mislabeled poisoning data that is possible to identify by visual inspection, reveal the trigger in the poisoned data, or use noise to hide the trigger. We propose a novel form of backdoor attack where poisoned data look natural with correct labels and also more importantly, the attacker hides the trigger in the poisoned data and keeps the trigger secret until the test time. We perform an extensive study on various image classification settings and show that our attack can fool the model by pasting the trigger at random locations on unseen images although the model performs well on clean data. We also show that our proposed attack cannot be easily defended using a state-of-the-art defense algorithm for backdoor attacks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Wang, Fei, Yu Wang y Yuan Tian. "Research of Parasitic Communication Model Based on Network Behavior Features". Applied Mechanics and Materials 519-520 (febrero de 2014): 302–5. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.302.

Texto completo
Resumen
This paper proposes a convert communication model based on network behavior features. Convert communication program firstly judges the most frequent communication features between the two sides, and then embeds the secret information into multimedia carrier. At last, the multimedia that carries secret information is sent to the receiver, according to communication features. A convert communication completes. The experimental results indicate that the model will not only hide convert communication behavior into normal communication behavior between hosts, but also it provides high security of communication.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Puspitasari, Ana, Arif Wiyat Purnanto y Hermahayu Hermahayu. "PENGARUH MODEL PEMBELAJARAN SAVI (SOMATIC, AUDITORY, VISUALIZATION, INTELLECTUAL) DENGAN MEDIA HIDE DAN SEEK PUZZLE TERHADAP HASIL BELAJAR IPA". Edukasi Journal 10, n.º 2 (31 de diciembre de 2018): 137–48. http://dx.doi.org/10.31603/edukasi.v10i2.2545.

Texto completo
Resumen
This study aims to determine the effect of the SAVI learning model (Somatic, Auditory, Visual, Intellectual) to learning results on grade V students of Rejosari Primary School 3 Bandongan. This research method is pre-experimental desig.ns with one group pretest posttest models. The independent variable of the study is the SAVI learning model with the Hide dan Seek Puzzle (X) media and the dependent variable is the science learning outcomes (Y). The research subjects were 22 fifth grade students of Rejosari 1 Bandongan Public Elementary School. The sampling technique uses saturated sampling or total sampling. Data collected using test questions. Data analysis using paired-sample t-test by SPSS for Windows version 23.0. The results of this research shows SAVI learning model had a positive effect to student learning outcomes in science subjects. This is evidenced from the results of the paired-sample t-test analysis with a significance value of 0,000 <0,05. Based on the results of the analysis and discussion, the average value of the overall posttest of respondents after being given treatment increased from the average value of pretest 61.82 to 83.77. The results of this reserch can be concluded that the use of SAVI learning model with the Hide dan Seek Puzzle media has a significant effect on the improvement of science learning outcomes.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

DODD, CHARLES C., MICHAEL W. SANDERSON, MEGAN E. JACOB y DAVID G. RENTER. "Modeling Preharvest and Harvest Interventions for Escherichia coli O157 Contamination of Beef Cattle Carcasses". Journal of Food Protection 74, n.º 9 (1 de septiembre de 2011): 1422–33. http://dx.doi.org/10.4315/0362-028x.jfp-10-516.

Texto completo
Resumen
Field studies evaluating the effects of multiple concurrent preharvest interventions for Escherichia coli O157 are logistically and economically challenging; however, modeling techniques may provide useful information on these effects while also identifying crucial information gaps that can guide future research. We constructed a risk assessment model with data obtained from a systematic search of scientific literature. Parameter distributions were incorporated into a stochastic Monte Carlo modeling framework to examine the impacts of different combinations of preharvest and harvest interventions for E. coli O157 on the risk of beef carcass contamination. We estimated the risk of E. coli O157 carcass contamination conditional on preharvest fecal prevalence estimates, inclusion of feed additive(s) in the diet, vaccination for E. coli O157, transport and lairage effects, hide intervention(s), and carcass intervention(s). Prevalence parameters for E. coli O157 were assumed to encompass potential effects of concentration; therefore, concentration effects were not specifically evaluated in this study. Sensitivity analyses revealed that fecal prevalence, fecal-to-hide transfer, hide-to-carcass transfer, and carcass intervention efficacy significantly affected the risk of carcass contamination (correlation coefficients of 0.37, 0.56, 0.58, and −0.29, respectively). The results indicated that combinations of preharvest interventions may be particularly important for supplementing harvest interventions during periods of higher variability in fecal shedding prevalence (i.e., summer). Further assessments of the relationships among fecal prevalence and concentration, hide contamination, and subsequent carcass contamination are needed to further define risks and intervention impacts for E. coli O157 contamination of beef.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Jahanfarnia, G. y S. Tashakor. "Mathematical model of impurities hide out and return in nuclear power plant steam generator". Progress in Nuclear Energy 51, n.º 4-5 (mayo de 2009): 644–48. http://dx.doi.org/10.1016/j.pnucene.2009.01.004.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Crawford, Vincent P. y Nagore Iriberri. "Fatal Attraction: Salience, Naïveté, and Sophistication in Experimental “Hide-and-Seek” Games". American Economic Review 97, n.º 5 (1 de noviembre de 2007): 1731–50. http://dx.doi.org/10.1257/aer.97.5.1731.

