Showing 6,021 - 6,040 results of 14,343 for search '"behavior"', query time: 0.13s Refine Results
  1. 6021

    Conditional fluctuation theorems and entropy production for monitored quantum systems under imperfect detection by Mar Ferri-Cortés, José A. Almanza-Marrero, Rosa López, Roberta Zambrini, Gonzalo Manzano

    Published 2025-01-01
    “…The thermodynamic behavior of Markovian open quantum systems can be described at the level of fluctuations by using continuous monitoring approaches. …”
    Get full text
    Article
  2. 6022

    A Study on Deep Learning Based Parking Lot Allotment to the Vehicles by Aziza Algarni

    Published 2022-03-01
    “…Lack of guidance information about vacant parking spaces is one reason for inefficient parking behavior. Smart parking sensors and technologies facilitate the guidance of drivers to free parking spaces, thereby improving parking efficiency. …”
    Get full text
    Article
  3. 6023

    Depolarized SnO2-based gas anodes for electrowinning of silver in molten chlorides by Xiao S., Haarberg G.M.

    Published 2013-01-01
    “…SnO2-based porous anodes were prepared and the behavior of gas bubbles on the porous anodes with different original coarse grain size, immersed in ethanol to simulate molten chlorides, was primarily investigated. …”
    Get full text
    Article
  4. 6024

    Propagation of two-particle correlations across the chaotic phase for interacting bosons by Óscar Dueñas, David Peña, Alberto Rodríguez

    Published 2025-02-01
    “…This result supports very recent experimental observations, and paves the way toward an efficient description of the dynamical behavior of nonintegrable complex many-body systems. …”
    Get full text
    Article
  5. 6025

    The Breather-Like and Rational Solutions for the Integrable Kadomtsev-Petviashvili-Based System by Chuanjian Wang, Zhengde Dai, Changfu Liu

    Published 2015-01-01
    “…By controlling the wave number of the background plane wave we may control the the behavior of rational solitary wave. However, the shape of the rational solitary wave solution for the real long-wave field is not affected as the wave number is varied.…”
    Get full text
    Article
  6. 6026

    A Flexible Extension of Reduced Kies Distribution: Properties, Inference, and Applications in Biology by Muqrin A. Almuqrin, Ahmed M. Gemeay, M. M. Abd El-Raouf, Mutua Kilai, Ramy Aldallal, Eslam Hussam

    Published 2022-01-01
    “…A full simulation analysis was done that allows the study of these estimators’ asymptotic behavior. The efficiency and applicability of the ExRKD are investigated via the modeling of COVID-19 and milk data sets, which demonstrates that the ExRKD delivers a better match to the data sets when compared to competing models.…”
    Get full text
    Article
  7. 6027

    Dynamic analysis and Chaos control in a discrete predator-prey model with Holling type IV and nonlinear harvesting by Karima Mokni, Mohamed Ch-Chaoui

    Published 2024-01-01
    “…In this paper, we investigate the dynamical behavior of a two dimensional discretized prey predator system. …”
    Get full text
    Article
  8. 6028

    How Parents and Agents Can Address Bullying with Youth by Rosemary V. Barnett

    Published 2005-12-01
    “… Recently the American Medical Association (AMA) adopted a new anti-bullying policy that concluded that bullying is not just another childhood behavior that will eventually be outgrown, but rather a public health problem that can have long-term effects for both the bully and the victim. …”
    Get full text
    Article
  9. 6029

    Mass Renormalization in the Nelson Model by Fumio Hiroshima, Susumu Osawa

    Published 2017-01-01
    “…The asymptotic behavior of the effective mass meff(Λ) of the so-called Nelson model in quantum field theory is considered, where Λ is an ultraviolet cutoff parameter of the model. …”
    Get full text
    Article
  10. 6030

    PROSPECTS FOR THE APPLICATION OF DISTRIBUTED LEDGER TECHNOLOGY TO IMPROVE FINANCING OF START-UP (JAPAN EXPERIENCE) by S. S. Matveevskii

