Siga este enlace para ver otros tipos de publicaciones sobre el tema: Hide model.

Artículos de revistas sobre el tema "Hide model"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Hide model".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

DEWELL, G. A., C. A. SIMPSON, R. D. DEWELL, et al. "Risk Associated with Transportation and Lairage on Hide Contamination with Salmonella enterica in Finished Beef Cattle at Slaughter." Journal of Food Protection 71, no. 11 (2008): 2228–32. http://dx.doi.org/10.4315/0362-028x-71.11.2228.

Texto completo
Resumen
Transportation of cattle to the slaughter plant could influence hide contamination with Salmonella enterica. Fecal and hide samples were obtained from 40 lots of cattle at the feedlot and again at the slaughter plant. Potential risk factors for hide contamination were evaluated. A multilevel Poisson regression model was used to determine whether transportation and lairage were associated with hide contamination by Salmonella. Cattle with hide samples positive for Salmonella at the feedlot had twice the risk of having positive slaughter hide samples compared with cattle without positive feedlot
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

NIBBI, A. "An Early Dynastic Hide-Covered Model Papyrus Boat." Revue d'Égyptologie 44 (January 1, 1993): 81–101. http://dx.doi.org/10.2143/re.44.0.2011258.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Mather, A. E., S. W. J. Reid, S. A. McEwen, et al. "Factors Associated with Cross-Contamination of Hides of Scottish Cattle by Escherichia coli O157." Applied and Environmental Microbiology 74, no. 20 (2008): 6313–19. http://dx.doi.org/10.1128/aem.00770-08.

Texto completo
Resumen
ABSTRACT The putative source of hide contamination for 236 cattle in Scotland followed from the farm through to slaughter was determined using phage and verocytotoxin type data. The majority of cattle (84%) were found to have subtypes of Escherichia coli O157 on their hide that had not been found previously in any animal from the farm of origin, strongly suggesting that contamination occurred once animals had left the farm of origin. Using logistic regression analysis, several variables and factors were found to be strongly associated (P < 0.01) with cross-contamination of cattle hides at t
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Kimmel, E., H. Arkin, D. Broday, and A. Berman. "A model of evaporative cooling in a wetted hide." Journal of Agricultural Engineering Research 49 (May 1991): 227–41. http://dx.doi.org/10.1016/0021-8634(91)80041-c.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Moroz, Irene M. "The Hide, Skeldon, Acheson dynamo revisited." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 463, no. 2077 (2006): 113–30. http://dx.doi.org/10.1098/rspa.2006.1758.

Texto completo
Resumen
Hide et al . (Hide, Skeldon & Acheson 1996 Proc. R. Soc. A 452 , 1369–1395) introduced a nonlinear system of three coupled ordinary differential equations to model a self-exciting Faraday disk homopolar dynamo. A very small selection of its possible behaviours was presented in that paper. Subsequent studies have extended the system to incorporate the effects of a nonlinear motor, an external battery and magnetic field, the coupling of two or more identical dynamos together, among other things. In this paper, we return to the original model with a view to perform a more extensive analysis o
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Farida, Siti Ning, and Herlina Suksmawati. "Destination Branding of Shopping Tourism in Magetan Regency." Prosiding Semnasfi 1, no. 1 (2018): 109. http://dx.doi.org/10.21070/semnasfi.v1i1.1143.

Texto completo
Resumen
Magetan Regency has been well known by the people of archipelago as the region of fine raw leather materials artisan ranging from the process of raw materials into the finished products, as well as various types of processed equate leather vastly produced in this area. The goal of this research is to describe the formation stage and element of destination branding of shopping tourism formation in hide industry center in Magetan regency. The theory utilized in this study is the model of message production and goals-plans-action model from Dillard. This qualitative research is the main data coll
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

DEWELL, G. A., C. A. SIMPSON, R. D. DEWELL, et al. "Impact of Transportation and Lairage on Hide Contamination with Escherichia coli O157 in Finished Beef Cattle." Journal of Food Protection 71, no. 6 (2008): 1114–18. http://dx.doi.org/10.4315/0362-028x-71.6.1114.

