Showing 301 - 320 results of 18,984 for search '"behaviorism"', query time: 0.14s Refine Results
  1. 301

    Dynamical behaviors of an Echinococcosis epidemic model with distributed delays by Kai Wang, Zhidong Teng, Xueliang Zhang

    Published 2017-09-01
    “…Furthermore, we analyze the dynamical behaviors of the model. The results show that the dynamical properties of the model is completely determined by $\mathcal{R}_0$. …”
    Get full text
    Article
  2. 302
  3. 303

    The Effect of Hidden Curriculum on the Behavior of Students in Physical Education by Parvin Samadi, Roqyye Heydari

    Published 2017-11-01
    “…The present study aimed at evaluating the impact of hidden curriculum on the behavior of students of physical education and high school students in Tehran. …”
    Get full text
    Article
  4. 304

    Investigation on Dynamic Recrystallization Behavior of Martensitic Stainless Steel by Facai Ren, Fei Chen, Jun Chen

    Published 2014-01-01
    “…The hot deformation behavior of X20Cr13 martensitic stainless steel was studied using the hot compression flow curves corresponding to the temperature range of 900–1150°C under strain rates from 0.01 to 10 s−1. …”
    Get full text
    Article
  5. 305

    An intelligent humidity sensing system for human behavior recognition by Huabin Yang, Qiming Guo, Guidong Chen, Yuefang Zhao, Meng Shi, Na Zhou, Chengjun Huang, Haiyang Mao

    Published 2025-01-01
    “…With the assistance of a machine learning algorithm, a behavior recognition system based on the humidity sensor has been constructed, enabling behavior states to be classified and identified with an accuracy of up to 96.2%. …”
    Get full text
    Article
  6. 306

    Fracture Propagation Behavior of Jointed Rocks in Hydraulic Fracturing by Xiaoxi Men, Jiren Li, Zhihui Han

    Published 2018-01-01
    “…A series of simulations is performed to understand the failure patterns and fracture propagation behavior of jointed rocks in hydraulic fracturing. …”
    Get full text
    Article
  7. 307
  8. 308
  9. 309
  10. 310

    Self-Presentation and Adolescent Altruistic Behaviors in Social Networks by Yaling Zhu, Yue Shen, Qiang Zhao

    Published 2020-01-01
    “…The results show the following: (1) Self-presentation in social networks can positively predict adolescent network altruistic behaviors. The positive prediction effect of network sharing is the largest, and the positive prediction effect of network support is the least. (2) Social ability cognition plays an intermediary role between self-presentation and adolescent network altruistic behaviors. (3) The moderating effect of privacy awareness is not significant.…”
    Get full text
    Article
  11. 311
  12. 312
  13. 313

    Hydrological Behavior of an Infiltration-Induced Landslide in Colorado, USA by Alexandra Wayllace, Barbara Thunder, Ning Lu, Aziz Khan, Jonathan W. Godt

    Published 2019-01-01
    “…This work presents a study of the hydrological behavior and its effects on the stability of an active landslide located on an embankment along Interstate-70 west of the Eisenhower Tunnel in central Colorado, USA. …”
    Get full text
    Article
  14. 314
  15. 315

    Neural Behavior Chain Learning of Mobile Robot Actions by Lejla Banjanovic-Mehmedovic, Dzenisan Golic, Fahrudin Mehmedovic, Jasna Havic

    Published 2012-01-01
    “…We propose Behavior Chain Model (BCM) in order to create a way of behavior learning. …”
    Get full text
    Article
  16. 316

    Intergenerational Transmission of Reproductive Behavior in Sweden, 1850-1889 by Paul Rotering

    Published 2017-11-01
    “…Bivariate correlations, event history analysis and Poisson regression models are estimated for a large number of indicators of reproductive behavior. In line with the literature, the findings show evidence of intergenerational fertility correlations. …”
    Get full text
    Article
  17. 317
  18. 318
  19. 319
  20. 320

    Research on Android malware detection based on permission and behavior by Xiao-min ZHANG, Jing LUI, Jun-xi ZHUANG, Ying-xu LAI

    Published 2017-03-01
    “…For the Android platform malicious application,a method of mapping behavior to privilege characteristics by combining static privilege feature analysis and dynamic behavior analysis was proposed,and association analysis algorithm was used to dig out the association rules between privilege features.Feature as a naive Bayesian classification algorithm input,a malicious application detection model was established.Finally,the experiment verify the effectiveness and accuracy of the method.…”
    Get full text
    Article