Suggested Topics within your search.
Suggested Topics within your search.
- Organizational behavior 8
- Management 7
- Animal behavior 5
- Moral and ethical aspects 5
- Psychological aspects 5
- Social aspects 5
- Psychology 4
- Attitude to Health 3
- Behavioral Medicine 3
- Health behavior 3
- Information technology 3
- Organizational Behavior 3
- Animal ecology 2
- Consumer behavior 2
- Economics 2
- Internet in public administration 2
- Music 2
- Public administration 2
- Quality of life 2
- Social conditions 2
- Social problems 2
- Social sciences--Data processing 2
- methods 2
- Academic achievement 1
- Agricultural innovations 1
- Animal breeding 1
- Animal population genetics 1
- Animal welfare 1
- Behavior modification 1
- Business communication 1
-
16661
Big data security analysis method based on self-update threat intelligence database
Published 2018-03-01“…Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.…”
Get full text
Article -
16662
Premature birth changes wiring constraints in neonatal structural brain networks
Published 2025-01-01“…Abstract Structural brain organization in infancy is associated with later cognitive, behavioral, and educational outcomes. Due to practical limitations, such as technological advancements and data availability of fetal MRI, there is still much we do not know about the early emergence of topological organization. …”
Get full text
Article -
16663
Network and Agent Dynamics with Evolving Protection against Systemic Risk
Published 2020-01-01“…In this paper, we show how to construct a large variety of behaviors by applying a simple algorithm to networked agents, which could, conceivably, offer a straightforward way out of the complexity. …”
Get full text
Article -
16664
Sketch-based caching method for significant DNS queries
Published 2024-10-01“…With the rapid advancement of networking technology, DNS (domain name system), acting as the first step for most network behaviors, plays a vital role in assuring service quality through its capability and security. …”
Get full text
Article -
16665
Artificial Intelligence-Based Prediction of Individual Differences in Psychological Occupational Therapy Intervention Guided by the Realization of Occupational Values
Published 2022-01-01“…The previous studies on corporate occupational values focus on the behavioral variables and attitude variables related to occupations. …”
Get full text
Article -
16666
Asian Options Pricing and Parameter Estimation of Uncertain Mean-Reverting Currency Model With Exponential Ornstein–Uhlenbeck Exchange Rate
Published 2025-01-01“…The prices of call and put options show divergent behaviors with respect to the initial exchange rate and the fixed strike price. …”
Get full text
Article -
16667
Blockchain-based hierarchical and multi-level smart service transaction supervision framework for crowdsourcing logistics
Published 2020-06-01“…In view of the security threats such as forgery,deception,privacy disclosure and non-traceability caused by the lack of transaction supervision for crowdsourcing logistics in the modern service industry,a blockchain-based hierarchical and multi-level smart service transaction supervision framework for crowdsourcing logistics was proposed.Firstly,the framework adopted the two-stage supervision system:one was the National Authorized Certification Center for the supervision of logistics service platform,the other was the logistics service platform for the supervision of crowdsourcing logistics participation.Later,under the framework of the supervision system,the functions of crowd contract,legal and anonymous identity authentication,intelligent transaction matching,anomaly data analysis and detection,privacy protection and traceability were realized.Then,through the security analysis and transaction supervision component software,the security controllability and operational efficiency of the transaction supervision architecture were verified.Finally,the software component was run on the real crowdsourcing logistics enterprise platform for the actual measurement.The measurement results show that the proposed hierarchical and multi-level smart service transaction supervision framework is safe and controllable.The framework can protect the privacy of users and data,prevent forgery and deception,and realize the auditability and traceability of behaviors and data of users.…”
Get full text
Article -
16668
A Holistic Digital Health Framework to Support Health Prevention Strategies in the First 1000 Days
Published 2025-01-01“…The framework provides recommendations for leveraging on behavioral intervention technology and digital therapeutics solutions augmented by artificial intelligence to support the effective deployment of health prevention programs to families. …”
Get full text
Article -
16669
Promoting Shared Metacognition in Online Learning: The Practices of Distributed Teaching Presence and the Relationships to Cognitive Presence
Published 2024-12-01“…We also found that students’ teaching presence behaviors were positively associated with peers’ cognitive presence and their own higher-level learning. …”
Get full text
Article -
16670
Rehabilitation Assessment and Treatment for Low Back Pain
