Showing 14,661 - 14,680 results of 16,736 for search '"behavior"', query time: 0.12s Refine Results
  1. 14661

    Dylematy nauczania etyki w środowisku szkolnym by Grzegorz Stolarski

    Published 2007-12-01
    “…Despite the arguments for the naturalistic approach (presently fashionable criticism of ethics, the issue of toleration and avoidance of the idéologisation) I undertake to defend the engaged approach as better at giving possibilities of reasonable criticism of moral behaviors and as the result of this criticism, moral attitudes which are the goal of teaching ethics in school.…”
    Get full text
    Article
  2. 14662

    Secure and collaborative spectrum sensing scheme based on audit game by Yuntao WANG, Zhou SU, Qichao XU, Yiliang LIU, Haixia PENG, Hao LUAN

    Published 2023-12-01
    “…To defend against poisoning attacks and free-riding attacks conducted by malicious sensing terminals in crowd sensing-based collaborative spectrum sensing (CCSS), a novel audit game-based defense scheme was proposed, which combined the pre-deterrence and post-punishment mechanisms.Firstly, considering the audit budget constraint, a mixed-strategy audit game model under incomplete information was designed, which set a penalty strategy to deter malicious collaborators before spectrum sensing, and audited and punished them after the fusion of sensing data.Then, a lightweight audit chain model with on-chain and off-chain collaboration was designed, in which audit evidence was stored in an off-chain data warehouse and its metadata was publicly published on the blockchain.Furthermore, a distributed and intelligent audit algorithm based on reinforcement learning was devised to adaptively seek the approximate mix-strategy equilibrium of the audit game.Simulation results demonstrate that the proposed scheme can quickly obtain the stable and approximately optimal audit strategies and actively suppress the poisoning and free-riding behaviors of malicious collaborators, in comparison with conventional schemes.…”
    Get full text
    Article
  3. 14663

    The Influence of Perceptions of Risks and Benefits on the Continuity of Use of Fintech Services by Artur Barretti Mascarenhas, Cristiane Koda Perpétuo, Erika Borgonovo Barrote, Maria Paula Perides

    Published 2021-01-01
    “…One of the contributions of this study is that it indicates some possible demographic and behavioral characteristics of Brazilian fintech consumers, opening up space for a better understanding of the market and service improvements.…”
    Get full text
    Article
  4. 14664
  5. 14665

    Qualitative Evaluation of Divergent Thinking in Patients with Schizophrenia by Takahiro Nemoto, Masafumi Mizuno, Haruo Kashima

    Published 2005-01-01
    “…Research on deficits in divergent thinking in patients with schizophrenia may contribute to the development of cognitive and behavioral rehabilitation programs.…”
    Get full text
    Article
  6. 14666

    Experimental Studies on the Changes in Resistivity and Its Anisotropy Using Electrical Resistivity Tomography by Tao Zhu, Jian-Guo Zhou, Jin-Qi Hao

    Published 2012-01-01
    “…Our results show that with increasing pressure, resistivity and the decreased (D region) and increased (I region) resistivity regions have complex behaviors, but when pressure is higher than a certain value, the average resistivity decrease and the area of D region expand gradually in all time with the increase of pressure, which may be significant to the monitoring and prediction of earthquake, volcanic activities, and large-scale geologic motions. …”
    Get full text
    Article
  7. 14667

    Male Sexual Dysfunction by Danyon Anderson, John Laforge, Maggie M. Ross, Robert Vanlangendonck, Jamal Hasoon, Omar Viswanath, Alan D. Kaye, Ivan Urits

    Published 2022-08-01
    “…PE may be treated behaviorally or with SSRIs as first line medication.…”
    Get full text
    Article
  8. 14668

    People With Cerebral Palsy: Effects of and Perspectives for Therapy by Margaret J. Mayston

    Published 2001-01-01
    “…The therapist requires an understanding of the interaction of all systems, cognitive/perceptual, motor, musculoskeletal, sensory and behavioral, in the context of the development and plasticity of the CNS. …”
    Get full text
    Article
  9. 14669
  10. 14670

    Pain Neuroscience Education for Acute Pain by Adriaan Louw, Teresa Schuemann, Kory Zimney, Emilio J Puentedura

