Showing 17,361 - 17,380 results of 18,984 for search '"behavior"', query time: 0.12s Refine Results
  1. 17361
  2. 17362
  3. 17363

    Expanding Ethical Horizons: Rethinking the Ethics of <i>De</i> 德 and <i>Guṇa</i> in the <i>Laozi</i> 老子 and <i>Bhagavad-Gītā</i> by Pritam Saha

    Published 2025-01-01
    “…We will also seek to discover the interplay of <i>de</i> and/with the <i>dao</i> in the <i>Laozi</i> and that among the three <i>guṇas</i> in the <i>Gītā</i> from the perspective of human behaviors. In the conclusion, we will provide a comparative discussion of our findings on the ethics of <i>de</i> and <i>guṇa</i> in the <i>Laozi</i> and the <i>Gītā</i>. …”
    Get full text
    Article
  4. 17364

    Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis by Ridho Surya Kusuma, Muhammad Dirga Purnomo Putra

    Published 2025-01-01
    “…This analysis used six stages: Initialization, decompilation, static analysis, code reversing, behavioral analysis, and reporting. This research underscores the power of reverse engineering as a valuable tool for deconstructing the functionalities of Android malware. …”
    Get full text
    Article
  5. 17365

    Friendship, joy, and physical fitness of elementary school students: outcome-based macro evaluation of physical education in Madura Island by Arief Wildan Jufri, Sakban Rosidi, Titik Purwati

    Published 2023-11-01
    “…According to hedonism theory, behavioral learning theory, and perceptual theory, humans always seek and repeat any action that gives pleasure. …”
    Get full text
    Article
  6. 17366

    „Tyłek nie szklanka” – o popularności kar cielesnych w wychowaniu by Ewa Jarosz, Cezary Kurkowski

    Published 2018-05-01
    “…In the light of several indicators that show: the level of social acceptance of violent behaviors in relationship with a child, treating beating children a method of child rising and social awareness of the ban of corporal punishment and the assessment of the law as well as attitudes to others actions, the paper presents considerations about the level of the social acceptance of violence against children, which is seen in Poland and on that ground also rather sad conclusions about the risk of the use of violence in everyday raising practice but also a risk of violence toward a child in its serious forms that harm to health and life of a child. …”
    Get full text
    Article
  7. 17367

    Robust identification method of website fingerprinting against disturbance by ZHANG Jingxi, LI Tengyao, TU Yukuan, LUO Xiangyang

    Published 2024-12-01
    “…It is essential in tracking users’ anonymous access behaviors and improving the anonymous traffic governance, especially on Tor network flows. …”
    Get full text
    Article
  8. 17368
  9. 17369

    Transcriptomic analysis of male diamondback moth antennae: Response to female semiochemicals and allyl isothiocyanate. by Yueqin Zheng, Qianxia Liu, Houjun Tian, Hui Wei

    Published 2024-01-01
    “…These findings indicate significant changes in ODE expression levels, providing a molecular foundation for identifying potential targets for behavioral inhibitors.…”
    Get full text
    Article
  10. 17370

    EXPLORING THE TEMOKAN TRADITION IN JAVANESE WEDDINGS: AN ANTHROPOLINGUISTIC APPROACH by Nanda Ramadhayani, Alemina br Perangin-angin, Rozanna Mulyani

    Published 2024-12-01
    “…Norms such as etiquette, customary practices, legal expectations, and habitual behaviors further reflect the tradition's cultural significance. …”
    Get full text
    Article
  11. 17371

    Early Maladaptive Schemas in Depressed Women and Its Relationship with Depression by Hacer Bolat KONUKÇU, Serkan AKKOYUNLU, M. Hakan TÜRKÇAPAR

    Published 2013-07-01
    “…Objective: Objective: Schemas are deep enduring cognitive structures that are the source of dysfunctional cognitions, emotions and behaviors, activate after critical incidents in depression. …”
    Get full text
    Article
  12. 17372

    Preparation and Characterization of Chitosan/Feldspar Biohybrid as an Adsorbent: Optimization of Adsorption Process via Response Surface Modeling by Maryam Yazdani, Hajir Bahrami, Mokhtar Arami

    Published 2014-01-01
    “…In addition, the results of adsorption behaviors of the dye illustrated that the adsorption process followed the Langmuir isotherm model and the pseudo-second-order kinetic model. …”
    Get full text
    Article
  13. 17373

    Multiple redundant flow fingerprint model based on time slots by Kexian LIU, Jianfeng GUAN, Wancheng ZHANG, Zhikai HE, Dijia YAN

