Showing 8,401 - 8,420 results of 18,984 for search '"behavior"', query time: 0.11s Refine Results
  1. 8401

    Neimark–Sacker Bifurcation and Controlling Chaos in a Three-Species Food Chain Model through the OGY Method by Guo Feng, Ding Yin, Li Jiacheng

    Published 2021-01-01
    “…The dynamics behavior of a discrete-time three-species food chain model is investigated. …”
    Get full text
    Article
  2. 8402

    An Innovative Way to Generate Hamiltonian Energy of a New Hyperchaotic Complex Nonlinear Model and Its Control by Kholod M. Abualnaja

    Published 2020-01-01
    “…Via active control method, we inhibit our system’s hyperchaotic behavior. The new system’s hyperchaotic solutions are transformed into its unstable, trivial fixed point. …”
    Get full text
    Article
  3. 8403

    The Communication Around Natural Risks in Mountain Regions: Analyzing the Effects of Belief and Social Differences by Mikaël Chambru, Jean-Philippe De Oliverira

    Published 2021-09-01
    “…The article analyzes contemporary changes in public communication aimed at changing individuals’ behavior relating to the environment in “at-risk” regions. …”
    Get full text
    Article
  4. 8404

    Transverse momentum dependent parton densities in a proton from the generalized DAS approach by A. V. Kotikov, A. V. Lipatov, B. G. Shaikhatdenov, P. Zhang

    Published 2020-02-01
    “…Abstract We use the Bessel-inspired behavior of parton densities at small Bjorken x values, obtained in the case of the flat initial conditions for DGLAP evolution equations in the double scaling QCD approximation (DAS), to evaluate the transverse momentum dependent (TMD, or unintegrated) quark and gluon distribution functions in a proton. …”
    Get full text
    Article
  5. 8405

    Numerical homogenization of piezoelectric textiles with electrospun fibers for energy harvesting by C. Maruccio, L. De Lorenzis

    Published 2014-07-01
    “…Due to the importance of computational modeling to understand the influence that micro-scale geometry and constitutive variables have on the macroscopic behavior, a homogenization strategy is developed. The macroscopic structure behaviour is obtained defining a reference volume element (RVE) at the micro-scale. …”
    Get full text
    Article
  6. 8406

    Transmission scheduling scheme based on deep Q learning in wireless network by Jiang ZHU, Tingting WANG, Yonghui SONG, Yali LIU

    Published 2018-04-01
    “…To cope with the problem of data transmission in wireless networks,a deep Q learning based transmission scheduling scheme was proposed.The Markov decision process system model was formulated to describe the state transition of the system.The Q learning algorithm was adopted to learn and explore the system states transition information in the case of unknown system states transition probability to obtain the approximate optimal strategy of the schedule node.In addition,when the system state scale was big,the deep learning method was employed to map the relation between state and behavior to solve the problem of the large amount of computation and storage space in Q learning process.The simulation results show that the proposed scheme can approach the optimal strategy based on strategy iteration in terms of power consumption,throughput,packets loss rate.And the proposed scheme has a lower complexity,which can solve the problem of the curse of dimensionality.…”
    Get full text
    Article
  7. 8407

    Study on the Coupling of Gear Dynamics and Elastohydrodynamic Lubrication by Jian Guangxiao, Wang Youqiang, Luo Heng, Li Yunkai

    Published 2020-02-01
    “…To explore the coupling effect of gear dynamics characteristics and elastohydrodynamic lubrication, considering the influence of surface roughness and the time-varying meshing stiffness on gear dynamics behavior, the six-degree-freedom friction dynamics model is established based on the dynamics theory. …”
    Get full text
    Article
  8. 8408

    Applications of Babalola q-convolution operator on subclass of analytic functions by Timilehin Gideon Shaba, Saravanan Gunasekar, Afis Saliu, Fairouz Tchier, Baskaran Sudharsanan

    Published 2025-01-01
    “…Our discoveries offer fresh perspectives on the behavior of these functions and aid in comprehending their structural characteristics.…”
    Get full text
    Article
  9. 8409

    Contraction Mapping Theory and Approach to LMI-Based Stability Criteria of T-S Fuzzy Impulsive Time-Delays Integrodifferential Equations by Ruofeng Rao, Shouming Zhong

    Published 2016-01-01
    “…It is worth mentioning that the conditions on the behavior functions are weaker than those of existing results, and the formulated contraction mapping and fixed point technique are different from those of previous literature. …”
    Get full text
    Article
  10. 8410

    Earnings Management and Quarterly Discretionary Accruals Level in the Brazilian Stock Market by Rodolfo Maia Rosado Cascudo Rodrigues, Clayton Levy Lima de Melo, Edilson Paulo

    Published 2019-01-01
    “…This study aims to investigate the behavior of the quarterly earnings management level of Brazilian public companies. …”
    Get full text
    Article
  11. 8411

    On the Difference Equation xn+1=xnxn-k/(xn-k+1a+bxnxn-k) by Stevo Stević, Josef Diblík, Bratislav Iričanin, Zdenĕk Šmarda

