Attitude and Concealing Coloration

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DNA-Inspired Information Concealing

Protection of the sensitive content is crucial for extensive information sharing. We present a technique of information concealing, based on introduction and maintenance of families of repeats. Repeats in DNA constitute a basic obstacle for its reconstruction by hybridisation. Information concealing in DNA by repeats is considered in [1].

متن کامل

Concealing with Structured Light

While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, b...

متن کامل

Concealing Campus Sexual Assault

This study tests whether there is substantial undercounting of sexual assault by universities. It compares the sexual assault data submitted by universities while being audited for Clery Act violations with the data from years before and after such audits. If schools report higher rates of sexual assault during times of higher regulatory scrutiny (audits), then that result would support the con...

متن کامل

Investigating Identity Concealing and Email Tracing Techniques

At present it is very difficult to trace the identity of spammers who use identity concealment techniques. It is difficult to determine the identity of the spammer by just analysing the electronic trail. This paper will look at standard email tracing techniques and how email senders try and hide their electronic trail. The identity concealing techniques that that are discussed are: Spoofing, Bo...

متن کامل

Concealing Block Sizes Is Not Sufficient

correctly noted that blocked randomiza-tion has a disadvantage that " the executer can predict the next assignment " and this is clearly incompatible with allocation concealment. So we can agree that permuted blocks with a fixed block size should never be used in ran-domized trials. 2) But what is the solution to this problem? Kim and Shin 1) indicated that " To solve this problem, the allocato...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1937

ISSN: 0028-0836,1476-4687

DOI: 10.1038/140684a0