Texto completo
Resumen
Transportation of cattle from the feedlot to the slaughter plant could influence hide contamination of Escherichia coli O157. A study was initiated to investigate the influence of transportation and lairage on shedding and hide contamination of E. coli O157. Fecal and hide samples were obtained from 40 pens of harvest-ready beef cattle at the feedlot prior to transport and again at the slaughter plant immediately after slaughter. Potential risk factors for hide contamination at the feedlot, during transport, and at slaughter were evaluated. A multilevel Poisson regression model was used to eva
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

MOROZ, IRENE M. "ON THE BEHAVIOR OF A SELF-EXCITING FARADAY DISK HOMOPOLAR DYNAMO WITH BATTERY IN THE PRESENCE OF AN EXTERNAL MAGNETIC FIELD." International Journal of Bifurcation and Chaos 11, no. 06 (2001): 1695–705. http://dx.doi.org/10.1142/s0218127401002948.

Texto completo
Resumen
Goldbrum et al. [2000] investigated the biasing effects of including an external battery on the behavior of a self-exciting Faraday disk homopolar dynamo, originally introduced by Hide et al. [1996]. In this paper we return to the model of Hide [1997] and consider the additional effects of incorporating an external magnetic field on the dynamo.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Chambaz, A., P. A. Dufey, M. Kreuzer, and J. Gresham. "Sources of variation influencing the use of real-time ultrasound to predict intramuscular fat in live beef cattle." Canadian Journal of Animal Science 82, no. 2 (2002): 133–39. http://dx.doi.org/10.4141/a01-058.

Texto completo
Resumen
A total of 123 steers of six European breeds (Angus, Simmental, Charolais, Limousin, Blonde d'Aquitaine, Piedmontese) were used (i) to evaluate the precision of the ultrasound-predicted intramuscular fat (USIMF) and its sources of variation using the current Pie QUIP technology and (ii) to develop improved models for predicting USIMF. Steers were slaughtered when they reached the target value of 3.5% USIMF. Hide samples were obtained 3 d before slaughter by shot-biopsy. After slaughter, a sample of the longissimus muscle was used to determine actual chemical intramuscular fat (EEIMF), collagen
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

BOSILEVAC, JOSEPH M., STEVEN D. SHACKELFORD, DAYNA M. BRICHTA, and MOHAMMAD KOOHMARAIE. "Efficacy of Ozonated and Electrolyzed Oxidative Waters To Decontaminate Hides of Cattle before Slaughter†." Journal of Food Protection 68, no. 7 (2005): 1393–98. http://dx.doi.org/10.4315/0362-028x-68.7.1393.

Texto completo
Resumen
The hides of cattle are the primary source of pathogens such as Escherichia coli O157:H7 that contaminate preevisceration carcasses during commercial beef processing. A number of interventions that reduce hide contamination and subsequent carcass contamination are currently being developed. The objective of this study was to determine the efficacy of ozonated and electrolyzed oxidizing (EO) waters to decontaminate beef hides and to compare these treatments with similar washing in water without the active antimicrobial compounds. Cattle hides draped over barrels were used as the model system. O
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Ruiz-Zafra, Angel, Manuel Noguera, Kawtar Benghazi, and Sergio F. Ochoa. "A Model-Driven Approach for Wearable Systems Developments." International Journal of Distributed Sensor Networks 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/637130.

Texto completo
Resumen
This paper proposes a model-driven approach for developing high-level software interfaces that allow developers to interact with wearable devices easily. These components hide the heterogeneity of the devices interfaces and provide developers with a simple and homogeneous way to interoperate with these digital peripherals. The use of this approach also allows reducing risks and development efforts.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Fodor, Zoltán, Kieran Holland, Julius Kuti, Dániel Nógrádi, Chris Schroeder, and Chik Him Wong. "Can the nearly conformal sextet gauge model hide the Higgs impostor?" Physics Letters B 718, no. 2 (2012): 657–66. http://dx.doi.org/10.1016/j.physletb.2012.10.079.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Yang, Fan, Long Yang, and Ping Li. "The Dynamic Game of Knowledge Hiding Behavior from Organizational Members: To Hide or Not to Hide?" Complexity 2021 (September 6, 2021): 1–15. http://dx.doi.org/10.1155/2021/1713890.