    Published 2012-01-01
    “…By using obtained formulae, we investigate asymptotic behavior of well-defined solutions of the equation.…”
    Get full text
    Article
  12. 8412

    Modeling of Macroeconomics by a Novel Discrete Nonlinear Fractional Dynamical System by Zhenhua Hu, Wen Chen

    Published 2013-01-01
    “…The empirical study suggests that the nonlinear discrete fractional dynamical system can describe the actual economic data accurately and predict the future behavior more reasonably than the linear dynamic system. …”
    Get full text
    Article
  13. 8413

    A Novel Drive Option for Piezoelectric Ultrasonic Transducers by Diana Engelke, Bernd Oehme, Jens Strackeljan

    Published 2011-01-01
    “…To gain a better sense of the vibration behavior, the studies focus initially on one ring and subsequently on the different possibilities to assemble the transducer. …”
    Get full text
    Article
  14. 8414

    Les effets socio-économiques et paysagers du système coopératif viticole en territoires de montagne by Etienne Delay, Marius Chevallier, Eric Rouvellac, Fabio Zottele

    Published 2015-05-01
    “…To understand, and sometimes predict, changes in the socio-economics and landscapes of a region due to cooperatives, we have used a multi-agent system (MAS) to model the behavior of the actors involved in wine production in a cooperative. …”
    Get full text
    Article
  15. 8415

    Teach Aquaculture Curriculum: Dancing with Brine Shrimp by Elisa J. Livengood, Cortney L. Ohs, Amber L. Garr, R. Leroy Creswell, Carlos V. Martinez, Craig S. Kasper, Brian E. Myers, Frank A. Chapman

    Published 2010-08-01
    “…In this activity for grades 5-12, students will hatch and culture brine shrimp to observe the behavior and the different development stages of the organisms. …”
    Get full text
    Article
  16. 8416

    Performance of clock sources and their influence on time synchronization in wireless sensor networks by Francisco Tirado-Andrés, Alvaro Araujo

    Published 2019-09-01
    “…In this work, real experiments and a theoretical analysis of the behavior of the clock sources, most used in wireless sensor networks, have been carried out. …”
    Get full text
    Article
  17. 8417

    An Improved Integral Method for Prediction of Distorted Inlet Flow Propagation in Axial Compressor by Ng Eddie Yin-Kwee, Liu Ningyu, Lim Hong Ngiap, Tan Daniel

    Published 2005-01-01
    “…The results present a realistic physical insight to an axial-flow compressor behavior with a propagation of inlet distortion.</p>…”
    Get full text
    Article
  18. 8418

    Policy conflict detection in software defined network by using deep learning by Chuanhuang LI, Cheng CHENG, Xiaoyong YUAN, Lijie CEN, Weiming WANG

    Published 2017-11-01
    “…In OpenFlow-based SDN(software defined network),applications can be deployed through dispatching the flow polices to the switches by the application orchestrator or controller.Policy conflict between multiple applications will affect the actual forwarding behavior and the security of the SDN.With the expansion of network scale of SDN and the increasement of application number,the number of flow entries will increase explosively.In this case,traditional algorithms of conflict detection will consume huge system resources in computing.An intelligent conflict detection approach based on deep learning was proposed which proved to be efficient in flow entries’ conflict detection.The experimental results show that the AUC (area under the curve) of the first level deep learning model can reach 97.04%,and the AUC of the second level model can reach 99.97%.Meanwhile,the time of conflict detection and the scale of the flow table have a linear growth relationship.…”
    Get full text
    Article
  19. 8419

    SDN security control and forwarding method based on cipher identification by Xi QIN, Guodong TANG, Chaowen CHANG

    Published 2018-02-01
    “…Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identity,file attributes or business content and other characteristics,and the data stream was marked by the cipher identification and signed with the private key based on the cipher identification.Then,when the data stream entered and left the network,the forwarding device verified its signature to ensure the authenticity of the data.At the same time,the cipher identification was designed as a matching item recognized by the forwarding device,and the network forwarding behavior was defined based on the cipher identification,so a fine-grained network control capability could be formed based on people,things,and business flow.Finally,the validity of the method is verified by experimental analysis.…”
    Get full text
    Article
  20. 8420

    Container escape detection method based on heterogeneous observation chain by Yuntao ZHANG, Binxing FANG, Chunlai DU, Zhongru WANG, Zhijian CUI, Shouyou SONG

    Published 2023-01-01
    “…Aiming at the problem of high false negative rate in container escape detection technologies, a real-time detecting method of heterogeneous observation was proposed.Firstly, the container escape behavior utilizing kernel vulnerabilities was modeled, and the critical attributes of the process were selected as observation points.A heterogeneous observation method was proposed with “privilege escalation” as the detection criterion.Secondly, the kernel module was adopted to capture the attribute information of the process in real time, and the process provenance graph was constructed.The scale of the provenance graph was reduced through container boundary identification technology.Finally, a heterogeneous observation chain was built based on the process attribute information, and the prototype system HOC-Detector was implemented.The experiments show that HOC-Detector can successfully detect all container escapes using kernel vulnerabilities in the test dataset, and the increased runtime overhead is less than 0.8%.…”
    Get full text
    Article