16,033 research outputs found

    An Efficient Approach to Secure Versatile Data File in Video using Forbidden Zone Data Hiding Technique

    Get PDF
    Video Steganography is a technique in which we can hide all types of files with any extension into a carrying Video file. In this dissertation, we are using two main terminology that is host file and carrier file where host file is a hidden file (any kind of file like text file, image file, and audio/video file) and carrier file must be a video file. The main motivation of this dissertation is to secure transferring of data by using steganography and cryptography technique. It is concerned with embedding information in an innocuous cover media in a secure and robust manner. In this dissertation we are using Forbidden Zone Data Hiding technique where no alteration is required in host signal range during data hiding process.To securely transferring the data file, we use video data hiding and making use of correction capacity of repeat accumulate code with superiority of forbidden zone data hiding. Using this approach we can also hide and transfer the large video file whose size is larger than cover file in secure manner. The main advantage of using video file in hiding information is the added security against of the third party or unintended receiver due to the relative complexity of video compared to image and audio file

    Patterned probes for high precision 4D-STEM bragg measurements.

    Get PDF
    Nanoscale strain mapping by four-dimensional scanning transmission electron microscopy (4D-STEM) relies on determining the precise locations of Bragg-scattered electrons in a sequence of diffraction patterns, a task which is complicated by dynamical scattering, inelastic scattering, and shot noise. These features hinder accurate automated computational detection and position measurement of the diffracted disks, limiting the precision of measurements of local deformation. Here, we investigate the use of patterned probes to improve the precision of strain mapping. We imprint a "bullseye" pattern onto the probe, by using a binary mask in the probe-forming aperture, to improve the robustness of the peak finding algorithm to intensity modulations inside the diffracted disks. We show that this imprinting leads to substantially improved strain-mapping precision at the expense of a slight decrease in spatial resolution. In experiments on an unstrained silicon reference sample, we observe an improvement in strain measurement precision from 2.7% of the reciprocal lattice vectors with standard probes to 0.3% using bullseye probes for a thin sample, and an improvement from 4.7% to 0.8% for a thick sample. We also use multislice simulations to explore how sample thickness and electron dose limit the attainable accuracy and precision for 4D-STEM strain measurements

    A Numerical Testbed for Hypotheses of Extraterrestrial Life and Intelligence

    Full text link
    The search for extraterrestrial intelligence (SETI) has been heavily influenced by solutions to the Drake Equation, which returns an integer value for the number of communicating civilisations resident in the Milky Way, and by the Fermi Paradox, glibly stated as: "If they are there, where are they?". Both rely on using average values of key parameters, such as the mean signal lifetime of a communicating civilisation. A more accurate answer must take into account the distribution of stellar, planetary and biological attributes in the galaxy, as well as the stochastic nature of evolution itself. This paper outlines a method of Monte Carlo realisation which does this, and hence allows an estimation of the distribution of key parameters in SETI, as well as allowing a quantification of their errors (and the level of ignorance therein). Furthermore, it provides a means for competing theories of life and intelligence to be compared quantitatively.Comment: 22 pages, 24 figures, accepted by the International Journal of Astrobiolog

    The Chemical Weapons Convention and Riot Control Agents: Advantages of a ā€œMethodsā€ Approach to Arms Control

    Get PDF
    This technical report summarizes a number of results for the multivariate t distribution which can exhibit heavier tails than the Gaussian distribution. It is shown how t random variables can be generated, the probability density function (pdf) is derived, and marginal and conditional densities of partitioned t random vectors are presented. Moreover, a brief comparison with the multivariate Gaussian distribution is provided. The derivations of several results are given in an extensive appendix.MC Impuls

    Jewish Youth in the Minsk Ghetto: How Age and Gender Mattered

    Get PDF
    Explores how young Soviet Jews survived the German occupation of Soviet territories, specifically ghettoization and mass murder

    Gravitino Dark Matter and Flavor Symmetries

    Full text link
    In supersymmetric theories without R-parity, the gravitino can play the role of a decaying Dark Matter candidate without the problem of late NLSP decays affecting Big Bang Nucleosynthesis. In this work, we elaborate on recently discussed limits on R-parity violating couplings from decays to antideuterons and discuss the implications for two classes of flavor symmetries: horizontal symmetries, and Minimal Flavor Violation. In most of the parameter space the antideuteron constraints on R-parity violating couplings are stronger than low-energy baryon-number-violating processes. Even in the absence of flavor symmetries, we find strong new limits on couplings involving third-generation fields, and discuss the implications for LHC phenomenology. For TeV scale superpartners, we find that the allowed MFV parameter space is a corner with gravitino masses smaller than O(10) GeV and small tanā”Ī²\tan\beta.Comment: 19 pages, matches JHEP published version. References added, minor change
    • ā€¦
    corecore