Texto completo
Resumen
“Hide-and-seek” games are zero-sum two-person games in which one player wins by matching the other's decision and the other wins by mismatching. Although such games are often played on cultural or geographic “landscapes” that frame decisions nonneutrally, equilibrium ignores such framing. This paper reconsiders the results of experiments by Rubinstein, Tversky, and others whose designs model nonneutral landscapes, in which subjects deviate systematically from equilibrium in response to them. Comparing alternative explanations theoretically and econometrically suggests that the deviations are well explained by a structural nonequilibrium model of initial responses based on “level-k” thinking, suitably adapted to nonneutral landscapes. (JEL C72, C92)
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Arain, Ghulam Ali, Zeeshan Bhatti, Abdul Karim Khan y Imran Hameed. "How and when do employees hide knowledge from co-workers? A multilevel moderated-mediation model". Academy of Management Proceedings 2021, n.º 1 (agosto de 2021): 13659. http://dx.doi.org/10.5465/ambpp.2021.13659abstract.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Zhu, Yong Song. "Study on Encryption and Decryption Algorithm and its Matlab Realization". Advanced Materials Research 282-283 (julio de 2011): 363–66. http://dx.doi.org/10.4028/www.scientific.net/amr.282-283.363.

Texto completo
Resumen
The paper studies the process of how to encrypt images through Logistic chaotic model, how to use DCT transform to hide the encrytion image in the carrier image and how to restore the images through DCT inverse transformation, analyzes the peak signal-to-noise ratio and realizes the whole process through Matlab.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Haywood, R. D., A. C. Cameron, D. Queloz, S. C. C. Barros, M. Deleuil, R. Fares, M. Gillon et al. "Planets and Stellar Activity: Hide and Seek in the CoRoT-7 system". Proceedings of the International Astronomical Union 8, S299 (junio de 2013): 237–40. http://dx.doi.org/10.1017/s1743921313008478.

Texto completo
Resumen
AbstractSince the discovery of the transiting Super-Earth CoRoT-7b, several investigations have been made of the number and precise masses of planets present in the system, but they all yield different results, owing to the star's high level of activity. Radial velocity (RV) variations induced by stellar activity therefore need to be modelled and removed to allow a reliable detection of all planets in the system. We re-observed CoRoT-7 in January 2012 with both HARPS and the CoRoT satellite, so that we now have the benefit of simultaneous RV and photometric data. We fitted the off-transit variations in the CoRoT lightcurve using a harmonic decomposition similar to that implemented in Queloz et al. (2009). This fit was then used to model the stellar RV contribution, according to the methods described by Aigrain et al. (2011). This model was incorporated into a Monte Carlo Markov Chain in order to make a precise determination of the orbits of CoRoT-7b and CoRoT-7c. We also assess the evidence for the presence of one or two additional planetary companions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Tamboli, Meera. "Image Steganography using 3 ways of Encryption for Highly Secured Data Transmission". International Journal for Research in Applied Science and Engineering Technology 9, n.º VI (30 de junio de 2021): 4739–45. http://dx.doi.org/10.22214/ijraset.2021.35572.

Texto completo
Resumen
Steganography exists from many years in a variety of forms and has been used in a variety of domains. There are various types of steganographic techniques that are used to hide data in various file formats. The proposed model uses three layers of security using three algorithms namely, LSB, DES and AES. The software allows the user to encrypt the secret message which gets protected by undergoing three layers of encryption. The output of the encryption process which is the steno image can be sent across through any medium along with the secret key to decrypt. The end user then uses a unique key to extract and decrypt the secret message from the image. There are many reasons to hide data but the simplest is the need to prevent unauthorized persons from accessing the secret information.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Pourya, Asgarifard, Tafreshi Navid y Sharifi Akbar. "A Novel Application of Refinery Merox Unit Wastewater for Bovine Hide Unhairing". Journal of the American Leather Chemists Association 115, n.º 8 (3 de agosto de 2020): 301–8. http://dx.doi.org/10.34314/jalca.v115i8.3844.