    Published 2019-10-01
    “…The model of investor behavior (taking into account risk and profitability) has made it possible to show, that with growing investor confidence (individuals and households) and a certain level of profitability of startups, investing in startups will be more preferable, than a bank deposit. …”
    Get full text
    Article
  11. 6031

    On Spectrum of the Laplacian in a Circle Perforated along the Boundary: Application to a Friedrichs-Type Inequality by G. A. Chechkin, Yu. O. Koroleva, L.-E. Persson, P. Wall

    Published 2011-01-01
    “…As an application of the obtained results, the asymptotic behavior of the best constant in a Friedrichs-type inequality is investigated.…”
    Get full text
    Article
  12. 6032

    A New Iterative Method for Finding Approximate Inverses of Complex Matrices by M. Kafaei Razavi, A. Kerayechian, M. Gachpazan, S. Shateyi

    Published 2014-01-01
    “…The analytical discussion of the method is included to demonstrate its convergence behavior. As a matter of fact, it is proven that the suggested scheme possesses tenth order of convergence. …”
    Get full text
    Article
  13. 6033

    Chaotic Oscillation of Satellite due to Aerodynamic Torque by Rashmi Bhardwaj, Mohammad Sajid

    Published 2021-01-01
    “…Variety of boundary techniques shows that streamlined force boundary (ɛ), unpredictability of circle (e), and mass-proportion (ω0) convert normal wavering to the disorganized one. We studied the behavior of trajectories due to change in parameters with Lyapunov exponents and time series plots. …”
    Get full text
    Article
  14. 6034

    Numerical Investigation of Fluid Forces Acting on a Confined Cylinder with Obstacle Subjected to Axial Flow by Guillaume Ricciardi

    Published 2020-01-01
    “…This paper focuses on fluid forces acting on a confined cylinder subjected to axial flow in application to fuel assembly dynamic behavior. From the literature, it is difficult to estimate the damping induced by the flow. …”
    Get full text
    Article
  15. 6035

    Swarm Control for Managed Beehives by Sara DeBerry, John Crowley, James D. Ellis

    Published 2019-07-01
    “…During the swarm season, hive owners should undertake proactive beekeeping practices to alter colonies in response to potential swarming behavior. In this way, the beekeeper maintains strong colonies with greater honey production and the potential to split and increase the total number of colonies, all of which makes beekeeping much more profitable for hive owners. …”
    Get full text
    Article
  16. 6036

    HCC Heterogeneity: Molecular Pathogenesis and Clinical Implications by Emilia Fransvea, Angelo Paradiso, Salvatore Antonaci, Gianluigi Giannelli

    Published 2009-01-01
    “…There is growing evidence that this heterogeneous clinical behavior is attributable to several different biological pathways. …”
    Get full text
    Article
  17. 6037

    Inhibition of Mild Steel Corrosion in Acidic Medium by Aqueous Extract of Tridax procumbens L. by G. Ilayaraja, A. R. Sasieekhumar, P. Dhanakodi

    Published 2011-01-01
    “…Also, it was found that the corrosion inhibition behavior of Tridax procumbens L. is greater in sulphuric acid than hydrochloric acid medium. …”
    Get full text
    Article
  18. 6038

    Quadratic error bound of the smoothed gap and the restarted averaged primal-dual hybrid gradient by Fercoq, Olivier

    Published 2023-08-01
    “…After a review of current analyses, we show that they do not explain properly the behavior of the algorithm, even on the most simple problems. …”
    Get full text
    Article
  19. 6039

    Time-Domain Analysis of Coupled Carbon Nanotube Interconnects by Davood Fathi

    Published 2014-01-01
    “…The influences of various parameters such as the contact resistance and the switching factor on the time behavior of coupling effects between the two coupled CNTs and an important effect named “crosstalk-induced delay” are studied and analyzed.…”
    Get full text
    Article
  20. 6040

    Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks by Nasser-Eddine Rikli, Aljawharah Alnasser

    Published 2016-07-01
    “…It is assumed that two types of malicious nodes can exist in this network. The malicious behaviors are assumed to be concealed through some statistical behavior. …”
    Get full text
    Article