Showing 16,081 - 16,100 results of 18,984 for search '"behavior"', query time: 0.09s Refine Results
  1. 16081

    Bifurcation Analysis and Chaos Control in a Discrete-Time Parasite-Host Model by Xueli Chen, Lishun Ren

    Published 2017-01-01
    “…The numerical simulations not only illustrate the consistence with the theoretical analysis, but also exhibit other complex dynamical behaviors, such as bifurcation diagrams, Maximum Lyapunov exponents, and phase portraits. …”
    Get full text
    Article
  2. 16082

    A dynamic trust evaluation scheme for cooperative spectrum sensing by Meiying WANG, Jingyu FENG, Guangyue LU, Dingkun HAN

    Published 2016-03-01
    “…Considering the harmful effect of dynamic SSDF attack against cooperative spectrum sensing technologies,a dynamic trust evaluation scheme based on the real-time observation and analysis of cognitive users’ sensing behaviors was proposed.Time attenuation,additive reward and additive penalty factors based on the historical sensing variation of cognitive users were introduced to calculate the dynamic trust value which changes with time and the number of collaborations.Meanwhile,trusted cognitive users were selected to participate in cooperative sensing,and thus improving the accuracy of the final sensing decision.Simulation results show that the scheme can effectively suppress the growth of trust of malicious users,and reduce the attack success rate for“OR”,“AND”and“Majority”which are three kinds of cooperative spectrum sensing data fusion schemes.…”
    Get full text
    Article
  3. 16083

    Les rituels en question dans la relation éducative : rupture des liens, maintien du lien, instauration de nouveaux liens by Christiane Montandon

    Published 2015-09-01
    “…This static conception of the ritual, anchoring individual conducts into an institutionalized social space, is opposed to a dynamic conception of the ritualization process where an habitus is implemented, expected behaviors, taking on roles according to a framework. …”
    Get full text
    Article
  4. 16084

    Analytic Normalized Solutions of 2D Fractional Saint-Venant Equations of a Complex Variable by Najla M. Alarifi, Rabha W. Ibrahim

    Published 2021-01-01
    “…We formulate the extended operator in a linear convolution operator with a normalized function to study some important geometric behaviors. A class of integral inequalities is investigated involving special functions. …”
    Get full text
    Article
  5. 16085

    Denying to Embracing: A Mother's Path to Acceptance, Love, and Resilience in Raising a Child with Down Syndrome by Alyanna V. Zabala, Araceli C. Doromal

    Published 2025-01-01
    “…This qualitative study explores the experiences of five mothers raising children with Down Syndrome, revealing their initial struggles with denial, managing expectations, behavioral issues, caregiver fatigue, and anxieties about the future. …”
    Get full text
    Article
  6. 16086

    Detecting and preventing collusion attack in DPoS based on power index by Xiaodong FU, Xinxin QI, Li LIU, Wei PENG, Jiaman DING, Fei DAI

    Published 2022-12-01
    “…Since malicious nodes may manipulate voting elections through collusion attacks in consensus mechanism of DPoS, the security of block chain can not be guaranteed in the consensus process of DPoS.To deal with the problem, a method for detecting and preventing collusion attack in DPoS based on power index was proposed.Firstly, a weighted voting game model of DPoS was constructed based on the idea of power index in game theory, and the behavioral motivation of the malicious node could be analyzed.Then, the attacks were detected based on changing range of abnormal power index.During the process of preventing collusion attacks in DPoS, the Softsign activation function was adapted to suppress the power index of malicious nodes.Lastly, the effectiveness of the proposed method to detect and prevent collusion attacks in DPoS was verified through theoretical analysis and experiments.…”
    Get full text
    Article
  7. 16087

    TEXT CENTERED EDUCATIONAL DISCOURSE IN THE MIRROR OF CONTEMPORARY VISUAL CULTURE by Alexander A. Polonnikov, Olga N. Kalachikova, Dmitry Yu. Korol, Natalia D. Korchalova

    Published 2016-12-01
    “…The tendency shows that 'words eat image' and is reflected in cognitive and behavioral phenomena. Working out a pedagogical concept which would establish parity between mediators and contribute to widening discourse repertoire in education is considered to be the main aim of the research presented in the article.…”
    Get full text
    Article
  8. 16088

    Are You Ready to Tie the Knot? A Quick Checklist by Lisa M. Leslie, Victor W. Harris

    Published 2012-08-01
    “…Before entering into this union, it is important for you and your partner to have your “eyes wide open” as you examine your individual attitudes and behaviors about both social and financial issues. This 4-page fact sheet was written by Lisa M. …”
    Get full text
    Article
  9. 16089

    Risiko for bias i retspsykiatriske vurderinger by Susanne Bengtson, Pia Lykke Hjortebjerg

    Published 2023-06-01
    “…Abstract To reach better-informed decisions about psycho-legal issues, courts in Denmark and other countries request psychiatric and psychological expertise opinions on emotional, behavioral, and/or cognitive functioning of charged individuals and on court sentencing for convicts. …”
    Get full text
    Article
  10. 16090

    Cloud outsourcing secret sharing scheme against covert adversaries by En ZHANG, Kui GENG, Wei JIN, Yong-jun LI, Yun-qing SUN, Feng-hua LI

    Published 2017-05-01
    “…In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just need a small amount of decryption and validation operations,while outsource expensive cryptographic operations to cloud service provider (CSP).The scheme,without complex interactive augment or zero-knowledge proof,could detect malicious behaviors of cloud tenants or cloud service providers.And the scheme was secure against covert adversaries.Finally,every cloud tenant was able to obtain the secret fairly and correctly.Security analysis and performance comparison show that scheme is safe and effective.…”
    Get full text
    Article
  11. 16091