Texto completo
Resumen
Unhairing is one of the major steps of the leather tanning process which removes the hairs, epidermis and to some degree inter-fibrillary proteins. This process needs high amounts of chemicals that cause environmental difficulties. On the other hand, these chemicals are available in the wastewater of the Merox unit of Kermanshah Refinery. For reducing chemical consumption and decreasing environment pollution, we used the aforementioned wastewater for bovine unhairing. A unhairing liquor was prepared in order to unhair skins and different parameters such as the concentration of CaCO3 and Na2S, process time, and temperature were considered to evaluate their impact on the unhairing process and to obtain optimum condition. Response surface methodology based on Box-Behnken design was applied to model the unhairing efficiency in terms of four independent variables. A second-order polynomial equation was suggested to predict the response with high certainty. ANOVA revealed the validity and importance of that model by P-value of < 0.0001, large F-values, and, R2 of 98.8. The maximum unhairing efficiency of about 98.5 % was obtained under the optimum condition of 1.7 wt% Na2S, 5.8 wt% CaCO3, 114 min process time and 29.5 ºC.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Vu, Dong Quan, Patrick Loiseau, Alonso Silva y Long Tran-Thanh. "Path Planning Problems with Side Observations—When Colonels Play Hide-and-Seek". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 02 (3 de abril de 2020): 2252–59. http://dx.doi.org/10.1609/aaai.v34i02.5602.

Texto completo
Resumen
Resource allocation games such as the famous Colonel Blotto (CB) and Hide-and-Seek (HS) games are often used to model a large variety of practical problems, but only in their one-shot versions. Indeed, due to their extremely large strategy space, it remains an open question how one can efficiently learn in these games. In this work, we show that the online CB and HS games can be cast as path planning problems with side-observations (SOPPP): at each stage, a learner chooses a path on a directed acyclic graph and suffers the sum of losses that are adversarially assigned to the corresponding edges; and she then receives semi-bandit feedback with side-observations (i.e., she observes the losses on the chosen edges plus some others). We propose a novel algorithm, Exp3-OE, the first-of-its-kind with guaranteed efficient running time for SOPPP without requiring any auxiliary oracle. We provide an expected-regret bound of Exp3-OE in SOPPP matching the order of the best benchmark in the literature. Moreover, we introduce additional assumptions on the observability model under which we can further improve the regret bounds of Exp3-OE. We illustrate the benefit of using Exp3-OE in SOPPP by applying it to the online CB and HS games.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Sunaga, Miho. "A SCHUMPETERIAN GROWTH MODEL WITH FINANCIAL INTERMEDIARIES". Macroeconomic Dynamics 23, n.º 4 (27 de marzo de 2018): 1679–702. http://dx.doi.org/10.1017/s1365100517000426.

Texto completo
Resumen
This study introduces financial intermediaries into the Schumpeterian growth model developed by Aghion et al. (2005, Quarterly Journal of Economics, Vol. 120, pp. 173–222). They collect deposits from households, provide funds for entrepreneurial projects, and monitor the entrepreneurs. I consider an economy with moral hazard problems: entrepreneurs can hide the result of a successful innovation and thereby avoid repaying financial intermediaries if the latter do not monitor entrepreneurial performance. I analyze the effects of financial intermediaries' activities on technological progress and economic growth in such an economy. I show that financial intermediaries need to monitor entrepreneurs in an economy where the legal protection of creditors is not strong enough. Such monitoring can resolve the moral hazard problem; however, it does not always promote technological innovation, because it could increase the cost of entrepreneurial innovation and thus reduce the amount invested for innovation. I also examine how monitoring by financial intermediaries affects the welfare of individuals through the stringency of financial markets.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Higgi, Ali Hussain. "An Information Technology Based Instructional Model for Effective Learning". Learning and Teaching in Higher Education: Gulf Perspectives 4, n.º 1 (1 de junio de 2007): 32–42. http://dx.doi.org/10.18538/lthe.v4.n1.06.

Texto completo
Resumen
This paper presents an information technology based instructional model for effective learning in management information systems programs and modules for students in undergraduate education. This model is primarily centered on the traditional in-class learning model. Information technology is used in a unique and novel way in order to create a learning environment which not only engages students in the learning process but also enhances their problems solving skills, analysis and decision making abilities. The model embeds information technology in projects in order to hide complexities but without compromising achievement of learning objectives. It also uses information technology in a simulation mode in order to demonstrate key concepts or learning themes, to simulate main themes presented in case studies and to simulate problems behaviors. The model employs other creative techniques in order to deliver its overall goals.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

King, Geoffrey y Geoff Bailey. "Tectonics and human evolution". Antiquity 80, n.º 308 (1 de junio de 2006): 265–86. http://dx.doi.org/10.1017/s0003598x00093613.

