Mostrando 321 - 340 Resultados de 2,832 Para Buscar '"Hide"', tiempo de consulta: 0.25s Limitar resultados
  1. 321
    “…The findings of this study revealed that the neglected passive leadership greatly influences the knowledge hiding practices among individuals. However, according to the results, knowledge hiding practices are found to reduce the presence of creative self-efficacy. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 322
  3. 323
    por Wen, Junqi, Zheng, Jiafeng, Ma, Ruijun
    Publicado 2022
    “…In recent years, knowledge hiding has gained much popularity in the knowledge management literature. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  4. 324
  5. 325
    por Zhou, Lan, Kang, Ming, Chen, Wen
    Publicado 2022
    “…We proposed a lightweight security transmission method based on information hiding and random data flipping to ensure that the ally fusion center (AFC) can achieve confidential data transmission over insecure open links. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  6. 326
    “…The DICOM (Digital Imaging and COmmunication in Medicine) standard provides a framework for a diagnostically-accurate representation, processing, transfer, storage and display of medical imaging data. Information hiding in DICOM is currently limited to the application of digital media steganography and watermarking techniques on the media parts of DICOM files, as well as text steganographic techniques for embedding information in metadata of DICOM files. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  7. 327
    por Xing, Shuo
    Publicado 2022
    “…This study aimed to identify the relationship between ethical value unity, team knowledge hiding, the relationship between the lack of shared ethical priorities and the team knowledge hiding. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  8. 328
    por Jasimuddin, Sajjad M., Saci, Fateh
    Publicado 2022
    “…Knowledge hiding is known to have negative consequences on organizational performance. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  9. 329
  10. 330
  11. 331
  12. 332
    por Abdul Wahed, Md., Nyeem, Hussain
    Publicado 2022
    “…Pixel Value Ordering (PVO) holds an impressive property for high fidelity Reversible Data Hiding (RDH). In this paper, we introduce a dual PVO (dPVO) for Prediction Error Expansion (PEE), and thereby develop a new RDH scheme to offer a better rate-distortion performance. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  13. 333
    por Zhao, Ming, Chen, Shuo-Tsung, Tu, Shu-Yi
    Publicado 2022
    “…Due to the fact that wavelet domain provides a useful and robust platform for audio information hiding, this study applies multi-coefficients of discrete wavelet transform (DWT) to hide information. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 334
  15. 335
    “…Many scholars have focused on understanding ways of how to suppress knowledge hiding by employees. Existing studies have demonstrated that mindfulness could effectively inhibit employees’ knowledge hiding. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  16. 336
  17. 337
  18. 338
    “…Based upon a study on the international trade of donkey hide, this paper offers a characterization of the current pharmaceutical uses of animal life through a series of epistemic and environmental tensions expressing frictions between the market’s absorptive logic and non-human modes of existence. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  19. 339
    por Weng, Chi-Yao, Yang, Cheng-Hsing
    Publicado 2023
    “…Reversible Data Hiding in Encrypted Image (RDHEI) is a technology for embedding secret information in an encrypted image. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  20. 340
Herramientas de búsqueda: RSS