Showing 14,601 - 14,620 results of 17,681 for search '"behavior"', query time: 0.09s Refine Results
  1. 14601

    Phase Transitions of GUP-Corrected Charged AdS Black Hole by Meng-Sen Ma, Yan-Song Liu

    Published 2018-01-01
    “…We study the thermodynamic properties and critical behaviors of the topological charged black hole in AdS space under the consideration of the generalized uncertainty principle (GUP). …”
    Get full text
    Article
  2. 14602

    Exponential Stability and Periodicity of Fuzzy Delayed Reaction-Diffusion Cellular Neural Networks with Impulsive Effect by Guowei Yang, Yonggui Kao, Changhong Wang

    Published 2013-01-01
    “…This paper considers dynamical behaviors of a class of fuzzy impulsive reaction-diffusion delayed cellular neural networks (FIRDDCNNs) with time-varying periodic self-inhibitions, interconnection weights, and inputs. …”
    Get full text
    Article
  3. 14603

    Modelling seasonal HFMD with the recessive infection in Shandong, China by Yangjun Ma, Maoxing Liu, Qiang Hou, Jinqing Zhao

    Published 2013-05-01
    “…After evaluating the basic reproduction number, we analyze the dynamical behaviors of the model and simulate the HFMD data of Shandong Province. …”
    Get full text
    Article
  4. 14604

    Bloodsucking Insects by P.G. Koehler, J.L. Castner

    Published 1997-02-01
    “… This document provides an overview of bloodsucking insects in Florida, detailing their physical characteristics, behaviors, and habitats. It covers mosquitoes, flies, lice, and true bugs, highlighting species such as the Asian tiger mosquito, stable fly, horse fly, deer fly, sand fly, head louse, pubic louse, bed bug, and bloodsucking conenose. …”
    Get full text
    Article
  5. 14605

    Complex Dynamics and Chaos Control on a Kind of Bertrand Duopoly Game Model considering R&D Activities by Hongliang Tu, Xueli Zhan, Xiaobing Mao

    Published 2017-01-01
    “…The complex dynamic behaviors of the system are shown by numerical simulations. …”
    Get full text
    Article
  6. 14606

    INSTANT MESSAGING GROUPS: IS IT CONVENIENCE OR TORTURE? by Mehmet Emin Bakay, Sevtap Ünal, Aygül Arslan

    Published 2023-08-01
    “…Disturbing situations of the users in the group are violations of privacy, harassment, hurtful words and behaviors, and gender discrimination. The main reasons why users accept these situations are primarily various fears; another is the cultural structure they are in and the personal characteristics of the users. …”
    Get full text
    Article
  7. 14607

    Quelles représentations du quartier idéal à La Réunion ? Une réflexion sur les modes d’habiter et la qualité de vie comme indicateurs de la durabilité urbaine by Amandine Junot, Jean-Philippe Praene

    Published 2021-11-01
    “…Through representations of ideal neighborhood, this research aims at exploring way of living and quality of life in Reunion Island, in order to better understand spatial and social behaviors and take them into consideration on sustainable lifestyle. 55 semi-structured interviews were performed and have been analyzed by the Iramuteq textual analysis software, supplemented by a manual content analysis. …”
    Get full text
    Article
  8. 14608

    Susceptibility to Stress Corrosion of Laser-Welded Composite Arch Wire in Acid Artificial Saliva by Chao Zhang, Xinhua Sun

    Published 2013-01-01
    “…It was found that both the solution pH and the stress had a significant influence on the corrosion behaviors of the CoAW samples. Decreasing the solution pH or increasing the loading stress caused the increase of Cu release and weight loss. …”
    Get full text
    Article
  9. 14609

    Mechanism and implementation of Rootkit attack and defense by Fujuan LI, Qun WANG

