150 research outputs found
A comparison of the growth potential of Dover sole (Solea solea) and Senegal sole (Solea senegalensis) under intensive rearing conditions
This trial was set up to compare the growth performance of Dover sole and Senegal sole under intensive rearing conditions
Gonad Development of male Sole, S. solea (L.), in natural and culture conditions between March and June 2003 in relation to environmental factors
The aim of the present study was to detect differences of spermatogenesis between wild, captured and reared (F1) sole (Solea solea L.) broodstock. Differences between sampling months March and June 2003 as well as differences between groups were determined
Transforming a methodological dilemma into a rewarding research opportunity
This article focuses on an investigation of English as a Foreign Language
(EFL) teacher (de)motivation in Spain which underwent a methodological
transformation from mixed methods to a qualitative approach.
Unexpected statistical results from the questionnaire in the piloting
phase led to the creation of interview prompts, a dynamic data collection
instrument based on reliable items from the questionnaire which was
disregarded from the main study at a later stage. The interview prompts
provided a card-based data collection method which engaged participants
in reflective and challenging tasks. This paper will discuss an unsettling
challenge in the research process, how it was seized and the positive
outcome which emerged from this unpredicted pitfall. A research breakdown
welcomed a methodological turn enabled by the researcher’s
reflection on the research dilemma. Authors are encouraged to defy and
embrace research obstacles while learning from them and sharing the
solutions with the research community
Cytomolecular identification of individual wheat-wheat chromosome arm associations in wheat-rye hybrids
Chromosome pairing in the meiotic metaphase I of wheatrye
hybrids has been characterized by sequential genomic
and fluorescent in situ hybridization allowing not only the
discrimination of wheat and rye chromosomes, but also the
identification of the individual wheat and rye chromosome
arms involved in the chromosome associations. The majority
of associations (93.8%) were observed between the wheat
chromosomes. The largest number of wheat-wheat chromosome
associations (53%) was detected between the A and D
genomes, while the frequency of B-D and A-B associations
was significantly lower (32 and 8%, respectively). Among the
A-D chromosome associations, pairing between the 3AL and
3DL arms was observed with the highest frequency, while
the most frequent of all the chromosome associations (0.113/
cell) was found to be the 3DS-3BS. Differences in the pairing
frequency of the individual chromosome arms of wheat-rye
hybrids have been discussed in relation to the homoeologous
relationships between the constituent genomes of
hexaploid wheat
Digital image watermarking: its formal model, fundamental properties and possible attacks
While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes
Generalized PVO‐based dynamic block reversible data hiding for secure transmission using firefly algorithm
In this paper, we proposed a novel generalized pixel value ordering–based reversible data hiding using firefly algorithm (GPVOFA). The sequence of minimum and maximum number pixels value has been used to embed the secret data while prediction and modification are held on minimum, and the maximum number of pixel blocks is used to embed the secret data into multiple bits. The host image is divided into the size of noncoinciding dynamic blocks on the basis of firefly quadtree partition, whereas rough blocks are divided into a larger size; moreover, providing more embedding capacity used small flat blocks size and optimal location in the block to write the information. Our proposed method becomes able to embed large data into a host image with low distortion. The rich experimental results are better, as compared with related preceding arts
Global wealth disparities drive adherence to COVID-safe pathways in head and neck cancer surgery
Peer reviewe
- …