16,033 research outputs found
An Efficient Approach to Secure Versatile Data File in Video using Forbidden Zone Data Hiding Technique
Video Steganography is a technique in which we can hide all types of files with any extension into a carrying Video file. In this dissertation, we are using two main terminology that is host file and carrier file where host file is a hidden file (any kind of file like text file, image file, and audio/video file) and carrier file must be a video file. The main motivation of this dissertation is to secure transferring of data by using steganography and cryptography technique. It is concerned with embedding information in an innocuous cover media in a secure and robust manner. In this dissertation we are using Forbidden Zone Data Hiding technique where no alteration is required in host signal range during data hiding process.To securely transferring the data file, we use video data hiding and making use of correction capacity of repeat accumulate code with superiority of forbidden zone data hiding. Using this approach we can also hide and transfer the large video file whose size is larger than cover file in secure manner. The main advantage of using video file in hiding information is the added security against of the third party or unintended receiver due to the relative complexity of video compared to image and audio file
Patterned probes for high precision 4D-STEM bragg measurements.
Nanoscale strain mapping by four-dimensional scanning transmission electron microscopy (4D-STEM) relies on determining the precise locations of Bragg-scattered electrons in a sequence of diffraction patterns, a task which is complicated by dynamical scattering, inelastic scattering, and shot noise. These features hinder accurate automated computational detection and position measurement of the diffracted disks, limiting the precision of measurements of local deformation. Here, we investigate the use of patterned probes to improve the precision of strain mapping. We imprint a "bullseye" pattern onto the probe, by using a binary mask in the probe-forming aperture, to improve the robustness of the peak finding algorithm to intensity modulations inside the diffracted disks. We show that this imprinting leads to substantially improved strain-mapping precision at the expense of a slight decrease in spatial resolution. In experiments on an unstrained silicon reference sample, we observe an improvement in strain measurement precision from 2.7% of the reciprocal lattice vectors with standard probes to 0.3% using bullseye probes for a thin sample, and an improvement from 4.7% to 0.8% for a thick sample. We also use multislice simulations to explore how sample thickness and electron dose limit the attainable accuracy and precision for 4D-STEM strain measurements
A Numerical Testbed for Hypotheses of Extraterrestrial Life and Intelligence
The search for extraterrestrial intelligence (SETI) has been heavily
influenced by solutions to the Drake Equation, which returns an integer value
for the number of communicating civilisations resident in the Milky Way, and by
the Fermi Paradox, glibly stated as: "If they are there, where are they?". Both
rely on using average values of key parameters, such as the mean signal
lifetime of a communicating civilisation. A more accurate answer must take into
account the distribution of stellar, planetary and biological attributes in the
galaxy, as well as the stochastic nature of evolution itself. This paper
outlines a method of Monte Carlo realisation which does this, and hence allows
an estimation of the distribution of key parameters in SETI, as well as
allowing a quantification of their errors (and the level of ignorance therein).
Furthermore, it provides a means for competing theories of life and
intelligence to be compared quantitatively.Comment: 22 pages, 24 figures, accepted by the International Journal of
Astrobiolog
The Chemical Weapons Convention and Riot Control Agents: Advantages of a āMethodsā Approach to Arms Control
This technical report summarizes a number of results for the multivariate t distribution which can exhibit heavier tails than the Gaussian distribution. It is shown how t random variables can be generated, the probability density function (pdf) is derived, and marginal and conditional densities of partitioned t random vectors are presented. Moreover, a brief comparison with the multivariate Gaussian distribution is provided. The derivations of several results are given in an extensive appendix.MC Impuls
Jewish Youth in the Minsk Ghetto: How Age and Gender Mattered
Explores how young Soviet Jews survived the German occupation of Soviet territories, specifically ghettoization and mass murder
Gravitino Dark Matter and Flavor Symmetries
In supersymmetric theories without R-parity, the gravitino can play the role
of a decaying Dark Matter candidate without the problem of late NLSP decays
affecting Big Bang Nucleosynthesis. In this work, we elaborate on recently
discussed limits on R-parity violating couplings from decays to antideuterons
and discuss the implications for two classes of flavor symmetries: horizontal
symmetries, and Minimal Flavor Violation. In most of the parameter space the
antideuteron constraints on R-parity violating couplings are stronger than
low-energy baryon-number-violating processes. Even in the absence of flavor
symmetries, we find strong new limits on couplings involving third-generation
fields, and discuss the implications for LHC phenomenology. For TeV scale
superpartners, we find that the allowed MFV parameter space is a corner with
gravitino masses smaller than O(10) GeV and small .Comment: 19 pages, matches JHEP published version. References added, minor
change
- ā¦