Suggested Topics within your search.
Suggested Topics within your search.
- Organizational behavior 8
- Management 7
- Animal behavior 5
- Moral and ethical aspects 5
- Psychological aspects 5
- Social aspects 5
- Psychology 4
- Attitude to Health 3
- Behavioral Medicine 3
- Health behavior 3
- Information technology 3
- Organizational Behavior 3
- Animal ecology 2
- Consumer behavior 2
- Economics 2
- Internet in public administration 2
- Music 2
- Public administration 2
- Quality of life 2
- Social conditions 2
- Social problems 2
- Social sciences--Data processing 2
- methods 2
- Academic achievement 1
- Agricultural innovations 1
- Animal breeding 1
- Animal population genetics 1
- Animal welfare 1
- Behavior modification 1
- Business communication 1
-
8401
Neimark–Sacker Bifurcation and Controlling Chaos in a Three-Species Food Chain Model through the OGY Method
Published 2021-01-01“…The dynamics behavior of a discrete-time three-species food chain model is investigated. …”
Get full text
Article -
8402
An Innovative Way to Generate Hamiltonian Energy of a New Hyperchaotic Complex Nonlinear Model and Its Control
Published 2020-01-01“…Via active control method, we inhibit our system’s hyperchaotic behavior. The new system’s hyperchaotic solutions are transformed into its unstable, trivial fixed point. …”
Get full text
Article -
8403
The Communication Around Natural Risks in Mountain Regions: Analyzing the Effects of Belief and Social Differences
Published 2021-09-01“…The article analyzes contemporary changes in public communication aimed at changing individuals’ behavior relating to the environment in “at-risk” regions. …”
Get full text
Article -
8404
Transverse momentum dependent parton densities in a proton from the generalized DAS approach
Published 2020-02-01“…Abstract We use the Bessel-inspired behavior of parton densities at small Bjorken x values, obtained in the case of the flat initial conditions for DGLAP evolution equations in the double scaling QCD approximation (DAS), to evaluate the transverse momentum dependent (TMD, or unintegrated) quark and gluon distribution functions in a proton. …”
Get full text
Article -
8405
Numerical homogenization of piezoelectric textiles with electrospun fibers for energy harvesting
Published 2014-07-01“…Due to the importance of computational modeling to understand the influence that micro-scale geometry and constitutive variables have on the macroscopic behavior, a homogenization strategy is developed. The macroscopic structure behaviour is obtained defining a reference volume element (RVE) at the micro-scale. …”
Get full text
Article -
8406
Transmission scheduling scheme based on deep Q learning in wireless network
Published 2018-04-01“…To cope with the problem of data transmission in wireless networks,a deep Q learning based transmission scheduling scheme was proposed.The Markov decision process system model was formulated to describe the state transition of the system.The Q learning algorithm was adopted to learn and explore the system states transition information in the case of unknown system states transition probability to obtain the approximate optimal strategy of the schedule node.In addition,when the system state scale was big,the deep learning method was employed to map the relation between state and behavior to solve the problem of the large amount of computation and storage space in Q learning process.The simulation results show that the proposed scheme can approach the optimal strategy based on strategy iteration in terms of power consumption,throughput,packets loss rate.And the proposed scheme has a lower complexity,which can solve the problem of the curse of dimensionality.…”
Get full text
Article -
8407
Study on the Coupling of Gear Dynamics and Elastohydrodynamic Lubrication
Published 2020-02-01“…To explore the coupling effect of gear dynamics characteristics and elastohydrodynamic lubrication, considering the influence of surface roughness and the time-varying meshing stiffness on gear dynamics behavior, the six-degree-freedom friction dynamics model is established based on the dynamics theory. …”
Get full text
Article -
8408
Applications of Babalola q-convolution operator on subclass of analytic functions
Published 2025-01-01“…Our discoveries offer fresh perspectives on the behavior of these functions and aid in comprehending their structural characteristics.…”
Get full text
Article -
8409
Contraction Mapping Theory and Approach to LMI-Based Stability Criteria of T-S Fuzzy Impulsive Time-Delays Integrodifferential Equations
Published 2016-01-01“…It is worth mentioning that the conditions on the behavior functions are weaker than those of existing results, and the formulated contraction mapping and fixed point technique are different from those of previous literature. …”
Get full text
Article -
8410
Earnings Management and Quarterly Discretionary Accruals Level in the Brazilian Stock Market
Published 2019-01-01“…This study aims to investigate the behavior of the quarterly earnings management level of Brazilian public companies. …”
Get full text
Article -
8411
On the Difference Equation xn+1=xnxn-k/(xn-k+1a+bxnxn-k)
