Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
21 result(s) for "Rooks, S. N"
Sort by:
APPENDIX TO CHRONICLE: DEATHS
APRIL 1846 (pg. 212). APRIL 1848 (pg. 212). JULY 1848 (pg. 212). OCTOBER 1848 (pg. 212). NOVEMBER 1848 (pg. 212). DECEMBER 1848 (pg. 212-213). JANUARY (pg. 213-219). FEBRUARY (pg. 219-223). MARCH (pg. 223-230). APRIL (pg. 230-234). MAY (pg. 234-245). JUNE (pg. 245-250). JULY (pg. 251-257). AUGUST (pg. 257-265). SEPTEMBER (pg. 266-271). OCTOBER (pg. 272-281). NOVEMBER (pg. 281-289). DECEMBER (pg. 289-301).
Edward Rook
He is survived by his wife, LaVonne; his daughters, Brenda Robison, Billings, and Carla Sackmann, [Lemmon]; his son, Ed, Roundup; eight grandchildren; five great-grandchildren; four great-great-grandchildren;...
Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. Basically in a SIS scheme, a secret image is shared via shadows and could be reconstructed by having the required number of them. A major downside of this method is its noise‐like shadows, which draw the malicious users' attention. In order to overcome this problem, SIS schemes with meaningful shadows are introduced in which the shadows are first hidden in innocent‐looking cover images and then shared. In most of these schemes, the cover image cannot be recovered without distortion, which makes them useless in case of utilising critical cover images such as military or medical images. Also, embedding the secret data in Least significant bits of the cover image, in many of these schemes, makes them very fragile to steganlysis. A reversible IWT‐based SIS scheme using Rook polynomial and Hamming code with authentication is proposed. In order to make the scheme robust to steganalysis, the shadow image is embedded in coefficients of Integer wavelet transform of the cover image. Using Rook polynomial makes the scheme more secure and moreover makes authentication very easy and with no need to share private key to participants. Also, utilising Hamming code lets us embed data with much less required modifications on the cover image which results in high‐quality stego images.
Touch screens called faulty Series: AROUND THE STATE
Other Florida counties have signed contracts for touch screen voting systems, including Hillsborough, Pinellas, Palm Beach and Marion. Hillsborough and Pinellas' deals are with Sequoia Voting Systems, a California company. HE'S NOT FAKING ANYMORE: Pensacola school crossing guard Dale Rooks on Monday points a radar gun students bought him to replace a fake one he crafted from a hair dryer and used to bluff speeding drivers into slowing down. Rooks still cannot write tickets, but police say they will investigate any habitual speeders Rooks identifies with the radar gun. Six fifth-grade students at Suter Elementary School sold lemonade and collected donations to raise $93.93 for the real radar gun.