Results 81 to 90 of about 302,884 (283)
Physical means of securing information, such as sealed envelopes and scratch cards, can be used to achieve cryptographic objectives. Reasoning about this has so far been informal.
C. Morgan+7 more
core +1 more source
Load Hiding of Household's Power Demand [PDF]
With the development and introduction of smart metering, the energy information for costumers will change from infrequent manual meter readings to fine-grained energy consumption data.
Egarter, Dominik+2 more
core +1 more source
The Empirical Investigation of Knowledge Hiding and In-role Behavior
This research was intended to investigate the connection between Knowledge Hiding and In-role Behavior. The relationship between independent and dependent variables was calculated by the Pearson correlation and simple regression analysis. The data was randomly collected through a self-administered questionnaire from 129 staff working in private sector ...
Hazrat Bilal+2 more
openaire +4 more sources
Summary Data‐driven forecasting of ship motions in waves is investigated through feedforward and recurrent neural networks as well as dynamic mode decomposition. The goal is to predict future ship motion variables based on past data collected on the field, using equation‐free approaches.
Matteo Diez+2 more
wiley +1 more source
A Q‐Learning Algorithm to Solve the Two‐Player Zero‐Sum Game Problem for Nonlinear Systems
A Q‐learning algorithm to solve the two‐player zero‐sum game problem for nonlinear systems. ABSTRACT This paper deals with the two‐player zero‐sum game problem, which is a bounded L2$$ {L}_2 $$‐gain robust control problem. Finding an analytical solution to the complex Hamilton‐Jacobi‐Issacs (HJI) equation is a challenging task.
Afreen Islam+2 more
wiley +1 more source
Organizational Communication and Influence of Personality Traits on Knowledge Hiding Behaviour of Students [PDF]
One way of enhancing effective organizational communication is to encourage knowledge sharing. However, knowledge transfer can be problematic because organizations do not own employees' intellectual assets. Despite the benefits of knowledge sharing, some
Funmilola O. Omotayo
core +1 more source
Neural Network Adaptive Control With Long Short‐Term Memory
ABSTRACT In this study, we propose a novel adaptive control architecture that provides dramatically better transient response performance compared to conventional adaptive control methods. This is accomplished by the synergistic employment of a traditional adaptive neural network (ANN) controller and a long short‐term memory (LSTM) network.
Emirhan Inanc+4 more
wiley +1 more source
PROPYLA: Privacy Preserving Long-Term Secure Storage
An increasing amount of sensitive information today is stored electronically and a substantial part of this information (e.g., health records, tax data, legal documents) must be retained over long time periods (e.g., several decades or even centuries ...
Bayer Dave+9 more
core +1 more source
Privometer: Privacy protection in social networks [PDF]
The increasing popularity of social networks, such as Facebook and Orkut, has raised several privacy concerns. Traditional ways of safeguarding privacy of personal information by hiding sensitive attributes are no longer adequate.
Elmagarmid, Ahmed+3 more
core +2 more sources
Beyond Order: Perspectives on Leveraging Machine Learning for Disordered Materials
This article explores how machine learning (ML) revolutionizes the study and design of disordered materials by uncovering hidden patterns, predicting properties, and optimizing multiscale structures. It highlights key advancements, including generative models, graph neural networks, and hybrid ML‐physics methods, addressing challenges like data ...
Hamidreza Yazdani Sarvestani+4 more
wiley +1 more source