Mostrando 161 - 180 Resultados de 2,832 Para Buscar '"Hide"', tiempo de consulta: 0.18s Limitar resultados
  1. 161
    por Duan, Youdan, Cheng, Haiming
    Publicado 2022
    “…The immobilized pepsin was applied for the extraction of collagen from bovine hide. The optimal immobilization process involves incubating pepsin with an initial concentration of 35 mg mL(−1) and glutaraldehyde with 5% activated APTES modified silica clay at 25 °C for 60 min, by which the loading amount of pepsin was 220 mg g(−1) and the activity of the immobilized pepsin was 4.2 U mg(−1). …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 162
  3. 163
  4. 164
  5. 165
  6. 166
    por Xiaohui, Zhou
    Publicado 2023
    “…According to the wavelet digital watermarking method, wavelet text hiding algorithm is presented for hiding some text information in a signal with white noises and the corresponding recovery algorithm is also presented for obtaining text information from a synthesized signal. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  7. 167
    “…This study investigates the association of knowledge hiding with individual task performance and the mediation role of individual creativity. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  8. 168
    por Nafstad, O, Grønstøl, H
    Publicado 2001
    “…The occurrence of hide damage light flecks and spots was determined on tanned hides from 28 herds during a period of 8 to 12 months. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Texto
  9. 169
  10. 170
    por Huang, Hsiang-Cheh, Fang, Wai-Chi
    Publicado 2011
    “…Among the schemes for making authenticity verification based on information security possible, reversible data hiding has attracted much attention during the past few years. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  11. 171
  12. 172
  13. 173
    “…A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high utility itemsets. It maintains the low information loss while providing information to the data demanders and protects the high-risk information in the database. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 174
    “…A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  15. 175
  16. 176
  17. 177
    “…Although tactical deception (TD) may be employed to hide sexual behaviour, there is as yet no firm evidence for it. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 178
  19. 179
  20. 180
Herramientas de búsqueda: RSS