Suggested Topics within your search.
Suggested Topics within your search.
- Organizational behavior 8
- Management 7
- Animal behavior 5
- Moral and ethical aspects 5
- Psychological aspects 5
- Social aspects 5
- Psychology 4
- Attitude to Health 3
- Behavioral Medicine 3
- Health behavior 3
- Information technology 3
- Organizational Behavior 3
- Animal ecology 2
- Consumer behavior 2
- Economics 2
- Internet in public administration 2
- Music 2
- Public administration 2
- Quality of life 2
- Social conditions 2
- Social problems 2
- Social sciences--Data processing 2
- methods 2
- Academic achievement 1
- Agricultural innovations 1
- Animal breeding 1
- Animal population genetics 1
- Animal welfare 1
- Behavior modification 1
- Business communication 1
-
17361
-
17362
-
17363
Expanding Ethical Horizons: Rethinking the Ethics of <i>De</i> 德 and <i>Guṇa</i> in the <i>Laozi</i> 老子 and <i>Bhagavad-Gītā</i>
Published 2025-01-01“…We will also seek to discover the interplay of <i>de</i> and/with the <i>dao</i> in the <i>Laozi</i> and that among the three <i>guṇas</i> in the <i>Gītā</i> from the perspective of human behaviors. In the conclusion, we will provide a comparative discussion of our findings on the ethics of <i>de</i> and <i>guṇa</i> in the <i>Laozi</i> and the <i>Gītā</i>. …”
Get full text
Article -
17364
Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
Published 2025-01-01“…This analysis used six stages: Initialization, decompilation, static analysis, code reversing, behavioral analysis, and reporting. This research underscores the power of reverse engineering as a valuable tool for deconstructing the functionalities of Android malware. …”
Get full text
Article -
17365
Friendship, joy, and physical fitness of elementary school students: outcome-based macro evaluation of physical education in Madura Island
Published 2023-11-01“…According to hedonism theory, behavioral learning theory, and perceptual theory, humans always seek and repeat any action that gives pleasure. …”
Get full text
Article -
17366
„Tyłek nie szklanka” – o popularności kar cielesnych w wychowaniu
Published 2018-05-01“…In the light of several indicators that show: the level of social acceptance of violent behaviors in relationship with a child, treating beating children a method of child rising and social awareness of the ban of corporal punishment and the assessment of the law as well as attitudes to others actions, the paper presents considerations about the level of the social acceptance of violence against children, which is seen in Poland and on that ground also rather sad conclusions about the risk of the use of violence in everyday raising practice but also a risk of violence toward a child in its serious forms that harm to health and life of a child. …”
Get full text
Article -
17367
Robust identification method of website fingerprinting against disturbance
Published 2024-12-01“…It is essential in tracking users’ anonymous access behaviors and improving the anonymous traffic governance, especially on Tor network flows. …”
Get full text
Article -
17368
-
17369
Transcriptomic analysis of male diamondback moth antennae: Response to female semiochemicals and allyl isothiocyanate.
