1,975 research outputs found
Novel colour image-hiding scheme using error diffusion technique
[[abstract]]A colour image-hiding scheme is presented which can hide multiple colour secret images into one colour host image of the same size imperceptibly. The proposed scheme uses the error diffusion technique to convert colour secret images into colour halftone images. Then the results are encrypted and embedded in the colour host image. In order to provide the embedded image and the extracted image with good visual quality, a bit-adjustment mechanism and a low-pass filter are employed in the embedding and extraction procedures, respectively. The scheme does not need to refer to the original host image. In addition, it satisfies the basic image-hiding requirements: high hiding capacity, imperceptibility and data security. The experimental results demonstrate that the proposed scheme can achieve a better stego-image quality as well as extracted secret image visual quality. In addition, compared with other colour hiding schemes, the scheme can embed more secret colour images
Traffic agents for improving QoS in mixed infrastructure and ad hoc modes wireless LAN
As an important complement to infrastructured wireless networks, mobile ad hoc networks (MANET) are more flexible in providing wireless access services, but more difficult in meeting different quality of service (QoS) requirements for mobile customers. Both infrastructure and ad hoc network structures are supported in wireless local area networks (WLAN), which can offer high data-rate wireless multimedia services to the mobile stations (MSs) in a limited geographical area. For those out-of-coverage MSs, how to effectively connect them to the access point (AP) and provide QoS support is a challenging issue. By mixing the infrastructure and the ad hoc modes in WLAN, we propose in this paper a new coverage improvement scheme that can identify suitable idle MSs in good service zones as traffic agents (TAs) to relay traffic from those out-of-coverage MSs to the AP. The service coverage area of WLAN is then expanded. The QoS requirements (e.g., bandwidth) of those MSs are considered in the selection process of corresponding TAs. Mathematical analysis, verified by computer simulations, shows that the proposed TA scheme can effectively reduce blocking probability when traffic load is light
Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks.
The two-dimensional quick response (QR) codes can be misleading due to the difficulty in differentiating a genuine QR code from a malicious one. Since, the vulnerability is practically part of their design, scanning a malicious QR code can direct the user to cloned malicious sites resulting in revealing sensitive information. In order, to evaluate the vulnerabilities and propose subsequent countermeasures, we demonstrate this type of attack through a simulated experiment, where a malicious QR code directs a user to a phishing site. For our experiment, we cloned Google's web page providing access to their email service (Gmail). Since, the URL is masqueraded into the QR code the unsuspecting user who opens the URL is directed to the malicious site. Our results proved that hackers could easily leverage QR codes into phishing attack vectors targeted at smartphone users, even bypassing web browsers safe browsing feature. In addition, the second part of our paper presents adequate countermeasures and introduces QRCS (Quick Response Code Secure). QRCS is a universal efficient and effective solution focusing exclusively on the authenticity of the originator and consequently, the integrity of QR code by using digital signatures
Modulation of the Disturbed Motor Network in Dystonia by Multisession Suppression of Premotor Cortex
Daily sessions of therapeutic transcranial brain stimulation are thought to prolong or amplify the effect of a single intervention. Here we show in patients with focal hand dystonia that additional, new effects build up progressively over time, making it difficult to predict the effect of long term interventions from shorter treatment sessions. In a sham-controlled study, real or sham continuous theta burst stimulation (cTBS) was given once daily for five consecutive days to dorsolateral premotor cortex (PMd). Five days of real, but not sham, premotor cTBS improved intracortical inhibition in primary motor cortex (M1) to a similar extent on day 1 and day 5. However 5 days of cTBS were required to restore the abnormal PMd-M1 interactions observed on day 1. Similarly, excessive M1 plasticity seen at baseline was also significantly reduced by five days of real premotor cTBS. There was only a marginal benefit on writing. The results show that additional, new effects, at sites distant from the point of stimulation, build up progressively over time, making it difficult to predict the effect of long term interventions from shorter treatment sessions. The results indicate that it may take many days of therapeutic intervention to rebalance activity in a complex network
Predicting Head Pose in Dyadic Conversation
Natural movement plays a significant role in realistic speech animation. Numerous studies have demonstrated the contribution visual cues make to the degree we, as human observers, find an animation acceptable. Rigid head motion is one visual mode that universally co-occurs with speech, and so it is a reasonable strategy to seek features from the speech mode to predict the head pose. Several previous authors have shown that prediction is possible, but experiments are typically confined to rigidly produced dialogue. Expressive, emotive and prosodic speech exhibit motion patterns that are far more difficult to predict with considerable variation in expected head pose. People involved in dyadic conversation adapt speech and head motion in response to the others’ speech and head motion. Using Deep Bi-Directional Long Short Term Memory (BLSTM) neural networks, we demonstrate that it is possible to predict not just the head motion of the speaker, but also the head motion of the listener from the speech signal
