Showing 8,741 - 8,760 results of 16,736 for search '"behavior"', query time: 0.12s Refine Results
  1. 8741

    Mechanical characterization and testing of multi-polymer combinations in 3D printing by Ana María Gómez Amador, Ricardo Andre Venturini Avendano, Alejandro Quesada González, Leopoldo Prieto Fernández

    Published 2025-02-01
    “…This article presents a study on the mechanical behavior of 3D printing multi-materials, which are easily accessible and cost-effective for users. …”
    Get full text
    Article
  2. 8742

    Thermodynamic assessment of the Mg-Pb and Mg-Bi systems using substitutional solution and associate models for the liquid phase by Zhang F., Tang Y., Hu B., Liu S., Du Y., Zhang Y.

    Published 2014-01-01
    “…It was found that the associate model can account for the experimental data more satisfactorily than the substitutional solution one, especially for the liquid phase with the short-range order behavior.…”
    Get full text
    Article
  3. 8743

    Novel Fluorescent Dyes for Single DNA Molecule Techniques by Alexander Zarkov, Aleksey Vasilev, Todor Deligeorgiev, Stoyno Stoynov, Marina Nedelcheva-Veleva

    Published 2013-03-01
    “…Although their qualities in bulk solutions have already been described, nothing was known about their behavior on a single-molecule level. All 12 dyes demonstrated strong emission when intercalated into single DNA molecules and stretched on a silanized surface, which makes them the perfect choice for fluorescent microscopy imaging. …”
    Get full text
    Article
  4. 8744

    Study on non-contact dispersion evaluation method by 3D Motion Mixer by Masaaki HORIE, Shu NORITA, Takuya IKINUKI, Hiroshi SUGIMOTO

    Published 2024-12-01
    “…However, the internal flow behavior of powders or liquids within such sealed containers remains unknown, assessing the mixing state requires opening the container for evaluation. …”
    Get full text
    Article
  5. 8745
  6. 8746

    Fusion of Focal Loss’s cyber threat intelligence entity extraction by Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU

    Published 2022-07-01
    “…Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of natural language texts contains a large amount of unstructured data, which needs to be converted into structured data for subsequent processing using entity extraction methods.However, since threat intelligence contains numerous terminology such as vulnerability names, malware and APT organizations, and the distribution of entities are extremely unbalanced, the performance of extraction methods in general field are severely limited when applied to threat intelligence.Therefore, an entity extraction model integrated with Focal Loss was proposed, which improved the cross-entropy loss function and balanced sample distribution by introducing balance factor and modulation coefficient.In addition, for the problem that threat intelligence had a complex structure and a wide range of sources, and contained a large number of professional words, token and character features were added to the model, which effectively improved OOV (out of vocabulary) problem in threat intelligence.Experiment results show that compared with existing mainstream model BiLSTM and BiLSTM-CRF, the F1 scores of the proposed model is increased by 7.07% and 4.79% respectively, which verifies the effectiveness of introducing Focal Loss and character features.…”
    Get full text
    Article
  7. 8747

    An Approach to Model Based Testing of Multiagent Systems by Shafiq Ur Rehman, Aamer Nadeem

    Published 2015-01-01
    “…Testing of multiagent systems is a challenging task due to the autonomous and proactive behavior of agents. However, testing is required to build confidence into the working of a multiagent system. …”
    Get full text
    Article
  8. 8748

    Deceptive Self-Presentation: The Role of Social Media User Motivation and the Dark Triad Personality by Ujam Jaenudin, Elis Anisah Fitriah, Mirna Devi

    Published 2023-12-01
    “…Online identity frauds such as love scams, catfishing, and fake content are associated with the freedom of personalization offered by social media platforms which can lead to deceptive self-presentation behavior and impressions. Therefore, this research aimed to examine the role of motivation to use Instagram and the dark triad personality on deceptive self-presentation. …”
    Get full text
    Article
  9. 8749

    Imaging Early Steps of Sindbis Virus Infection by Total Internal Reflection Fluorescence Microscopy by Youling Gu, Yuanzheng Yang, Yuechueng Liu

    Published 2011-01-01
    “…These findings demonstrate the utility of quantum dot labeling in studying the early steps and behavior of SINV infection.…”
    Get full text
    Article
  10. 8750

    Modeling of Six Openers for Seeding Machines, Cross-Shaped, T-Inverse, U-Shaped, V-Shaped, V-Shaped with Two Plates and Tulip-Shaped by Behnam Sepehr, isa Hazbawi

