Concealed to Protect and Protect to Conceal: A Conserved Stego Image
نویسندگان
چکیده
منابع مشابه
Patients with cancer often felt a need to conceal their distress to protect family, friends, and doctors.
Design Qualitative study. Setting Hospital clinics and a day care at an associated hospice in the UK. Participants 30 patients who were 37–88 years of age (median age 55 y, 60% women, 100% white). Patients had cancer of the breast (n=11), lung (n=4), bowel/anus (n=6), larynx/ tonsil/neck (n=3), cervix (n=2), kidney/liver (n=2), and prostate (n=1). 1 patient had non-Hodgkin's lymphoma. The time ...
متن کاملPartnerships to protect.
Background: Antisense oligonucleotides (AOs) can interfere with exon recognition and intron removal during pre-mRNA processing, and induce excision of a targeted exon from the mature gene transcript. AOs have been used in vitro and in vivo to redirect dystrophin pre-mRNA processing in human and animal cells. Targeted exon skipping of selected exons in the dystrophin gene transcript can remove n...
متن کاملChoosing What to Protect
We study a strategic model in which a defender must allocate defensive resources to a collection of locations, and an attacker must choose a location to attack. The defender does not know the attacker's preferences, while the attacker observes the defender's resource allocation. The defender's problem gives rise to negative externalities, in the sense that increasing the resources allocated to ...
متن کاملThe duty to protect.
Privilege and confidentiality are central to the physician–patient relationship. These concepts are protected by law in almost all jurisdictions (1,2). Breaches of confidentiality have long been considered unethical and, in many situations, actionable. In this regard, physicians have been governed by their standards of practice, by the regulations of their professional colleges, and in many jur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Research Journal of Information Technology
سال: 2013
ISSN: 1815-7432
DOI: 10.3923/rjit.2013.209.217