Published 2024-01-01“…These findings indicate significant changes in ODE expression levels, providing a molecular foundation for identifying potential targets for behavioral inhibitors.…”
Get full text
Article -
17370
EXPLORING THE TEMOKAN TRADITION IN JAVANESE WEDDINGS: AN ANTHROPOLINGUISTIC APPROACH
Published 2024-12-01“…Norms such as etiquette, customary practices, legal expectations, and habitual behaviors further reflect the tradition's cultural significance. …”
Get full text
Article -
17371
Early Maladaptive Schemas in Depressed Women and Its Relationship with Depression
Published 2013-07-01“…Objective: Objective: Schemas are deep enduring cognitive structures that are the source of dysfunctional cognitions, emotions and behaviors, activate after critical incidents in depression. …”
Get full text
Article -
17372
Preparation and Characterization of Chitosan/Feldspar Biohybrid as an Adsorbent: Optimization of Adsorption Process via Response Surface Modeling
Published 2014-01-01“…In addition, the results of adsorption behaviors of the dye illustrated that the adsorption process followed the Langmuir isotherm model and the pseudo-second-order kinetic model. …”
Get full text
Article -
17373
Multiple redundant flow fingerprint model based on time slots
Published 2023-02-01“…With the increasingly widespread use of the Internet, various network security problems are frequently exposed, while the “patching” style security enhancement mechanisms cannot effectively prevent the growing security risks.The researchers in the field of network security believe that the future Internet architecture should take security as a basic attribute to provide the native security support which is also called as endogenous safety and security.In order to support the data trustworthiness of endogenous security, a time-slot based multiple redundant flow fingerprint model was designed and implemented based on the research of the watermark (or fingerprint) mechanism.The proposed model used only three time slot intervals and operated the packets within the specified time slots, so that the fingerprint can be embedded without conflicting with the adjacent bit operations.Redundant coding was introduced to improve the fingerprint robustness, and the behaviors such as jitter or malicious disruptions by attackers in the network were considered.Furthermore, the impacts of delayed interference, spam packet interference and packet loss interference were analyzed.The analytical results show that the robustness of the fingerprint model improves with increasing redundant bits when the packet distribution in the network stream is given.Besides, in order to reduce the consumption of time and space and improve the efficiency and accuracy of packet operations, a flow fingerprinting prototype system was designed and implemented based on the kernel, and its efficiency and robustness were evaluated.The experimental result show that the model has high robustness.Additionally, the application scenario of the model was elaborated, which can effectively detect man-in-the-middle attacks and prevent network identity spoofing with the help of the flow fingerprinting model.…”
Get full text
Article -
17374
Obsessive beliefs in generalized anxiety disorder
Published 2017-12-01“…The perfectionism/intolerance of uncertainty may contribute to development and persistence of GAD symptoms and evaluation and development of approaches to change these beliefs may improve results of cognitive behavioral therapy in GAD patients. [JCBPR 2017; 6(3.000): 115-122]…”
Get full text
Article -
17375
Family Support and Psychological Adaptation (Letting-Go) in Primipara Post-partum
Published 2024-04-01“…The moms' emotional, intellectual, and behavioral disorders are triggered by their awareness of their guilt. …”
Get full text
Article -
17376
Assessment of Staff’s Knowledge, Attitude, and Practice on Radiation Protection Measures in Mazandaran Province, Iran
Published 2025-01-01“… Purpose: Ionizing radiation in medical imaging is one of the dominant diagnostic tools, and also correct knowledge of radiation protection affects staff safety behaviors during examinations. This study highlights the radiation protection Knowledge, Attitude, and Practice (KAP) amongst a large number of hospitals and medical centers in Mazandaran province of Iran. …”
Get full text
Article -
17377
Attention Deficit Hyperactivity Disorder in Girls and the Risk of Unplanned Pregnancies
Published 2025-01-01“…Conclusions: In this review, we emphasize the importance of predisposing factors for risky sexual behaviors and unplanned pregnancies in cases of girls with ADHD. …”
Get full text
Article -
17378
Asesmen Potential Review pada Pegawai PT. ZYX
Published 2025-01-01“…Pengumpulan data pada penelitian ini menggunakan metode tes (alat tes psikologi) dan non tes (behavioral event interview). Data dianalisis menggunakan analisis deskriptif dan analisis kualitatif. …”
Get full text
Article -
17379
Ruminative Response Styles and Metacognitions in Internet Addicts
Published 2013-12-01“…Objective: Although cognitive behavioral model of Internet addiction has been well described, studies on metacognitions and ruminative response styles related with Internet addiction are very limited. …”
Get full text
Article -
17380
Challenges in rural maternal health: how received public services and policy awareness affect health knowledge and practices
Published 2025-01-01“…Data were collected through structured face-to-face interviews, covering health knowledge and behaviors. Statistical analyses were performed to assess the impact of maternal health services.ResultsBoth received public services (Coefficient: 0.130, 95% CI: 0.015–0.246) and policy awareness (Coefficient: 0.114, 95% CI: 0.001–0.227) significantly improved nutrition and health knowledge but had limited impact on prenatal checkups or health outcomes. …”
Get full text
Article