Mitochondrial and nuclear genes suggest that stony corals are monophyletic but most families of stony corals are not (Order Scleractinia, Class Anthozoa, Phylum Cnidaria)
Modern hard corals (Class Hexacorallia; Order Scleractinia) are widely studied because of their fundamental role in reef
building and their superb fossil record extending back to the Triassic. Nevertheless, interpretations of their evolutionary
relationships have been in flux for over a decade. Recent analyses undermine the legitimacy of traditional suborders,
families and genera, and suggest that a non-skeletal sister clade (Order Corallimorpharia) might be imbedded within the
stony corals. However, these studies either sampled a relatively limited array of taxa or assembled trees from heterogeneous
data sets. Here we provide a more comprehensive analysis of Scleractinia (127 species, 75 genera, 17 families) and various
outgroups, based on two mitochondrial genes (cytochrome oxidase I, cytochrome b), with analyses of nuclear genes (ßtubulin,
ribosomal DNA) of a subset of taxa to test unexpected relationships. Eleven of 16 families were found to be
polyphyletic. Strikingly, over one third of all families as conventionally defined contain representatives from the highly
divergent "robust" and "complex" clades. However, the recent suggestion that corallimorpharians are true corals that have
lost their skeletons was not upheld. Relationships were supported not only by mitochondrial and nuclear genes, but also
often by morphological characters which had been ignored or never noted previously. The concordance of molecular
characters and more carefully examined morphological characters suggests a future of greater taxonomic stability, as well as
the potential to trace the evolutionary history of this ecologically important group using fossils
Bench-to-bedside review : targeting antioxidants to mitochondria in sepsis
Peer reviewedPublisher PD
Unacylated ghrelin promotes adipogenesis in rodent bone marrow via ghrelin O-acyl transferase and GHS-R1a activity: evidence for target cell-induced acylation
Despite being unable to activate the cognate ghrelin receptor (GHS-R), unacylated ghrelin (UAG) possesses a unique activity spectrum that includes promoting bone marrow adipogenesis. Since a receptor mediating this action has not been identified, we re-appraised the potential interaction of UAG with GHS-R in the regulation of bone marrow adiposity. Surprisingly, the adipogenic effects of intra-bone marrow (ibm)-infused acylated ghrelin (AG) and UAG were abolished in male GHS-R-null mice. Gas chromatography showed that isolated tibial marrow adipocytes contain the medium-chain fatty acids utilised in the acylation of UAG, including octanoic acid. Additionally, immunohistochemistry and immunogold electron microscopy revealed that tibial marrow adipocytes show prominent expression of the UAG-activating enzyme ghrelin O-acyl transferase (GOAT), which is located in the membranes of lipid trafficking vesicles and in the plasma membrane. Finally, the adipogenic effect of ibm-infused UAG was completely abolished in GOAT-KO mice. Thus, the adipogenic action of exogenous UAG in tibial marrow is dependent upon acylation by GOAT and activation of GHS-R. This suggests that UAG is subject to target cell-mediated activation – a novel mechanism for manipulating hormone activity
Branch Mode Selection during Early Lung Development
Many organs of higher organisms, such as the vascular system, lung, kidney,
pancreas, liver and glands, are heavily branched structures. The branching
process during lung development has been studied in great detail and is
remarkably stereotyped. The branched tree is generated by the sequential,
non-random use of three geometrically simple modes of branching (domain
branching, planar and orthogonal bifurcation). While many regulatory components
and local interactions have been defined an integrated understanding of the
regulatory network that controls the branching process is lacking. We have
developed a deterministic, spatio-temporal differential-equation based model of
the core signaling network that governs lung branching morphogenesis. The model
focuses on the two key signaling factors that have been identified in
experiments, fibroblast growth factor (FGF10) and sonic hedgehog (SHH) as well
as the SHH receptor patched (Ptc). We show that the reported biochemical
interactions give rise to a Schnakenberg-type Turing patterning mechanisms that
allows us to reproduce experimental observations in wildtype and mutant mice.
The kinetic parameters as well as the domain shape are based on experimental
data where available. The developed model is robust to small absolute and large
relative changes in the parameter values. At the same time there is a strong
regulatory potential in that the switching between branching modes can be
achieved by targeted changes in the parameter values. We note that the sequence
of different branching events may also be the result of different growth
speeds: fast growth triggers lateral branching while slow growth favours
bifurcations in our model. We conclude that the FGF10-SHH-Ptc1 module is
sufficient to generate pattern that correspond to the observed branching modesComment: Initially published at PLoS Comput Bio
- …