A first-generation radiation hybrid (RH) map of the equine (Equus caballus) genome was assembled ... more A first-generation radiation hybrid (RH) map of the equine (Equus caballus) genome was assembled using 92 horse × hamster hybrid cell lines and 730 equine markers. The map is the first comprehensive framework map of the horse that (1) incorporates type I as well as type II markers, (2) integrates synteny, cytogenetic, and meiotic maps into a consensus map, and (3) provides the most detailed genome-wide information to date on the organization and comparative status of the equine genome. The 730 loci (258 type I and 472 type II) included in the final map are clustered in 101 RH groups distributed over all equine autosomes and the X chromosome. The overall marker retention frequency in the panel is ∼21%, and the possibility of adding any new marker to the map is ∼90%. On average, the mapped markers are distributed every 19 cR (4 Mb) of the equine genome—a significant improvement in resolution over previous maps. With 69 new FISH assignments, a total of 253 cytogenetically mapped loci p...
International Journal of Managment, IT and Engineering, 2013
Color image water marking is becoming more and more important and finding application in differen... more Color image water marking is becoming more and more important and finding application in different areas of discipline. Developing robust image water marking algorithm which is immune to noise, cropping and compression is aexigent task. Altering the size of the image or its orientation reduces the recoverability of the watermarked imaged. In this paper I proposed a new block of DCT –based digital watermarking scheme based on embedding an adapted watermark in the three RGB channels of the original color image. Voting is used to extract the best candidate pixel value. The proposed embedding procedure improves the imperceptibility and the robustness of the watermarked image against the different attacks such as noise, cropping and JPEG compression. Experimental results have shown the superiority of proposed scheme over a classic DCT watermarking.
Security concerns must be addressed when developing a distributed database. When choosing between... more Security concerns must be addressed when developing a distributed database. When choosing between the object oriented model and the relational model, many factors should be considered. The most important of these factors are, Single level and multilevel access controls, Protection against inference, Maintenance of integrity. When determining which distributed database model will be more secure for a particular application, the decision should not be made purely on the basis of available security features. One should also question the efficacy and efficiency of the delivery of these features. In this paper I tried my level best to enlighten the design issues and security issues of distributed database and gave the suggestion to improve design and security issues of distributed database. Distributed database has 3 key design issues are Fragmentation, Allocation, and Replication. Because Distributed database has disadvantages also like Complexity, Cost, Security, Integrity control is m...
Security concerns must be addressed when developing a distributed database. When choosing between... more Security concerns must be addressed when developing a distributed database. When choosing between the object oriented model and the relational model, many factors should be considered. The most important of these factors are, Single level and multilevel access controls, Protection against inference, Maintenance of integrity. When determining which distributed database model will be more secure for a particular application, the decision should not be made purely on the basis of available security features. One should also question the efficacy and efficiency of the delivery of these features. In this paper I tried my level best to enlighten the design issues and security issues of distributed database and gave the suggestion to improve design and security issues of distributed database. Distributed database has 3 key design issues are Fragmentation, Allocation, and Replication. Because Distributed database has disadvantages also like Complexity, Cost, Security, Integrity control is m...
A first-generation radiation hybrid (RH) map of the equine (Equus caballus) genome was assembled ... more A first-generation radiation hybrid (RH) map of the equine (Equus caballus) genome was assembled using 92 horse × hamster hybrid cell lines and 730 equine markers. The map is the first comprehensive framework map of the horse that (1) incorporates type I as well as type II markers, (2) integrates synteny, cytogenetic, and meiotic maps into a consensus map, and (3) provides the most detailed genome-wide information to date on the organization and comparative status of the equine genome. The 730 loci (258 type I and 472 type II) included in the final map are clustered in 101 RH groups distributed over all equine autosomes and the X chromosome. The overall marker retention frequency in the panel is ∼21%, and the possibility of adding any new marker to the map is ∼90%. On average, the mapped markers are distributed every 19 cR (4 Mb) of the equine genome—a significant improvement in resolution over previous maps. With 69 new FISH assignments, a total of 253 cytogenetically mapped loci p...
International Journal of Managment, IT and Engineering, 2013
Color image water marking is becoming more and more important and finding application in differen... more Color image water marking is becoming more and more important and finding application in different areas of discipline. Developing robust image water marking algorithm which is immune to noise, cropping and compression is aexigent task. Altering the size of the image or its orientation reduces the recoverability of the watermarked imaged. In this paper I proposed a new block of DCT –based digital watermarking scheme based on embedding an adapted watermark in the three RGB channels of the original color image. Voting is used to extract the best candidate pixel value. The proposed embedding procedure improves the imperceptibility and the robustness of the watermarked image against the different attacks such as noise, cropping and JPEG compression. Experimental results have shown the superiority of proposed scheme over a classic DCT watermarking.
Security concerns must be addressed when developing a distributed database. When choosing between... more Security concerns must be addressed when developing a distributed database. When choosing between the object oriented model and the relational model, many factors should be considered. The most important of these factors are, Single level and multilevel access controls, Protection against inference, Maintenance of integrity. When determining which distributed database model will be more secure for a particular application, the decision should not be made purely on the basis of available security features. One should also question the efficacy and efficiency of the delivery of these features. In this paper I tried my level best to enlighten the design issues and security issues of distributed database and gave the suggestion to improve design and security issues of distributed database. Distributed database has 3 key design issues are Fragmentation, Allocation, and Replication. Because Distributed database has disadvantages also like Complexity, Cost, Security, Integrity control is m...
Security concerns must be addressed when developing a distributed database. When choosing between... more Security concerns must be addressed when developing a distributed database. When choosing between the object oriented model and the relational model, many factors should be considered. The most important of these factors are, Single level and multilevel access controls, Protection against inference, Maintenance of integrity. When determining which distributed database model will be more secure for a particular application, the decision should not be made purely on the basis of available security features. One should also question the efficacy and efficiency of the delivery of these features. In this paper I tried my level best to enlighten the design issues and security issues of distributed database and gave the suggestion to improve design and security issues of distributed database. Distributed database has 3 key design issues are Fragmentation, Allocation, and Replication. Because Distributed database has disadvantages also like Complexity, Cost, Security, Integrity control is m...
Uploads
Papers