Texto completo
Resumen
In the era of the knowledge economy, it is urgent for organizations to solve the problem of knowledge hiding of internal members to accelerate the speed and efficiency of knowledge dissemination and innovation and adapt to rapid changes in the market. At present, research on knowledge hiding has received extensive attention from Western countries, but there are few relevant studies in China. Based on the hypothesis of bounded rationality, this paper constructs an evolutionary game model of second-level knowledge hiding of organizational members and analyzes the main factors affecting the stabl
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Halas, V., J. Dijkstra, L. Babinszky, M. W. A. Verstegen, and W. J. J. Gerrits. "Modelling of nutrient partitioning in growing pigs to predict their anatomical body composition. 1. Model description." British Journal of Nutrition 92, no. 4 (2004): 707–23. http://dx.doi.org/10.1079/bjn20041237.

Texto completo
Resumen
A dynamic mechanistic model was developed for growing and fattening pigs. The aim of the model was to predict growth rate and the chemical and anatomical body compositions from the digestible nutrient intake of gilts (20–105 kg live weight). The model represents the partitioning of digestible nutrients from intake through intermediary metabolism to body protein and body fat. State variables of the model were lysine, acetyl-CoA equivalents, glucose, volatile fatty acids and fatty acids as metabolite pools, and protein in muscle, hide–backfat, bone and viscera and body fat as body constituent po
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Bursztyn, Leonardo, Georgy Egorov, and Robert Jensen. "Cool to be Smart or Smart to be Cool? Understanding Peer Pressure in Education." Review of Economic Studies 86, no. 4 (2018): 1487–526. http://dx.doi.org/10.1093/restud/rdy026.

Texto completo
Resumen
Abstract We model and test two school-based peer cultures: one that stigmatizes effort and one that rewards ability. The model shows that either may reduce participation in educational activities when peers can observe participation and performance. We design a field experiment that allows us to test for, and differentiate between, these two concerns. We find that peer pressure reduces takeup of an SAT prep package virtually identically across two very different high school settings. However, the effects arise from very distinct mechanisms: a desire to hide effort in one setting and a desire t
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

GOLDBRUM, PAUL, IRENE M. MOROZ, and RAYMOND HIDE. "ON THE BIASING EFFECT OF A BATTERY ON A SELF-EXCITING FARADAY DISK HOMOPOLAR DYNAMO LOADED WITH A LINEAR SERIES MOTOR." International Journal of Bifurcation and Chaos 10, no. 08 (2000): 1875–85. http://dx.doi.org/10.1142/s0218127400001146.

Texto completo
Resumen
We extend the study of Hide et al. [1996] for a self-exciting Faraday disk homopolar dynamo with a linear motor connected in series with the coil to cases when a battery is included in the circuit, using the set of nonlinear equations for biased systems given in [Hide, 1997]. The presence of the battery introduces asymmetry into the model, creating two distinct branches of equilibrium solutions, two distinct branches of oscillatory solutions and two different codimension-two bifurcations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

de Paor, A. M. "Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory." Nonlinear Processes in Geophysics 5, no. 2 (1998): 75–80. http://dx.doi.org/10.5194/npg-5-75-1998.

Texto completo
Resumen
Abstract. Hide (Nonlinear Processes in Geophysics, 1998) has produced a new mathematical model of a self-exciting homopolar dynamo driving a series- wound motor, as a continuing contribution to the theory of the geomagnetic field. By a process of exact perturbation analysis, followed by combination and partial solution of differential equations, the complete nonlinear quenching of current fluctuations reported by Hide in the case that a parameter ε has the value 1 is proved via the Popov theorem from feedback system stability theory.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Kim, Yeonjeong, and A. T. Panter. "Moral Character Judgments Using the Hidden Information Distribution and Evaluation (HIDE) Model." Academy of Management Proceedings 2017, no. 1 (2017): 17562. http://dx.doi.org/10.5465/ambpp.2017.283.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Ellerman, David. "The Arrow-Debreu model: How math can hide a fatal conceptual error." Forum for Social Economics 29, no. 2 (2000): 33–48. http://dx.doi.org/10.1007/bf02779102.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

GARNAEV, ANDREY, and ROBBERT FOKKINK. "A SEARCHER VERSUS HIDER GAME WITH INCOMPLETE INFORMATION ABOUT SEARCH RESOURCES." Asia-Pacific Journal of Operational Research 30, no. 02 (2013): 1250052. http://dx.doi.org/10.1142/s0217595912500522.