    Published 2018-12-01
    “…Rootkit is a set of malicious codes that can attack the system kernel and achieve deep hiding,which has posed serious threats to cyber security.Firstly,the basic features of Rootkit/Bootkit were introduced,and the characteristics of Rootkit attacks in user mode and kernel mode were compared and analyzed.Thereafter,the implementation principles and working mechanisms of Hook,DKOM and virtualization technologies involved in Rootkit attacks were emphatically analyzed.Combined with the specific attack behaviors,the main detection methods and defense techniques for Rootkit attacks were discussed at the end.…”
    Get full text
    Article
  10. 14610

    Complexity Analysis of a Modified Predator-Prey System with Beddington–DeAngelis Functional Response and Allee-Like Effect on Predator by Shuangte Wang, Hengguo Yu

    Published 2021-01-01
    “…In this paper, complex dynamical behaviors of a predator-prey system with the Beddington–DeAngelis functional response and the Allee-like effect on predator were studied by qualitative analysis and numerical simulations. …”
    Get full text
    Article
  11. 14611
  12. 14612
  13. 14613
  14. 14614

    Pornography-Watching Disorder and Its Risk Factors Among Young Adults: Cross-Sectional Survey by Csaba Erdős, Oguz Kelemen, Dávid Pócs, Edit Paulik, András Papp, Edina Horváth, Arbel Golan, Krisztián Széll

    Published 2025-01-01
    “…These results contribute to the ongoing discussion about whether pornography addiction should be recognized as a distinct behavioral disorder.…”
    Get full text
    Article
  15. 14615

    Evaluation of practices and attitudes of caregivers influencing adherence to seasonal malaria chemoprevention in children under five years of age: the case of Rural Embangweni, Mzi... by Chisomo Salangwa, Reston Munthali, Lusungu Mfune, Vegha Kaunga Nyirenda

    Published 2024-06-01
    “… This research aimed to investigate medication adherence to seasonal malaria chemoprevention (SMC) and to evaluate the caregivers’ behaviors and attitudes throughout the 2022 SMC campaign in Embangweni, Mzimba District. …”
    Get full text
    Article
  16. 14616

    Mental health in people living with and beyond colorectal cancer: A patient‐oriented constructivist grounded theory by Vicki Cheng, Helen McTaggart‐Cowan, Jonathan M. Loree, Rachel A. Murphy, Mikaela Barnes, Haydn Bechthold, Norman Jansen, Mary A. De Vera

    Published 2024-09-01
    “…Mental health experiences encompass emotional and cognitive‐behavioral responses, expressed differently across phases. …”
    Get full text
    Article
  17. 14617
  18. 14618

    The Association of Having a Late Dinner or Bedtime Snack and Skipping Breakfast with Overweight in Japanese Women by Chika Okada, Hironori Imano, Isao Muraki, Keiko Yamada, Hiroyasu Iso

    Published 2019-01-01
    “…A total of 19,687 Japanese women, aged 40–74 years, were asked about their height, weight, and habitual eating behaviors such as having a late dinner and a bedtime snack and skipping breakfast, using a self-administered questionnaire. …”
    Get full text
    Article
  19. 14619

    Non-Linear Effects of Acute Sleep Deprivation on Spatial Working Memory: Cognitive Depletion and Neural Compensation by Yongcong Shao, Lin Xu, Ziyi Peng, Xin An, Jingjing Gong, Mengfei Han

    Published 2024-12-01
    “…After 24 h of deprivation, both behavioral performance and ERP component amplitudes showed significant declines. …”
    Get full text
    Article
  20. 14620

    Acupoint catgut embedding alleviates experimental autoimmune encephalomyelitis by modulating neuroinflammation and potentially inhibiting glia activation through JNK and ERK pathwa... by Xiaofang Liu, Liansheng Yang, Zhumin Su, Xueying Ma, Yingying Liu, Lili Ma, Xiaomeng Ma, Mingxia Ma, Xiaoyun Liu, Kun Zhang, Kun Zhang, Xiaohong Chen

    Published 2025-01-01
    “…In ACE-treated mice, EAE disease severity was significantly ameliorated, along with improvements in anxiety-like behaviors and reduced inflammation and demyelination. …”
    Get full text
    Article