The Journal of Supercomputing - The exponential growth in the number of Internet of things (IoT) devices and their potential in many applications in a vast number of domains fuelled the development... 相似文献
In this paper, we propose a reversible data hiding scheme that exploits the centroid formula. Specifically, we use it to define a centroid boundary vector and a centroid state codebook CSCB. Initially, our centroid boundary vectors and CSCBs are the same as the side match vector quantization (SMVQ) algorithm’s boundary vectors and state codebooks SCBs. For each VQ index, the proposed scheme exploits the centroid formula to update its centroid boundary vector and the corresponding CSCB. The updating is coupled with a heuristic to select the best state codebook (i.e., either SCB or CSCB) for each VQ index, which generates a highly compressible distribution of index values. Our experimental results show that the proposed scheme can embed n = 1, 2, 3, and 4 bit per index (bpi) at bit rates of 0.332, 0.394, 0.457, and 0.519 bit per pixel (bpp), respectively, for the main codebook size N = 256. These results confirm that the proposed scheme improves recent VQ and SMVQ based reversible data hiding schemes.
With odors as conditioned stimuli (CSs) and CO?-enriched air as the unconditioned stimulus, participants learned to exhibit respiratory responses and somatic complaints on presentation of only the odor CS+. Studied was whether complaints during CS+-only trials were inferred from the conditioned somatic responses or were based on activated memory of the complaints during acquisition. Participants (N?=?56) were either attentionally directed away or not from the complaints during acquisition, and the effects on somatic complaints during test were studied. Respiratory responses, heart rate, and somatic complaints were measured. No physiological conditioning effects were found. However, more complaints were reported to the CS+ than to the CS– odor, but only when the CS+ was foul smelling. This effect was modulated by the attention manipulation, showing that the learned complaints during the test phase were based on memory of the acquisition complaints and not on physiological responses during the test. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
A semi-mechanistic model for predicting the flow behavior of a typical commercial dual-phase steel containing 20 vol pct of
‘as quenched’ martensite and varying amounts of retained austenite has been developed in this paper. Assuming that up to 20
vol pct of austenite with different degrees of mechanical stability can be retained as a result of certain thermomechanical
treatments in a steel of appropriate low carbon low alloy chemistry, expressions for composite flow stress and strain have
been derived. The model takes into account the work hardening of the individual microconstituents(viz., ferrite-@#@ α, retained austenite- γr, and martensite -α′) and the extra hardening of ferrite caused by accommodation dislocations surrounding the ‘as quenched’
as well as the strain-induced(γr→ α′) martensite. Load transfer between the phases has been accounted for using an intermediate law of mixtures which also
considers the relative hardness of the soft and the hard phases. From the derived expressions, the flow behavior of dual phase
steels can be predicted if the properties of the individual microconstituents are known. Versatility of the model for application
to other commercial steels containing a metastable phase is discussed. 相似文献
Our objective was to determine the maximum tolerated dose and toxicity of i.v. edatrexate with p.o. leucovorin. Thirty-one adults with advanced solid tumors received edatrexate as a 2-h infusion, once a week for 3 weeks, recycled every 28 days. p.o. leucovorin (10 mg/m2, every 6 h for 10 doses) began 24 h later. All had urinary alkalinization and p.o. hydration. Nine dosage levels ranging from 120 to 3750 mg/m2 were explored. Fatigue, epistaxis, nausea/emesis, mucositis, rash, myalgias, leukopenia, thrombocytopenia, and transient elevations of serum aspartate transferase were observed. Leukoencephalopathy with clinical manifestations occurred in two patients (one had prior cranial irradiation). Pharmacokinetic studies carried out at the 120- and 1080-mg/m2 dose levels revealed no significant difference in the elimination half-life at the two dose levels studied and no significant intrapatient variability between day 1 and day 8 edatrexate administration. Serum edatrexate levels measured using a dihydrofolate reductase inhibition assay correlated with those by high-performance liquid chromatography. Three major and two minor antitumor responses occurred. The maximum tolerated dose was 3750 mg/m2, with grade 3 or 4 leukopenia (one patient), stomatitis (one patient), and leukoencephalopathy (one patient). Because of the occurrence of leukoencephalopathy, further study of high-dose edatrexate with leucovorin rescue is not recommended. 相似文献
This article reviews the research literature on sexual fantasy, a central aspect of human sexual behavior. Topics include (a) gender similarities and differences in the incidence, frequency, and content of sexual fantasies and how they relate to sociocultural and sociobiological theories of sexual behavior; (b) the association between frequency or content of sexual fantasies and variables such as age, sexual adjustment and satisfaction, guilt, sexual orientation, personality, and sexual experience; and (c) "deviant" sexual fantasies (i.e., what they are, whether they play a role in the commission of sexual crimes, and whether they can be modified). The article ends with a summary of major findings and suggestions for future research. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
Fog computing improves efficiency and reduces the amount of bandwidth to the cloud. In many use cases, the internet of things (IoT) devices do not know the fog nodes in advance. Moreover, as the fog nodes are often placed in open publicly available places, they can be easily captured. Therefore, it should be ensured that even if the key material is leaked from the fog devices, the previously generated session keys and the identity of the devices can be kept secret, i.e. satisfying anonymity, unlinkability, perfect forward secrecy and resistance against stolen devices attack. Such demands require a multi-factor authentication scheme, which is typically done by providing input of the user with password or biometric data. However, in real use case scenarios, IoT devices should be able to automatically start the process without requiring such manual interaction and also fog devices need to autonomously operate. Therefore, this paper proposes a physical unclonable function (PUF) based mutual authentication scheme, being the first security scheme for a fog architecture, capable of providing simultaneously all these suggested security features. In addition, we also show the resistance against other types of attacks like synchronization and known session specific temporary information attack. Moreover, the scheme only relies on symmetric key based operations and thus results in very good performance, compared to the other fog based security systems proposed in literature.
Secure online communication is a necessity in today’s digital world. This paper proposes a novel reversible data hiding technique based on side match vector quantization (SMVQ). The proposed scheme classifies SMVQ indices as Case 1 or 2 based on the value of the first state codeword’s side match distortion (SMD) and a predefined threshold t. The proposed scheme uses this classification to switch between compression codes designed for Cases 1 and 2 SMVQ indices. The length of these compression codes is controlled by the parameter ?. Thus, with the selection of appropriate ? and t values, the proposed scheme achieves good compression, creating spaces to embed secret information. The embedding algorithm can embed n secret bits into each SMVQ index, where n = 1, 2, 3, or 4. The experimental results show that the proposed scheme obtains the embedding rates of 1, 2, 3, or 4 bit per index (bpi) at the average bit rates of 0.340, 0.403, 0.465, or 0.528 bit per pixel (bpp) for the codebook size 256. This improves the performance of recent VQ and SMVQ-based data hiding schemes. 相似文献