Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
Blues (Música)
3
Música popular
3
Curtido de pieles
2
Música de Rhythm and blues
2
Música rock
2
Análisis (Filosofía)
1
Astronomía
1
Calzado
1
Campion, Albert (Personaje ficticio)--Ficción
1
Chile
1
Colonización agropecuaria
1
Comedy films
1
Cueros
1
Diccionarios
1
Fenomenología
1
Historia
1
Industria y comercio
1
Investigadores privados
1
Jazz
1
Jewelry
1
Joyas
1
Land Market
1
Mestizaje
1
Mestizos
1
Música instrumental
1
Música para películas cinematográficas
1
Música para saxofón (Blues)
1
Música vocal
1
Nombres personales ingleses
1
Novela estadounidense
1
-
221por Karim, Dewan Niamul“…This research attempts to empirically examine the role of dark personalities (i.e., narcissism, psychopathy, and Machiavellianism) on academics’ knowledge hiding behavior (KHB) with the mediating effect of psychological entitlement. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
222“…In this paper, we propose a novel reversible data hiding in encrypted images (RDH-EI) method that achieves the highest hiding capacity in the RDH-EI research field and full flexibility in the processing order without restrictions. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
223por Veselska, Olga, Lavrynenko, Oleksandr, Odarchenko, Roman, Zaliskyi, Maksym, Bakhtiiarov, Denys, Karpinski, Mikolaj, Rajba, Stanislaw“…The developed method of steganographic hiding of text information in an audio signal based on the wavelet transform acquires a deep meaning in the conditions of the use by an attacker of deliberate unauthorized manipulations with a steganocoded audio signal to distort the text information embedded in it. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
224por Nguyen, Lap Luat, Nguyen, Tien-Tung, Fiche, Anthony, Gautier, Roland, Ta, Hien Q.“…This paper considers hiding messages in overt transmissions with a full-duplex receiver, which emits artificial noise to secure its transmission connection while a transmitter opportunistically sends a covert message to a covert user. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
225“…This study puts employees' knowledge hiding behavior in the organizational relationship network situation and discusses the influence of network location on knowledge hiding, exploring the moderating role of knowledge acquisition in the relationship between network location and knowledge hiding. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
226
-
227“…Secret communication of sensitive data must progress in a trustworthy environment through data hiding. Using Mamdani fuzzy logic to identify color proximity at the block level and a shared secret key and post-processing system, this paper attempts to develop a robust data hiding scheme with similarity measures to ensure good visual quality, robustness, imperceptibility and enhance the security. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
228
-
229“…Many wild animals perform hiding behaviours for a variety of reasons, such as evading predators or other conspecifics. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
230“…RESULTS: After employing several statistical techniques, the findings of the study suggest that self-serving behavior fully mediates the link between fear of losing power and knowledge hiding. Moreover, the result of two-way interaction reveals that personal competitiveness further amplifies the indirect relationship between fear of losing power and knowledge hiding through self-serving behavior. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
231
-
232“…For transmission and hiding data, Shannon developed an impressive mathematical theory called Information Theory, which he based on probabilistic models. …”
Enlace del recurso
Enlace del recurso
-
233
-
234“…The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
-
235“…If c and t quarks are strongly mixed with a weak singlet charge 2/3 quark, BR(t\to \ell\nu + X) could be suppressed via the t\to cH^0 mode thereby the top quark could still hide below M_W, whereas the heavy quark signal observed at the Tevatron is due to the dominantly singlet quark Q. …”
Enlace del recurso
Enlace del recurso
-
236
-
237
-
238Workplace conflicts and knowledge hiding: Mediating role of relational psychological contract breachpor Qiao, Xiaolong, Mahmood, Faiq, Ahmad, Bashir, Bashir, Mohsin, Bari, Muhammad Waseem“…This study explains workplace conflicts (interpersonal and task-related) as antecedents of knowledge-hiding behaviors. Moreover, a relational psychological contract breach is a mediator between workplace conflicts and knowledge-hiding behavior. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
239por Sysiak, Monika, Pietrzak, Barbara, Kubiak, Matylda, Bednarska, Anna, Mikulski, AndrzejEnlace del recurso
Publicado 2023
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
240