منابع مشابه
Sufficient conditions for maximally edge-connected and super-edge-connected
Let $G$ be a connected graph with minimum degree $delta$ and edge-connectivity $lambda$. A graph ismaximally edge-connected if $lambda=delta$, and it is super-edge-connected if every minimum edge-cut istrivial; that is, if every minimum edge-cut consists of edges incident with a vertex of minimum degree.In this paper, we show that a connected graph or a connected triangle-free graph is maximall...
متن کاملZernike Moments and Edge Features Based Semi- Fragile Watermark for Image Authentication with Tampering Localization
This paper present a novel content-based image authentication framework which embeds the semi-fragile image feature into the host image based on wavelet transform. In this framework, two features of a target image from the low frequency domain to generate two watermarks: Zernike moments for classifying of the intentional content modification and Sobel edge features for indicating the modified l...
متن کاملFragile States
Fragile States Fragile States T UNU-WIDER PROJECT ON “FRAGILITY AND development’’ began with the premise that dealing simultaneously with household vulnerability and state fragility is probably one of the most urgent development challenges of our time. Consequently, the project explored the dimensions of household vulnerability and state fragility in development. This research brief is about th...
متن کاملFragile X syndrome and fragile X-associated disorders
Fragile X syndrome (FXS) is caused by a full mutation on the FMR1 gene and a subsequent lack of FMRP, the protein product of FMR1. FMRP plays a key role in regulating the translation of many proteins involved in maintaining neuronal synaptic connections; its deficiency may result in a range of intellectual disabilities, social deficits, psychiatric problems, and dysmorphic physical features. A ...
متن کاملFRAGILE and SEMI - FRAGILE WATERMARKING TECHNIQUES for IMAGE AUTHENTICATION
Techniques to establish the authenticity and integrity of digital images are becoming increasly essential over the Intermet. The authentication algorithm should distinguish malicious manipulations from the original watermarked image[1]. Fragile watermarking is recomended for a very sensible image authentication scheme, able to localize the slightest changes occured to the marked image. The frag...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wilderness & Environmental Medicine
سال: 2001
ISSN: 1080-6032
DOI: 10.1580/1080-6032(2001)012[0224:br]2.0.co;2