Tumors use bacteria to hide away

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introducing an algorithm for use to hide sensitive association rules through perturb technique

Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...

متن کامل

Family substance use screening: less to hide, more to gain

substance use disorders highlights the magnitude of the challenge the society is facing and a critical need to identify evidence-based, practical approaches in order to effectively screen people at high risk for unhealthy alcohol use, tobacco and drug use, increase early detection of substance use disorders, and offer the proper care they need. The Family CAGE (an acronym of four questions on a...

متن کامل

Use HypE to Hide Association Rules by Adding Items

During business collaboration, partners may benefit through sharing data. People may use data mining tools to discover useful relationships from shared data. However, some relationships are sensitive to the data owners and they hope to conceal them before sharing. In this paper, we address this problem in forms of association rule hiding. A hiding method based on evolutionary multi-objective op...

متن کامل

Nowhere to hide.

Northern Hemisphere's carbon dioxide emissions. "That's much more than any terrestrial plant ecologist would have considered likely," Tans said. Conserving tree and plant populations, he added, might raise their carbon dioxide uptake even higher. Understanding how carbon cycles through plants is vital to decreasing global warming. By burning fuel and clearing forests, human activity generates 7...

متن کامل

Where to Hide the Bits ?

We present a stochastic two-player zero-sum game between defender and attacker related to the security of practical steganography. The defender wants to hide a message in a cover object drawn by nature. The attacker wants to distinguish plain covers from those with a hidden message. We study the case of n-bit covers, independently but not identically distributed to allow for variation in the pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science

سال: 2015

ISSN: 0036-8075,1095-9203

DOI: 10.1126/science.347.6227.1214-a