Medical apps in endocrine diseases – hide and seek
نویسندگان
چکیده
منابع مشابه
Hide and seek in Arizona
Laboratory subjects repeatedly played one of two variations of a simple two-person zero-sum game of ‘‘hide and seek’’. Three puzzling departures from the prescriptions of equilibrium theory are found in the data: an asymmetry related to the player’s role in the game; an asymmetry across the game variations; and positive serial correlation in subjects’ play. Possible explanations for these depar...
متن کاملStegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
We discuss a class of smartphone malware that uses steganographic techniques to hide malicious executable components within their assets, such as documents, databases, or multimedia files. In contrast with existing obfuscation techniques, many existing information hiding algorithms are demonstrably secure, which would make such stegomalware virtually undetectable by static analysis techniques. ...
متن کاملHide and Seek with Supersymmetry
This is the summary of a 90 minute introductory talk on Supersymmetry presented at the August 1998 Zuoz Summer School on “Hidden Symmetries and Higgs Phenomena”. I first review the hierarchy problem, and then discuss why we expect supersymmetry just around the corner, i.e. at or below 1TeV . I focus on the specific example of the anomalous magnetic moment of the muon to show how supersymmetry c...
متن کاملHide and Seek in a Complex World
Complex networks have become the key to uncover the patterns of interactions in man-made and complex systems in nature. The Internet, the proteins in our cells, our bonds of friendship and the web-pages we daily browse form networks. Despite their widely different origins the networks have many interesting features in common. We endeavor to a better understanding of both man-made structures, li...
متن کاملHide and Seek in JPEG Images
Recently, the JPEG images are the most common format for storing images. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. So it attracted the attention of researchers as the main steganographic format. There are many new and powerful steganography and steganalysis techniques in JPEG images reported in the literature, in the last few years. In this paper, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Therapeutic Advances in Endocrinology and Metabolism
سال: 2014
ISSN: 2042-0188,2042-0196
DOI: 10.1177/2042018814539375