    Published 2024-12-01
    “…The results of modeling with Abaqus software showed that the Drucker-Prager behavior model with a correlation coefficient of 0.93% was in better agreement than the Mohr-Coulomb model and the amount of stress and displacement in the layers close to the loading level is greater and moving towards the lower layers. …”
    Get full text
    Article
  11. 8751

    Effect of Elastomeric Nanoparticles on Polystyrene/Organic Nanocomposites by Sungwon Ma, Yonathan Thio

    Published 2016-01-01
    “…The rheological behavior of nanosheet composites and the effect of morphology between elastomeric nanofiber and nanosheet composites were studied using a Cross-Williamson model and critical volume concentration was investigated by percolation threshold theory for fiber and sheet morphologies. …”
    Get full text
    Article
  12. 8752

    Design of Optimal QFT Controller and Prefilter for Buck Converter Using Metaheuristic Algorithms by Nitish Katal, Shiv Narayan

    Published 2018-01-01
    “…The designed 2-degree-of-freedom QFT control system offers a robust behavior and efficiently handles the parametric uncertainties. …”
    Get full text
    Article
  13. 8753

    Emotion regulation contagion drives reduction in negative intergroup emotions by Michael Pinus, Yajun Cao, Eran Halperin, Alin Coman, James J. Gross, Amit Goldenberg

    Published 2025-02-01
    “…Abstract When emotions occur in groups, they sometimes impact group behavior in undesired ways. Reducing group’s emotions with emotion regulation interventions can be helpful, but may also be a challenge, because treating every person in the group is often infeasible. …”
    Get full text
    Article
  14. 8754

    Control Monitoring Schemes for Monitoring Percentiles of Generalized Exponential Distribution with Hybrid Censoring by Shovan Chowdhury, Amarjit Kundu, Bidhan Modok

    Published 2025-02-01
    “…Monte Carlo simulations are carried out for various combinations of percentiles, false-alarm rates and sample sizes to evaluate the in-control performance of the proposed scheme in terms of average run lengths. The out-of-control behavior and performance of the scheme is thoroughly investigated for several choices of shifts in the parameters of the distribution. …”
    Get full text
    Article
  15. 8755

    Reliability analysis of passive residual heat removal system for large advanced pressurized water reactors by Tianrui Li, Xinkun Xiao, Guoqing Lu, Shikang Chen, Ronghua Chen, Wenxi Tian

    Published 2025-02-01
    “…The study employs modeling of passive safety systems and utilizes response surface methodology to evaluate system behavior during severe accident scenarios. Such comprehensive analysis contributes to ensuring the safe operation and advancement of nuclear power plants. …”
    Get full text
    Article
  16. 8756

    Modified artificial fish swarm algorithm to solve unrelated parallel machine scheduling problem under fuzzy environment by Azhar Mahdi Ibadi, Rosshairy Abd Rahman

    Published 2024-12-01
    “…Three modifications were made to the proposed algorithm. First, aspiration behavior was added to AFSA behaviors to increase effectiveness. …”
    Get full text
    Article
  17. 8757

    L’entretien de co-explicitation entre chercheur et enseignants : une voie d’émergence et d’expression du « sujet capable » by Isabelle Vinatier

    Published 2010-06-01
    “…Such a collaboration embraces both research and training issues: its goal is to allow the professionals to analyze their behavior subjectively during a debate that they conducted for themselves and not in reference to a model of standard practice. …”
    Get full text
    Article
  18. 8758

    A Challenging Diagnosis of Ascites: A Case Report of Peritoneal Tuberculosis by Jose Ruiz, Maedeh Ganji, Catarina Canha, Carmen Isache

    Published 2018-01-01
    “…Physicians must be aware of this disease and its behavior in high risk patients, also of the current diagnostic limitations.…”
    Get full text
    Article
  19. 8759

    An Improved Animal Migration Optimization Algorithm for Clustering Analysis by Mingzhi Ma, Qifang Luo, Yongquan Zhou, Xin Chen, Liangliang Li

    Published 2015-01-01
    “…Animal migration optimization (AMO) is one of the most recently introduced algorithms based on the behavior of animal swarm migration. This paper presents an improved AMO algorithm (IAMO), which significantly improves the original AMO in solving complex optimization problems. …”
    Get full text
    Article
  20. 8760

    Emerging Developmental Pathways to ADHD: Possible Path Markers in Early Infancy by Judith G. Auerbach, Naama Atzaba-Poria, Andrea Berger, Rivka Landau

    Published 2004-01-01
    “…Measures of neonatal immaturity and activity were related to behavior at 7 months. The findings suggest that possible developmental pathways to ADHD may be emerging in early infancy.…”
    Get full text
    Article