    Published 2023-02-01
    “…With the increasingly widespread use of the Internet, various network security problems are frequently exposed, while the “patching” style security enhancement mechanisms cannot effectively prevent the growing security risks.The researchers in the field of network security believe that the future Internet architecture should take security as a basic attribute to provide the native security support which is also called as endogenous safety and security.In order to support the data trustworthiness of endogenous security, a time-slot based multiple redundant flow fingerprint model was designed and implemented based on the research of the watermark (or fingerprint) mechanism.The proposed model used only three time slot intervals and operated the packets within the specified time slots, so that the fingerprint can be embedded without conflicting with the adjacent bit operations.Redundant coding was introduced to improve the fingerprint robustness, and the behaviors such as jitter or malicious disruptions by attackers in the network were considered.Furthermore, the impacts of delayed interference, spam packet interference and packet loss interference were analyzed.The analytical results show that the robustness of the fingerprint model improves with increasing redundant bits when the packet distribution in the network stream is given.Besides, in order to reduce the consumption of time and space and improve the efficiency and accuracy of packet operations, a flow fingerprinting prototype system was designed and implemented based on the kernel, and its efficiency and robustness were evaluated.The experimental result show that the model has high robustness.Additionally, the application scenario of the model was elaborated, which can effectively detect man-in-the-middle attacks and prevent network identity spoofing with the help of the flow fingerprinting model.…”
    Get full text
    Article
  14. 17374

    Obsessive beliefs in generalized anxiety disorder by Guliz Senormanci, Ramazan Konkan, Omer Senormanci

    Published 2017-12-01
    “…The perfectionism/intolerance of uncertainty may contribute to development and persistence of GAD symptoms and evaluation and development of approaches to change these beliefs may improve results of cognitive behavioral therapy in GAD patients. [JCBPR 2017; 6(3.000): 115-122]…”
    Get full text
    Article
  15. 17375

    Family Support and Psychological Adaptation (Letting-Go) in Primipara Post-partum by Nur Azizah Bawafi, Rahajeng Siti Nur Rahmawati, Lumastri Ajeng Wijayanti

    Published 2024-04-01
    “…The moms' emotional, intellectual, and behavioral disorders are triggered by their awareness of their guilt. …”
    Get full text
    Article
  16. 17376

    Assessment of Staff’s Knowledge, Attitude, and Practice on Radiation Protection Measures in Mazandaran Province, Iran by Danial Seifi, Alireza Khorrami

    Published 2025-01-01
    “… Purpose: Ionizing radiation in medical imaging is one of the dominant diagnostic tools, and also correct knowledge of radiation protection affects staff safety behaviors during examinations. This study highlights the radiation protection Knowledge, Attitude, and Practice (KAP) amongst a large number of hospitals and medical centers in Mazandaran province of Iran. …”
    Get full text
    Article
  17. 17377

    Attention Deficit Hyperactivity Disorder in Girls and the Risk of Unplanned Pregnancies by Florina Rad, Alexandra Mariana Buică, Nicolae Gică

    Published 2025-01-01
    “…Conclusions: In this review, we emphasize the importance of predisposing factors for risky sexual behaviors and unplanned pregnancies in cases of girls with ADHD. …”
    Get full text
    Article
  18. 17378

    Asesmen Potential Review pada Pegawai PT. ZYX by Ahmad Robeth Felasufia Naoval, Endah Mastuti

    Published 2025-01-01
    “…Pengumpulan data pada penelitian ini menggunakan metode tes (alat tes psikologi) dan non tes (behavioral event interview). Data dianalisis menggunakan analisis deskriptif dan analisis kualitatif. …”
    Get full text
    Article
  19. 17379

    Ruminative Response Styles and Metacognitions in Internet Addicts by &Ouml;mer &THORN;ENORMANCI, Ramazan KONKAN, Oya G&Uuml;&Ccedil;L&Uuml;, G&uuml;liz &THORN;ENORMANCI

    Published 2013-12-01
    “…Objective: Although cognitive behavioral model of Internet addiction has been well described, studies on metacognitions and ruminative response styles related with Internet addiction are very limited. …”
    Get full text
    Article
  20. 17380

    Challenges in rural maternal health: how received public services and policy awareness affect health knowledge and practices by Jie Yang, Jun Chen, Yuyang Xie, Yunjie Liu, Junhao Wu, Yangyuan Li, Jingchun Nie

    Published 2025-01-01
    “…Data were collected through structured face-to-face interviews, covering health knowledge and behaviors. Statistical analyses were performed to assess the impact of maternal health services.ResultsBoth received public services (Coefficient: 0.130, 95% CI: 0.015–0.246) and policy awareness (Coefficient: 0.114, 95% CI: 0.001–0.227) significantly improved nutrition and health knowledge but had limited impact on prenatal checkups or health outcomes. …”
    Get full text
    Article