Published 2023-08-01“…This study summarized the disease classification, epidemiology, etiology (muscle strength decline, lumbar disc degeneration, facet joint degeneration, nerve root and dorsal root ganglion lesions), influencing factors, rehabilitation assessment (medical history collection, pain assessment, physical dysfunction test, imaging examination, clinical efficacy evaluation, etc.) and rehabilitation treatment [drug therapy, exercise therapy (trunk muscle training, core stability training/motor control, McKenzie therapy, Pilates exercise, water exercise, sling exercise training), manual therapy (mobilization of the spine, thoracic mobilization, myofascial release techniques), physical modalities, behavioral therapy, traditional Chinese medicine rehabilitation therapy (traditional Chinese medicine/Chinese patent medicine, acupuncture, massage), epidural block]. …”
Get full text
Article -
16671
Application of chokeberry biochar as a modified additive to the vegetable lubricants: the tribological and rheological properties
Published 2025-02-01“…The research focused on assessing how this innovative additive influenced both the tribological and rheological behaviors of the resulting lubricants. The study evaluated the effects of chokeberry-derived biochar on the wear resistance and scuffing prevention properties of the vegetable-based greases. …”
Get full text
Article -
16672
DEMOCRACY AND THE FIGHT AGAINST LEADERSHIP CORRUPTION IN SUB-SAHARAN AFRICA: IMPLICATION FOR CONTINENTAL DEVELOPMENT
Published 2024-08-01“…As a result, the study contends that if citizens continue to tolerate unethical behaviors by political leaders, the governance crisis caused by misuse of public resources by political leadership will worsen insecurity and underdevelopment in Nigeria, West Africa. …”
Get full text
Article -
16673
A Numerical Study on the Progressive Failure of 3D Four-Directional Braided Composites
Published 2013-01-01“…The results indicate that the tensile mechanical behaviors of 3D braided composites are affected by both the yarn shear nonlinearity and the damage accumulation.…”
Get full text
Article -
16674
-
16675
Genealogical Etymology and its Use in Persian Language
Published 2018-08-01“…Nietzsche attempted to attribute the cause of the existence of moral generations to behaviors of social classes. Foucault, while tracking Nietzsche's work, created the concept of Geneology based on the recognition of the systematic breakdowns of generations with an inverted approach from today to the past. …”
Get full text
Article -
16676
De l’autre côté de la barrière. Franchir la frontière entre l’homme et l’animal avec le Roman de Renart
Published 2021-06-01“…I depart from the Roman de Renart, an Old French romance staging a gallery of anthropomorphized animals evolving alternatively through wilderness and domesticated spaces, while they constantly switch between human and bestial features and behaviors. I offer to read theory under the angle of medieval literature and, following the Renart’s authors’ invitation, to perceive the world through the eyes of a beast. …”
Get full text
Article -
16677
Identidade e futebol: um estudo sobre membros de uma torcida organizada
Published 2018-01-01“…Some of them find in supporters' groups a group within which they can share goals, behaviors, and ideas. This article aimed at comprehending how these supporters' organizations act in the personal, social and collective identity construction of Clube Atlético Mineiro's young supporters in Belo Horizonte city and metropolitan area, Brazil. …”
Get full text
Article -
16678
Impact-Rubbing Dynamics of Rotor with Hollow Shaft and Offset Discs Based on MDOF Timoshenko Beam Theory
Published 2024-01-01“…The research results indicate that the power turbine rotor with the hollow shaft on operation shows the various nonlinear dynamic behaviors including the multiperiod, quasi-period, jumping phenomenon, and chaotic motions; there exists an optimal gap between the rotor and the stator from the perspective of the efficiency and the dynamics; the optimal gap should make system avoid the resulting chaos or the quasi-period motion for the stability and safety of the machinery.…”
Get full text
Article -
16679
Rules and Beliefs of Relationship Permanence: Design and Validation of a Measure
Published 2018-01-01“…Based on the perspective of Diaz-Guerrero (2003) concerning beliefs, norms, and values that control feelings, thoughts, and behaviors involved in the development, maintenance and dissolution of couple relationships, the study was conducted to assess the historical socio-cultural premises regarding to relational permanence in such relationships. …”
Get full text
Article -
16680
Nyege Nyege Music Festival in Uganda: A Growing Leisure Activity with a Moral Dilemma
Published 2021“…Critics argue that Uganda being a strong cultural and religious conservative society should regulate (and restrict) leisure activities that deviate from the culturally and religiously acceptable moral behaviors and expectations. In this paper, we analyze the paradox of promoting Nyege Nyege music festival – a post-modern leisure practice within a morally sensitive environment. …”
Get full text
Article