Texto completo
Resumen
We introduce a search game in which a hider has partial information about a searcher's resource. The hider can be a terrorist trying to hide and the searcher can be special forces trying to catch him. The terrorist does not know the number of forces involved in the search but just its distribution. We model this situation by a noncooperative game. In a related setup, which is motivated by wireless networks applications, the terrorist inserts a malicious node in a network, reducing network connectivity and thereby undermining its security. Meanwhile, the network operator applies appropriate mea
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Shi, Yan, Gang Hu, Jia Fu Zhu, and Yong Chen. "The Method of Calculating Polluted Insulator's Flashover Voltage Based on ANN." Applied Mechanics and Materials 513-517 (February 2014): 4439–42. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.4439.

Texto completo
Resumen
According to the test result about class insulator string of 32 units, a method of calculating 50% ac flashover voltage U50 based on radial basis function network is put forward in this paper. Inputs of the model are equivalent salt deposit density ρESDD and nonsoluble deposit density ρNSDD ,the output of the model is 50% ac flashover voltage of polluted insulator strings, the Orthogonal least squares algorithm was used to select right hide layer neurons and center vectors, and the weight from hide layer neurons to output layer neurons are determined by pseud-inverse method. The calculating re
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Gloag, Ros, Laurie-Anne Keller, and Naomi E. Langmore. "Cryptic cuckoo eggs hide from competing cuckoos." Proceedings of the Royal Society B: Biological Sciences 281, no. 1792 (2014): 20141014. http://dx.doi.org/10.1098/rspb.2014.1014.

Texto completo
Resumen
Interspecific arms races between cuckoos and their hosts have produced remarkable examples of mimicry, with parasite eggs evolving to match host egg appearance and so evade removal by hosts. Certain bronze-cuckoo species, however, lay eggs that are cryptic rather than mimetic. These eggs are coated in a low luminance pigment that camouflages them within the dark interiors of hosts' nests. We investigated whether cuckoo egg crypsis is likely to have arisen from the same coevolutionary processes known to favour egg mimicry. We added high and low luminance-painted eggs to the nests of large-bille
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Abdulmajeed, Nadia mohammed. "Domino, novel steganography system." ALUSTATH JOURNAL FOR HUMAN AND SOCIAL SCIENCES 219, no. 1 (2018): 17–24. http://dx.doi.org/10.36473/ujhss.v219i1.497.

Texto completo
Resumen
Primary objective of the proposed system is to achieve higher level of confidentiality in absence of standard encryption techniques which add up to complexity of the stego system.
 In this system the principle of dominoes is adopted in the way of the selection of the pixel of the image to hide the ciphertext. Where domino stones models are prepared in advance, which are two-dimensional matrices (2*6), and selecting one of them and start the projection of the model on the image and hide the ciphertext in the pixel corresponding to the points in the domino model
 Experimental results s
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

STEPHENS, T. P., T. A. MCALLISTER, and K. STANFORD. "Development of an Experimental Model To Assess the Ability of Escherichia coli O157:H7–Inoculated Fecal Pats To Mimic a Super Shedder within a Feedlot Environment." Journal of Food Protection 71, no. 3 (2008): 648–52. http://dx.doi.org/10.4315/0362-028x-71.3.648.

Texto completo
Resumen
This study was conducted to develop an experimental model that could assess the ability of Escherichia coli O157:H7–inoculated fecal pats to mimic a super shedder (>104 CFU/g of feces) within a feedlot environment. The day before the study began, 48 steers that had been negative for E. coli O157:H7 in feces for three consecutive weeks were sorted into three treatment groups, with two replicate pens per treatment and 8 steers per pen. Steers within the pens (20.50 by 10.75 m) were exposed to control feces or feces inoculated with two levels of a mixture of five strains of nalidixic acid–
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Ross, George. "Danger, One EU Crisis May Hide Another: Social Model Anxieties and Hard Cases." Comparative European Politics 4, no. 4 (2006): 309–30. http://dx.doi.org/10.1057/palgrave.cep.6110088.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Kufenko, Vadim. "Hide-and-Seek with time-series filters: a model-based Monte Carlo study." Empirical Economics 59, no. 5 (2019): 2335–61. http://dx.doi.org/10.1007/s00181-019-01736-y.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Mary, A. Geetha, D. P. Acharjya, and N. Ch S. N. Iyengar. "Privacy preservation in fuzzy association rules using rough computing and DSR." Cybernetics and Information Technologies 14, no. 1 (2014): 52–71. http://dx.doi.org/10.2478/cait-2014-0005.