Texto completo
Resumen
The authors propose a new model for the origins of humans and their ecological adaptation. The evolutionary stimulus lies not in the savannah but in broken, hilly rough country where the early hominins could hunt and hide. Such ‘roughness’, generated by tectonic and volcanic movement characterises not only the African rift valley but probably the whole route of early hominin dispersal.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Muadzani, Alim, Oky Dwi Nurhayati y Ike Pertiwi Windasari. "Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital". Jurnal Teknologi dan Sistem Komputer 4, n.º 3 (14 de agosto de 2016): 470. http://dx.doi.org/10.14710/jtsiskom.4.3.2016.470-478.

Texto completo
Resumen
Information has now become an important comodity in human life, with the rapid development of communications technology has enable people to communicate and exchange information more easily. Internet is very popular and used by billions users worldwide, the information passing through the internet is very large, and some certain people trying to get this information for profit. The information need to be secured to prevent the others to get the information that send through the internet, steganography can be used to hide the information before sending it and the receiver can recover the hidden data. Digital steganography using computer can use a variety of digital file, digital image file is one of them. With the infomation being hidden inside the image-carrier, the others will not aware about the hidden information. Application created using C# programming leanguage and the steganoraphy method using Least Significant Bit Insertion (LSBI). Microsoft Visual Studio used as Integrated Development Environtment (IDE) to code and design the user interface. Software develpment model using Extreme Programming, and the testing using black box method. Application designed to hide text or image inside an image-carrier and the hidden text or image can be recovered. The result of this research are an application that can hide text or image into image-carrier, and the hidden text or image can be recovered. Based on the testing application can run as expected and fulfill all the requirements.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Radcliffe, J. F., M. A. Garrett, T. W. B. Muxlow, R. J. Beswick, P. D. Barthel, A. T. Deller, A. Keimpema, R. M. Campbell y N. Wrigley. "Nowhere to Hide: Radio-faint AGN in GOODS-N field". Astronomy & Astrophysics 619 (noviembre de 2018): A48. http://dx.doi.org/10.1051/0004-6361/201833399.

Texto completo
Resumen
Context. The occurrence of active galactic nuclei (AGN) is critical to our understanding of galaxy evolution and formation. Radio observations provide a crucial, dust-independent tool to study the role of AGN. However, conventional radio surveys of deep fields ordinarily have arc-second scale resolutions often insufficient to reliably separate radio emission in distant galaxies originating from star-formation and AGN-related activity. Very long baseline interferometry (VLBI) can offer a solution by identifying only the most compact radio emitting regions in galaxies at cosmological distances where the high brightness temperatures (in excess of 105 K) can only be reliably attributed to AGN activity. Aims. We present the first in a series of papers exploring the faint compact radio population using a new wide-field VLBI survey of the GOODS-N field. This will expand upon previous surveys, permitting the characterisation of the faint, compact radio source population in the GOODS-N field. The unparalleled sensitivity of the European VLBI Network (EVN) will probe a luminosity range rarely seen in deep wide-field VLBI observations, thus providing insights into the role of AGN to radio luminosities of the order 1022 WHz−1 across cosmic time. Methods. The newest VLBI techniques are used to completely cover an entire 7′̣5 radius area to milliarcsecond resolutions, while bright radio sources (S > 0.1 mJy) are targeted up to 25′ from the pointing centre. Multi-source self-calibration, and a primary beam model for the EVN array are used to correct for residual phase errors and primary beam attenuation respectively. Results. This paper presents the largest catalogue of VLBI detected sources in GOODS-N comprising of 31 compact radio sources across a redshift range of 0.11–3.44, almost three times more than previous VLBI surveys in this field. We provide a machine-readable catalogue and introduce the radio properties of the detected sources using complementary data from the e-MERLIN Galaxy Evolution survey (eMERGE).
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Molina, Jonatan, Mateu Servera y G. Leonard Burns. "Structure of ADHD/ODD Symptoms in Spanish Preschool Children: Dangers of Confirmatory Factor Analysis for Evaluation of Rating Scales". Assessment 27, n.º 8 (2 de abril de 2019): 1748–57. http://dx.doi.org/10.1177/1073191119839140.