    Towards Emotion Detection in Educational Scenarios from Facial Expressions and Body Movements through Multimodal Approaches by Mar Saneiro, Olga C. Santos, Sergio Salmeron-Majadas, Jesus G. Boticario

    Published 2014-01-01
    “…The ultimate goal is to combine these annotations with additional affective information collected during experimental learning sessions from different sources such as qualitative, self-reported, physiological, and behavioral information. These data altogether are to train data mining algorithms that serve to automatically identify changes in the learners’ affective states when dealing with cognitive tasks which help to provide emotional personalized support.…”
    Get full text
    Article
  12. 16092

    Survey on intelligent game of computer poker by Weilin YUAN, Zhiyong LIAO, Wei GAO, Tingting WEI, Junren LUO, Wanpeng ZAHNG, Jing CHEN

    Published 2021-10-01
    “…Computer game is the drosophila in the field of artificial intelligence, which has attracted the attention of researchers in artificial intelligence, and has become an advantageous testbed for the research of cognitive intelligence.Poker game can be modeled as dynamic games with imperfect information, definite boundaries and fixed rules.Computer poker AI needs such abilities as dynamic decision-making with incomplete information, identification of misleading and fraudulent behaviors by opponents, and multi-round chips and risk management.Firstly , the development of computer poker game was introduced, which represented by Texas Hold’em poker.Then, typical intelligence game model algorithm, key techniques and existing main problems of computer poker were reviewed analysis.Finally, the future development trends and application prospect of computer intelligent poker game were discussed for cognitive intelligence.…”
    Get full text
    Article
  13. 16093

    The ideology of managerialism in Russian social institutions: education, science, healthcare by V. V. Kovalev, A. V. Dyatlov

    Published 2023-09-01
    “…The study revealed that managerialism as an efficiency ideology is based on institutional rules accepted by the state, it is applied considering informal restrictions established in society (values, attitudes, stereotypes, behavioral patterns, etc.) and relies on the Russian bureaucracy, which is the main beneficiary of the managerialist ideology. …”
    Get full text
    Article
  14. 16094

    Dynamic Influence Prediction of Social Network Based on Partial Autoregression Single Index Model by Ya-hui Jia, Taotao Song, Shun-yao Wu, Qi Zhang, Yu-xia Su

    Published 2019-01-01
    “…Simulations are conducted to demonstrate finite sample behaviors.…”
    Get full text
    Article
  15. 16095

    Peningkatan harga diri melalui layanan bimbingan dan konseling individu by Umar Latif, Zamratul Aini

    Published 2020-06-01
    “…The approach used in this research is Participatory Action Research. respondents involved in this study were all members of the Sigli Penitentiary Class III Prison Society. the results of the study found an increase in self-esteem in fostered citizens marked by the emergence of 5 of 7 aspects based on behavioral checklist indicators that are realistic, aware of strengths and weaknesses, aware of the position as a creature of God, assertive and independent.…”
    Get full text
    Article
  16. 16096

    Analyzing Capacity Utilization and Travel Patterns of Chinese High-Speed Trains: An Exploratory Data Mining Approach by Fanxiao Liu, Zhanbo Sun, Peitong Zhang, Qiyuan Peng, Qingjie Qiao

    Published 2018-01-01
    “…Comparably little attention is paid to analyzing the factors that affect TCU and to understanding the behavioral patterns behind it. This paper applies exploratory data mining techniques to a 3-month long real world train operation data of the Beijing-Shanghai High-Speed Railway. …”
    Get full text
    Article
  17. 16097

    Multistability and Instability of Competitive Neural Networks with Mexican-Hat-Type Activation Functions by Xiaobing Nie, Jinde Cao, Shumin Fei

    Published 2014-01-01
    “…We investigate the existence and dynamical behaviors of multiple equilibria for competitive neural networks with a class of general Mexican-hat-type activation functions. …”
    Get full text
    Article
  18. 16098

    Container intrusion detection method based on host system call frequency by Yimu JI, Weidong YANG, Kui LI, Shangdong LIU, Qiang LIU, Sisi SHAO, Shuai YOU, Naijiao HUANG

    Published 2021-08-01
    “…Container technology has become a widely used virtualization technology in cloud platform due to its lightweight virtualization characteristics.However, it shares the kernel with the host, so it has poor security and isolation, and is vulnerable to flood, denial of service, and escape attacks.In order to effectively detect whether the container is attacked or not, an intrusion detection method based on host system call frequency was proposed.This method took advantage of the different frequency of system call between different attack behaviors, collected the system call generated when the container was running, extracted the system call features by combining the sliding window and TF-IDF algorithm, and classified by comparing the feature similarity.The experimental results show that the detection rate of this method can reach 97%, and the false alarm rate is less than 4%.…”
    Get full text
    Article
  19. 16099

    Rewriting the Quranic Approach to the Rationality Assumption in Economic Behaviorology A Critique on the Book Economic Behaviorology According to Holy Quran by Mohammad Javad Tavakkoli

    Published 2022-07-01
    “…The main problem is the lack of attention to the boundaries of human rationality which is an important issue in Behavioral Economics. Contrary to the findings of the book, there has been attention to cognitive, motivational, and intentional boundaries of rationality in Quranic economic Behaviorology. …”
    Get full text
    Article
  20. 16100

    Test Purpose Oriented I/O Conformance Test Selection with Colored Petri Nets by Jing Liu, Xinming Ye, Jiantao Zhou

    Published 2014-01-01
    “…Based on conformance testing oriented CPN models for specifying software functional behaviors and specific test purposes, respectively, feasible test cases are generated, guided by the CPN based IOCO relation, using synchronized model simulation with the proof of the soundness of test generation and the coverage towards test purposes. …”
    Get full text
    Article