Texto completo
Resumen
Abstract In the present age of Internet, data is accumulated at a dramatic pace. The accumulated huge data has no relevance, unless it provides certain useful information pertaining to the interest of the organization. But the real challenge lies in hiding sensitive information in order to provide privacy. Therefore, attribute reduction becomes an important aspect for handling such huge database by eliminating superfluous or redundant data to enable a sensitive rule hiding in an efficient manner before it is disclosed to the public. In this paper we propose a privacy preserving model to hide s
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Gal, Shmuel, Steve Alpern, and Jérôme Casas. "Prey should hide more randomly when a predator attacks more persistently." Journal of The Royal Society Interface 12, no. 113 (2015): 20150861. http://dx.doi.org/10.1098/rsif.2015.0861.

Texto completo
Resumen
When being searched for and then (if found) pursued by a predator, a prey animal has a choice between choosing very randomly among hiding locations so as to be hard to find or alternatively choosing a location from which it is more likely to successfully flee if found. That is, the prey can choose to be hard to find or hard to catch, if found. In our model, capture of prey requires both finding it and successfully pursuing it. We model this dilemma as a zero-sum repeated game between predator and prey, with the eventual capture probability as the pay-off to the predator. We find that the more
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Saha, Aniruddha, Akshayvarun Subramanya, and Hamed Pirsiavash. "Hidden Trigger Backdoor Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (2020): 11957–65. http://dx.doi.org/10.1609/aaai.v34i07.6871.

Texto completo
Resumen
With the success of deep learning algorithms in various domains, studying adversarial attacks to secure deep models in real world applications has become an important research topic. Backdoor attacks are a form of adversarial attacks on deep networks where the attacker provides poisoned data to the victim to train the model with, and then activates the attack by showing a specific small trigger pattern at the test time. Most state-of-the-art backdoor attacks either provide mislabeled poisoning data that is possible to identify by visual inspection, reveal the trigger in the poisoned data, or u
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Wang, Fei, Yu Wang, and Yuan Tian. "Research of Parasitic Communication Model Based on Network Behavior Features." Applied Mechanics and Materials 519-520 (February 2014): 302–5. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.302.

Texto completo
Resumen
This paper proposes a convert communication model based on network behavior features. Convert communication program firstly judges the most frequent communication features between the two sides, and then embeds the secret information into multimedia carrier. At last, the multimedia that carries secret information is sent to the receiver, according to communication features. A convert communication completes. The experimental results indicate that the model will not only hide convert communication behavior into normal communication behavior between hosts, but also it provides high security of c
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Puspitasari, Ana, Arif Wiyat Purnanto, and Hermahayu Hermahayu. "PENGARUH MODEL PEMBELAJARAN SAVI (SOMATIC, AUDITORY, VISUALIZATION, INTELLECTUAL) DENGAN MEDIA HIDE DAN SEEK PUZZLE TERHADAP HASIL BELAJAR IPA." Edukasi Journal 10, no. 2 (2018): 137–48. http://dx.doi.org/10.31603/edukasi.v10i2.2545.

Texto completo
Resumen
This study aims to determine the effect of the SAVI learning model (Somatic, Auditory, Visual, Intellectual) to learning results on grade V students of Rejosari Primary School 3 Bandongan. This research method is pre-experimental desig.ns with one group pretest posttest models. The independent variable of the study is the SAVI learning model with the Hide dan Seek Puzzle (X) media and the dependent variable is the science learning outcomes (Y). The research subjects were 22 fifth grade students of Rejosari 1 Bandongan Public Elementary School. The sampling technique uses saturated sampling or
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

DODD, CHARLES C., MICHAEL W. SANDERSON, MEGAN E. JACOB, and DAVID G. RENTER. "Modeling Preharvest and Harvest Interventions for Escherichia coli O157 Contamination of Beef Cattle Carcasses." Journal of Food Protection 74, no. 9 (2011): 1422–33. http://dx.doi.org/10.4315/0362-028x.jfp-10-516.

