Medical apps in endocrine diseases – hide and seek

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hide and seek in Arizona

Laboratory subjects repeatedly played one of two variations of a simple two-person zero-sum game of ‘‘hide and seek’’. Three puzzling departures from the prescriptions of equilibrium theory are found in the data: an asymmetry related to the player’s role in the game; an asymmetry across the game variations; and positive serial correlation in subjects’ play. Possible explanations for these depar...

متن کامل

Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps

We discuss a class of smartphone malware that uses steganographic techniques to hide malicious executable components within their assets, such as documents, databases, or multimedia files. In contrast with existing obfuscation techniques, many existing information hiding algorithms are demonstrably secure, which would make such stegomalware virtually undetectable by static analysis techniques. ...

متن کامل

Hide and Seek with Supersymmetry

This is the summary of a 90 minute introductory talk on Supersymmetry presented at the August 1998 Zuoz Summer School on “Hidden Symmetries and Higgs Phenomena”. I first review the hierarchy problem, and then discuss why we expect supersymmetry just around the corner, i.e. at or below 1TeV . I focus on the specific example of the anomalous magnetic moment of the muon to show how supersymmetry c...

متن کامل

Hide and Seek in a Complex World

Complex networks have become the key to uncover the patterns of interactions in man-made and complex systems in nature. The Internet, the proteins in our cells, our bonds of friendship and the web-pages we daily browse form networks. Despite their widely different origins the networks have many interesting features in common. We endeavor to a better understanding of both man-made structures, li...

متن کامل

Hide and Seek in JPEG Images

Recently, the JPEG images are the most common format for storing images. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. So it attracted the attention of researchers as the main steganographic format. There are many new and powerful steganography and steganalysis techniques in JPEG images reported in the literature, in the last few years. In this paper, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Therapeutic Advances in Endocrinology and Metabolism

سال: 2014

ISSN: 2042-0188,2042-0196

DOI: 10.1177/2042018814539375