    Published 2024-06-01
    “…Pain neuroscience education (PNE) provides individuals in pain with an understanding of the underlying neurobiology and neurophysiology of their pain experience, which has been shown to result in decreased self-reported pain, reduced disability, the alleviation of fear and fear-avoidance behaviors, diminished pain catastrophizing, and improved movement. …”
    Get full text
    Article
  11. 14671

    Gastric Cancer in Young Adults: A Different Clinical Entity from Carcinogenesis to Prognosis by Jian Li

    Published 2020-01-01
    “…What characterizes GCYA are a higher prevalence in females, more aggressive tumor behaviors, diagnosis at advanced stages, fewer comorbidities and being better treatment candidates, and a similar or better survival outcome when compared with older patients. …”
    Get full text
    Article
  12. 14672

    Safety Planning: A Vital Preliminary Step for Professionals Working With Intimate Partner Violence Victims by Melis Sedef Kahraman, Kathryn Bell

    Published 2017-12-01
    “…Domestic violence (DV) is defined as a pattern of assaultive and coercive behaviors, including physical, sexual, and psychological attacks, as well as economic coercion, that adults or adolescents use against their intimate partners (Ganley, 1995). …”
    Get full text
    Article
  13. 14673

    Memory-like states created by the first ethanol experience are encoded into the Drosophila mushroom body learning and memory circuitry in an ethanol-specific manner. by Caleb Larnerd, Maria Nolazco, Ashley Valdez, Vanessa Sanchez, Fred W Wolf

    Published 2025-02-01
    “…Ethanol memory-like states appear genetically and behaviorally paralleled to the canonical learning and memory traces anesthesia-sensitive, anesthesia-resistant, and long-term memory ASM, ARM, and LTM. …”
    Get full text
    Article
  14. 14674

    An action research about the effects of social-emotional learning in a second language acquisition teacher preparation course by Herrera Luis Javier Pentón

    Published 2024-01-01
    “…., self-awareness), prompting them to deploy a series of strategies to regulate their behaviors and practices as self-taught language learners and teachers (i.e., self-management). …”
    Get full text
    Article
  15. 14675

    Jonathan Gruber’s “Public Finance and Public Policy”: A Critical Analysis by Mohammad Javad Sharifzadeh

    Published 2017-07-01
    “…But, the book has some important shortcomings such as: its emphasis on the Pareto approach and neglecting alternative approaches such as the Rawlsian approach or the Amarya sen`s capability approach, lack of care to the historical approach and issues, neglecting non-liberal economists’ theories (e.g. socialist theories), neglecting the specific issues of the public finance in developing countries and ignoring new scientific instruments and issues such as game theory and behavioral public finance.…”
    Get full text
    Article
  16. 14676

    A Correctness Checking Approach for Collaborative Business Processes in the Cloud by Qi Mo, Yuqi Wang, Jixiang Xiang, Tong Li

    Published 2020-01-01
    “…Since business processes corresponding to BPaaS services are usually provided by different cloud service providers, and their interactions are unforeseen in advance, in actual execution, some behavioral anomalies (e.g., deadlocks) may occur. To this end, based on BPaaS services, we propose an approach to build process collaborations in the cloud. …”
    Get full text
    Article
  17. 14677

    Cerberus: cross-site social bot detection system based on deep learning by TANG Jiawei, LIU Yushan, GAO Min, GONG Qingyuan, WANG Xin, CHEN Yang

    Published 2024-12-01
    “…Nevertheless, single-site social bot detection systems often rely on historical behavioral data to identify bots, and the detection occurred after the social bots have implemented their attacks. …”
    Get full text
    Article
  18. 14678

    Big data security analysis method based on self-update threat intelligence database by Yanfang HOU, Jinhua WANG

    Published 2018-03-01
    “…Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.…”
    Get full text
    Article
  19. 14679

    Premature birth changes wiring constraints in neonatal structural brain networks by Alexa Mousley, Danyal Akarca, Duncan E. Astle

    Published 2025-01-01
    “…Abstract Structural brain organization in infancy is associated with later cognitive, behavioral, and educational outcomes. Due to practical limitations, such as technological advancements and data availability of fetal MRI, there is still much we do not know about the early emergence of topological organization. …”
    Get full text
    Article
  20. 14680

    Network and Agent Dynamics with Evolving Protection against Systemic Risk by Chulwook Park

    Published 2020-01-01
    “…In this paper, we show how to construct a large variety of behaviors by applying a simple algorithm to networked agents, which could, conceivably, offer a straightforward way out of the complexity. …”
    Get full text
    Article