Texto completo
Resumen
Field studies evaluating the effects of multiple concurrent preharvest interventions for Escherichia coli O157 are logistically and economically challenging; however, modeling techniques may provide useful information on these effects while also identifying crucial information gaps that can guide future research. We constructed a risk assessment model with data obtained from a systematic search of scientific literature. Parameter distributions were incorporated into a stochastic Monte Carlo modeling framework to examine the impacts of different combinations of preharvest and harvest interventi
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Jahanfarnia, G., and S. Tashakor. "Mathematical model of impurities hide out and return in nuclear power plant steam generator." Progress in Nuclear Energy 51, no. 4-5 (2009): 644–48. http://dx.doi.org/10.1016/j.pnucene.2009.01.004.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Crawford, Vincent P., and Nagore Iriberri. "Fatal Attraction: Salience, Naïveté, and Sophistication in Experimental “Hide-and-Seek” Games." American Economic Review 97, no. 5 (2007): 1731–50. http://dx.doi.org/10.1257/aer.97.5.1731.

Texto completo
Resumen
“Hide-and-seek” games are zero-sum two-person games in which one player wins by matching the other's decision and the other wins by mismatching. Although such games are often played on cultural or geographic “landscapes” that frame decisions nonneutrally, equilibrium ignores such framing. This paper reconsiders the results of experiments by Rubinstein, Tversky, and others whose designs model nonneutral landscapes, in which subjects deviate systematically from equilibrium in response to them. Comparing alternative explanations theoretically and econometrically suggests that the deviations are w
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Arain, Ghulam Ali, Zeeshan Bhatti, Abdul Karim Khan, and Imran Hameed. "How and when do employees hide knowledge from co-workers? A multilevel moderated-mediation model." Academy of Management Proceedings 2021, no. 1 (2021): 13659. http://dx.doi.org/10.5465/ambpp.2021.13659abstract.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Zhu, Yong Song. "Study on Encryption and Decryption Algorithm and its Matlab Realization." Advanced Materials Research 282-283 (July 2011): 363–66. http://dx.doi.org/10.4028/www.scientific.net/amr.282-283.363.

Texto completo
Resumen
The paper studies the process of how to encrypt images through Logistic chaotic model, how to use DCT transform to hide the encrytion image in the carrier image and how to restore the images through DCT inverse transformation, analyzes the peak signal-to-noise ratio and realizes the whole process through Matlab.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Haywood, R. D., A. C. Cameron, D. Queloz, et al. "Planets and Stellar Activity: Hide and Seek in the CoRoT-7 system." Proceedings of the International Astronomical Union 8, S299 (2013): 237–40. http://dx.doi.org/10.1017/s1743921313008478.

Texto completo
Resumen
AbstractSince the discovery of the transiting Super-Earth CoRoT-7b, several investigations have been made of the number and precise masses of planets present in the system, but they all yield different results, owing to the star's high level of activity. Radial velocity (RV) variations induced by stellar activity therefore need to be modelled and removed to allow a reliable detection of all planets in the system. We re-observed CoRoT-7 in January 2012 with both HARPS and the CoRoT satellite, so that we now have the benefit of simultaneous RV and photometric data. We fitted the off-transit vari
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Tamboli, Meera. "Image Steganography using 3 ways of Encryption for Highly Secured Data Transmission." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 4739–45. http://dx.doi.org/10.22214/ijraset.2021.35572.

Texto completo
Resumen
Steganography exists from many years in a variety of forms and has been used in a variety of domains. There are various types of steganographic techniques that are used to hide data in various file formats. The proposed model uses three layers of security using three algorithms namely, LSB, DES and AES. The software allows the user to encrypt the secret message which gets protected by undergoing three layers of encryption. The output of the encryption process which is the steno image can be sent across through any medium along with the secret key to decrypt. The end user then uses a unique key
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Pourya, Asgarifard, Tafreshi Navid, and Sharifi Akbar. "A Novel Application of Refinery Merox Unit Wastewater for Bovine Hide Unhairing." Journal of the American Leather Chemists Association 115, no. 8 (2020): 301–8. http://dx.doi.org/10.34314/jalca.v115i8.3844.