Texto completo
Resumen
Confirmatory factor analysis (CFA) is often used to evaluate attention-deficit/hyperactivity disorder (ADHD) and oppositional defiant disorder (ODD) symptom ratings by parents and teachers. An ADHD-inattention (IN), ADHD-hyperactivity/impulsivity (HI), and ODD three-factor model is usually the best model. Acceptable CFA models, however, can hide symptoms with poor convergent and discriminant validity. To demonstrate this issue, CFA models (i.e., cross-loadings set to zero) along with exploratory CFA models (i.e., cross-loadings allowed) were applied to parent ( n = 308) and teacher ( n = 258) ratings of ADHD/ODD symptoms with Spanish preschool children ( Mage = 4.78, SD = .84, 56% boys). While the three-factor CFA model provided an acceptable-fit with moderate to substantial symptom-factor loadings, the three-factor exploratory CFA model, however, found a large number of the symptoms failed to show convergent and discriminant validity. These outcomes argue for the use of exploratory CFA procedures in the initial evaluation of ADHD/ODD rating scales.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Liu, Hanlin, Jingju Liu, Xuehu Yan, Lintao Liu, Wanmeng Ding y Yue Jiang. "A Novel Behavior Steganography Model Based on Secret Sharing". International Journal of Digital Crime and Forensics 11, n.º 4 (octubre de 2019): 97–117. http://dx.doi.org/10.4018/ijdcf.2019100107.

Texto completo
Resumen
This article proposes a novel behavior steganography model based on secret sharing, the main idea of which is to use secret messages as random elements in the secret sharing process to generate shadow images. Based on the introduced model and analyzing two secret image sharing algorithms — threshold secret image sharing (SIS) and threshold visual secret sharing (VSS), two specific behavior steganography schemes are presented, which are implemented by utilizing secret sharing behavior. In the embedding phase, the random selection behavior is employed to hide secret messages. In the extraction phase, when the secret image is recovered from shadow images, secret messages can also be extracted successfully. The contribution of the authors model is that two secret information transmission channels are opened, which provides a large amount of hidden capacity and has loss tolerance and so on. Experimental results and analyses demonstrate the effectiveness of the proposed scheme. It has both good imperceptibility and large capacity, but the robustness of their scheme is poor.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Shahraeini, Sanaz y Mahdi Yaghoobi. "A New Approach in Digital Image Watermarking Using Fractal Model in DWT Domain". Advanced Materials Research 403-408 (noviembre de 2011): 3510–18. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.3510.

Texto completo
Resumen
The recent progress in the digital multimedia technologies has offered many facilities in the transmission, reproduction and manipulation of data. However, this advance has also brought the problem such as copyright protection for content providers. Digital watermarking is one of the proposed solutions for copyright protection of multimedia. This paper proposes a blind watermarking algorithm based on fractal model in discrete wavelet domain for copyright protection. The idea of the presented scheme is to hide a binary image as a watermark with fractal parameters in wavelet domain of host image. Fractal compression technique is used to encode a gray image and fractal codes are embedded into the wavelet coefficients of the gray image according to well-connected watermark algorithm. The experimental results show that the algorithm is robust against geometric and non geometric attacks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Lu, Yong Qiang, Fang Yong y He Xiang. "The Research on Hybrid Communication Model for Trojan Based on P2P". Advanced Materials Research 791-793 (septiembre de 2013): 2038–42. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.2038.

Texto completo
Resumen
Direct connection and reflective connection are commonly used in traditional Trojans communication model, which have some significant deficiencies in hiding, anti-tracking, and efficiency. To improve the aspects above in traditional Trojan horse communication model, the author proposed a hybrid communication model based on P2P technology. The model uses P2P intranet penetration protocol to build the channel between the controlled station and the control station, and uses P2P node servers for saving the Trojans status and transferring some data between the controlled and the control. The topology of networks for controller will be very flexible. Using the IP traceback technology will be difficult to track the controllers. Using UDP protocol in the hybrid communication model for data transmission will hide the network status. Control sites can work in distributed mode. By using the model, the hiding-ability, anti-traceability and communication efficiency will be greatly improved.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Chirumbolo, Salvatore. "Hormesis, resveratrol and plant-derived polyphenols: some comments". Human & Experimental Toxicology 30, n.º 12 (9 de mayo de 2011): 2027–30. http://dx.doi.org/10.1177/0960327111408153.

Texto completo
Resumen
Hormesis is a dose–response phenomenon, usually present in plants and animals, characterized by a low-dose stimulation and high-dose inhibition, often resulting in typical U-shaped or J-shaped curves. Hormesis has become an interesting model for toxicology and risk assessment, as it has been described for several nature-derived phytochemicals but also because this adaptive response to stressors might hide an underlying more general behaviour of cell towards low doses.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía