Mostrando 221 - 240 Resultados de 2,832 Para Buscar '"Hide"', tiempo de consulta: 0.17s Limitar resultados
  1. 221
    por Karim, Dewan Niamul
    Publicado 2022
    “…This research attempts to empirically examine the role of dark personalities (i.e., narcissism, psychopathy, and Machiavellianism) on academics’ knowledge hiding behavior (KHB) with the mediating effect of psychological entitlement. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 222
    por Arai, Eichi, Imaizumi, Shoko
    Publicado 2022
    “…In this paper, we propose a novel reversible data hiding in encrypted images (RDH-EI) method that achieves the highest hiding capacity in the RDH-EI research field and full flexibility in the processing order without restrictions. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  3. 223
    “…The developed method of steganographic hiding of text information in an audio signal based on the wavelet transform acquires a deep meaning in the conditions of the use by an attacker of deliberate unauthorized manipulations with a steganocoded audio signal to distort the text information embedded in it. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  4. 224
    “…This paper considers hiding messages in overt transmissions with a full-duplex receiver, which emits artificial noise to secure its transmission connection while a transmitter opportunistically sends a covert message to a covert user. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  5. 225
    por Liu, Huan, Dong, Mingfang
    Publicado 2022
    “…This study puts employees' knowledge hiding behavior in the organizational relationship network situation and discusses the influence of network location on knowledge hiding, exploring the moderating role of knowledge acquisition in the relationship between network location and knowledge hiding. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  6. 226
  7. 227
    “…Secret communication of sensitive data must progress in a trustworthy environment through data hiding. Using Mamdani fuzzy logic to identify color proximity at the block level and a shared secret key and post-processing system, this paper attempts to develop a robust data hiding scheme with similarity measures to ensure good visual quality, robustness, imperceptibility and enhance the security. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  8. 228
  9. 229
    “…Many wild animals perform hiding behaviours for a variety of reasons, such as evading predators or other conspecifics. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  10. 230
    por Iqbal, Omer, Ali, Zeeshan, Azam, Akbar
    Publicado 2022
    “…RESULTS: After employing several statistical techniques, the findings of the study suggest that self-serving behavior fully mediates the link between fear of losing power and knowledge hiding. Moreover, the result of two-way interaction reveals that personal competitiveness further amplifies the indirect relationship between fear of losing power and knowledge hiding through self-serving behavior. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  11. 231
  12. 232
    “…For transmission and hiding data, Shannon developed an impressive mathematical theory called Information Theory, which he based on probabilistic models. …”
    Enlace del recurso
    Enlace del recurso
  13. 233
  14. 234
    “…The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
  15. 235
    por Hou, Wei-Shu, Huang, Hsuan-Cheng
    Publicado 1994
    “…If c and t quarks are strongly mixed with a weak singlet charge 2/3 quark, BR(t\to \ell\nu + X) could be suppressed via the t\to cH^0 mode thereby the top quark could still hide below M_W, whereas the heavy quark signal observed at the Tevatron is due to the dominantly singlet quark Q. …”
    Enlace del recurso
    Enlace del recurso
  16. 236
  17. 237
  18. 238
    “…This study explains workplace conflicts (interpersonal and task-related) as antecedents of knowledge-hiding behaviors. Moreover, a relational psychological contract breach is a mediator between workplace conflicts and knowledge-hiding behavior. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  19. 239
  20. 240
Herramientas de búsqueda: RSS