Texto completo
Resumen
Unhairing is one of the major steps of the leather tanning process which removes the hairs, epidermis and to some degree inter-fibrillary proteins. This process needs high amounts of chemicals that cause environmental difficulties. On the other hand, these chemicals are available in the wastewater of the Merox unit of Kermanshah Refinery. For reducing chemical consumption and decreasing environment pollution, we used the aforementioned wastewater for bovine unhairing. A unhairing liquor was prepared in order to unhair skins and different parameters such as the concentration of CaCO3 and Na2S,
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Vu, Dong Quan, Patrick Loiseau, Alonso Silva, and Long Tran-Thanh. "Path Planning Problems with Side Observations—When Colonels Play Hide-and-Seek." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 02 (2020): 2252–59. http://dx.doi.org/10.1609/aaai.v34i02.5602.

Texto completo
Resumen
Resource allocation games such as the famous Colonel Blotto (CB) and Hide-and-Seek (HS) games are often used to model a large variety of practical problems, but only in their one-shot versions. Indeed, due to their extremely large strategy space, it remains an open question how one can efficiently learn in these games. In this work, we show that the online CB and HS games can be cast as path planning problems with side-observations (SOPPP): at each stage, a learner chooses a path on a directed acyclic graph and suffers the sum of losses that are adversarially assigned to the corresponding edge
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Sunaga, Miho. "A SCHUMPETERIAN GROWTH MODEL WITH FINANCIAL INTERMEDIARIES." Macroeconomic Dynamics 23, no. 4 (2018): 1679–702. http://dx.doi.org/10.1017/s1365100517000426.

Texto completo
Resumen
This study introduces financial intermediaries into the Schumpeterian growth model developed by Aghion et al. (2005, Quarterly Journal of Economics, Vol. 120, pp. 173–222). They collect deposits from households, provide funds for entrepreneurial projects, and monitor the entrepreneurs. I consider an economy with moral hazard problems: entrepreneurs can hide the result of a successful innovation and thereby avoid repaying financial intermediaries if the latter do not monitor entrepreneurial performance. I analyze the effects of financial intermediaries' activities on technological progress and
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Higgi, Ali Hussain. "An Information Technology Based Instructional Model for Effective Learning." Learning and Teaching in Higher Education: Gulf Perspectives 4, no. 1 (2007): 32–42. http://dx.doi.org/10.18538/lthe.v4.n1.06.

Texto completo
Resumen
This paper presents an information technology based instructional model for effective learning in management information systems programs and modules for students in undergraduate education. This model is primarily centered on the traditional in-class learning model. Information technology is used in a unique and novel way in order to create a learning environment which not only engages students in the learning process but also enhances their problems solving skills, analysis and decision making abilities. The model embeds information technology in projects in order to hide complexities but wi
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

King, Geoffrey, and Geoff Bailey. "Tectonics and human evolution." Antiquity 80, no. 308 (2006): 265–86. http://dx.doi.org/10.1017/s0003598x00093613.

Texto completo
Resumen
The authors propose a new model for the origins of humans and their ecological adaptation. The evolutionary stimulus lies not in the savannah but in broken, hilly rough country where the early hominins could hunt and hide. Such ‘roughness’, generated by tectonic and volcanic movement characterises not only the African rift valley but probably the whole route of early hominin dispersal.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Muadzani, Alim, Oky Dwi Nurhayati, and Ike Pertiwi Windasari. "Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital." Jurnal Teknologi dan Sistem Komputer 4, no. 3 (2016): 470. http://dx.doi.org/10.14710/jtsiskom.4.3.2016.470-478.

Texto completo
Resumen
Information has now become an important comodity in human life, with the rapid development of communications technology has enable people to communicate and exchange information more easily. Internet is very popular and used by billions users worldwide, the information passing through the internet is very large, and some certain people trying to get this information for profit. The information need to be secured to prevent the others to get the information that send through the internet, steganography can be used to hide the information before sending it and the receiver can recover the hidden
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Radcliffe, J. F., M. A. Garrett, T. W. B. Muxlow, et al. "Nowhere to Hide: Radio-faint AGN in GOODS-N field." Astronomy & Astrophysics 619 (November 2018): A48. http://dx.doi.org/10.1051/0004-6361/201833399.