Published 2012-01-01“…By using obtained formulae, we investigate asymptotic behavior of well-defined solutions of the equation.…”
Get full text
Article -
8412
Modeling of Macroeconomics by a Novel Discrete Nonlinear Fractional Dynamical System
Published 2013-01-01“…The empirical study suggests that the nonlinear discrete fractional dynamical system can describe the actual economic data accurately and predict the future behavior more reasonably than the linear dynamic system. …”
Get full text
Article -
8413
A Novel Drive Option for Piezoelectric Ultrasonic Transducers
Published 2011-01-01“…To gain a better sense of the vibration behavior, the studies focus initially on one ring and subsequently on the different possibilities to assemble the transducer. …”
Get full text
Article -
8414
Les effets socio-économiques et paysagers du système coopératif viticole en territoires de montagne
Published 2015-05-01“…To understand, and sometimes predict, changes in the socio-economics and landscapes of a region due to cooperatives, we have used a multi-agent system (MAS) to model the behavior of the actors involved in wine production in a cooperative. …”
Get full text
Article -
8415
Teach Aquaculture Curriculum: Dancing with Brine Shrimp
Published 2010-08-01“…In this activity for grades 5-12, students will hatch and culture brine shrimp to observe the behavior and the different development stages of the organisms. …”
Get full text
Article -
8416
Performance of clock sources and their influence on time synchronization in wireless sensor networks
Published 2019-09-01“…In this work, real experiments and a theoretical analysis of the behavior of the clock sources, most used in wireless sensor networks, have been carried out. …”
Get full text
Article -
8417
An Improved Integral Method for Prediction of Distorted Inlet Flow Propagation in Axial Compressor
Published 2005-01-01“…The results present a realistic physical insight to an axial-flow compressor behavior with a propagation of inlet distortion.</p>…”
Get full text
Article -
8418
Policy conflict detection in software defined network by using deep learning
Published 2017-11-01“…In OpenFlow-based SDN(software defined network),applications can be deployed through dispatching the flow polices to the switches by the application orchestrator or controller.Policy conflict between multiple applications will affect the actual forwarding behavior and the security of the SDN.With the expansion of network scale of SDN and the increasement of application number,the number of flow entries will increase explosively.In this case,traditional algorithms of conflict detection will consume huge system resources in computing.An intelligent conflict detection approach based on deep learning was proposed which proved to be efficient in flow entries’ conflict detection.The experimental results show that the AUC (area under the curve) of the first level deep learning model can reach 97.04%,and the AUC of the second level model can reach 99.97%.Meanwhile,the time of conflict detection and the scale of the flow table have a linear growth relationship.…”
Get full text
Article -
8419
SDN security control and forwarding method based on cipher identification
Published 2018-02-01“…Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identity,file attributes or business content and other characteristics,and the data stream was marked by the cipher identification and signed with the private key based on the cipher identification.Then,when the data stream entered and left the network,the forwarding device verified its signature to ensure the authenticity of the data.At the same time,the cipher identification was designed as a matching item recognized by the forwarding device,and the network forwarding behavior was defined based on the cipher identification,so a fine-grained network control capability could be formed based on people,things,and business flow.Finally,the validity of the method is verified by experimental analysis.…”
Get full text
Article -
8420
Container escape detection method based on heterogeneous observation chain
Published 2023-01-01“…Aiming at the problem of high false negative rate in container escape detection technologies, a real-time detecting method of heterogeneous observation was proposed.Firstly, the container escape behavior utilizing kernel vulnerabilities was modeled, and the critical attributes of the process were selected as observation points.A heterogeneous observation method was proposed with “privilege escalation” as the detection criterion.Secondly, the kernel module was adopted to capture the attribute information of the process in real time, and the process provenance graph was constructed.The scale of the provenance graph was reduced through container boundary identification technology.Finally, a heterogeneous observation chain was built based on the process attribute information, and the prototype system HOC-Detector was implemented.The experiments show that HOC-Detector can successfully detect all container escapes using kernel vulnerabilities in the test dataset, and the increased runtime overhead is less than 0.8%.…”
Get full text
Article