Texto completo
Resumen
Context. The occurrence of active galactic nuclei (AGN) is critical to our understanding of galaxy evolution and formation. Radio observations provide a crucial, dust-independent tool to study the role of AGN. However, conventional radio surveys of deep fields ordinarily have arc-second scale resolutions often insufficient to reliably separate radio emission in distant galaxies originating from star-formation and AGN-related activity. Very long baseline interferometry (VLBI) can offer a solution by identifying only the most compact radio emitting regions in galaxies at cosmological distances w
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Molina, Jonatan, Mateu Servera, and G. Leonard Burns. "Structure of ADHD/ODD Symptoms in Spanish Preschool Children: Dangers of Confirmatory Factor Analysis for Evaluation of Rating Scales." Assessment 27, no. 8 (2019): 1748–57. http://dx.doi.org/10.1177/1073191119839140.

Texto completo
Resumen
Confirmatory factor analysis (CFA) is often used to evaluate attention-deficit/hyperactivity disorder (ADHD) and oppositional defiant disorder (ODD) symptom ratings by parents and teachers. An ADHD-inattention (IN), ADHD-hyperactivity/impulsivity (HI), and ODD three-factor model is usually the best model. Acceptable CFA models, however, can hide symptoms with poor convergent and discriminant validity. To demonstrate this issue, CFA models (i.e., cross-loadings set to zero) along with exploratory CFA models (i.e., cross-loadings allowed) were applied to parent ( n = 308) and teacher ( n = 258)
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Liu, Hanlin, Jingju Liu, Xuehu Yan, Lintao Liu, Wanmeng Ding, and Yue Jiang. "A Novel Behavior Steganography Model Based on Secret Sharing." International Journal of Digital Crime and Forensics 11, no. 4 (2019): 97–117. http://dx.doi.org/10.4018/ijdcf.2019100107.

Texto completo
Resumen
This article proposes a novel behavior steganography model based on secret sharing, the main idea of which is to use secret messages as random elements in the secret sharing process to generate shadow images. Based on the introduced model and analyzing two secret image sharing algorithms — threshold secret image sharing (SIS) and threshold visual secret sharing (VSS), two specific behavior steganography schemes are presented, which are implemented by utilizing secret sharing behavior. In the embedding phase, the random selection behavior is employed to hide secret messages. In the extraction p
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Shahraeini, Sanaz, and Mahdi Yaghoobi. "A New Approach in Digital Image Watermarking Using Fractal Model in DWT Domain." Advanced Materials Research 403-408 (November 2011): 3510–18. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.3510.

Texto completo
Resumen
The recent progress in the digital multimedia technologies has offered many facilities in the transmission, reproduction and manipulation of data. However, this advance has also brought the problem such as copyright protection for content providers. Digital watermarking is one of the proposed solutions for copyright protection of multimedia. This paper proposes a blind watermarking algorithm based on fractal model in discrete wavelet domain for copyright protection. The idea of the presented scheme is to hide a binary image as a watermark with fractal parameters in wavelet domain of host image
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Lu, Yong Qiang, Fang Yong, and He Xiang. "The Research on Hybrid Communication Model for Trojan Based on P2P." Advanced Materials Research 791-793 (September 2013): 2038–42. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.2038.

Texto completo
Resumen
Direct connection and reflective connection are commonly used in traditional Trojans communication model, which have some significant deficiencies in hiding, anti-tracking, and efficiency. To improve the aspects above in traditional Trojan horse communication model, the author proposed a hybrid communication model based on P2P technology. The model uses P2P intranet penetration protocol to build the channel between the controlled station and the control station, and uses P2P node servers for saving the Trojans status and transferring some data between the controlled and the control. The topolo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Chirumbolo, Salvatore. "Hormesis, resveratrol and plant-derived polyphenols: some comments." Human & Experimental Toxicology 30, no. 12 (2011): 2027–30. http://dx.doi.org/10.1177/0960327111408153.

Texto completo
Resumen
Hormesis is a dose–response phenomenon, usually present in plants and animals, characterized by a low-dose stimulation and high-dose inhibition, often resulting in typical U-shaped or J-shaped curves. Hormesis has become an interesting model for toxicology and risk assessment, as it has been described for several nature-derived phytochemicals but also because this adaptive response to stressors might hide an underlying more general behaviour of cell towards low doses.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!