Showing 15,581 - 15,600 results of 18,984 for search '"behaviorism"', query time: 0.09s Refine Results
  1. 15581

    Investigation on Fluid Flow Heat Transfer and Frictional Properties of Al2O3 Nanofluids Used in Shell and Tube Heat Exchanger by Debabrata Barik, Sreejesh S. R. Chandran, Milon Selvam Dennison, T. G. Ansalam Raj, K. E. Reby Roy

    Published 2023-01-01
    “…It is hence revealed that a suitable proportion of nanoparticles along with the base fluids can make remarkable changes in heat transfer and flow behavior of the entire system.…”
    Get full text
    Article
  2. 15582

    Teacher's Personality Competence in Improving Student Learning Manners by Singgih Kusworo, Zulham Zulham

    Published 2025-02-01
    “…Teachers are not only role models in attitude and behavior but also active in guiding students to instill adab values in everyday life. …”
    Get full text
    Article
  3. 15583

    Ophthalmomyiasis Case Caused by Two Blow Fly (Diptera: Calliphoridae) Species in North America by Taylor B. Parker, Kelly A. Meiklejohn, Gregory A. Dahlem, Ralph C. Eagle, Marius J. Heersink

    Published 2024-01-01
    “…Knowing these blow fly species can resort to this behavior, and that it can affect human populations, is valuable to the education of patients and providers.…”
    Get full text
    Article
  4. 15584

    Experimental Investigation of the Impact of Necking Position on Pile Capacity Assisted with Transparent Soil Technology by Qingnian Yang, Jianli Shao, Zhijun Xu, Yu Miao

    Published 2022-01-01
    “…The results show that the existence of necking does not change the bearing behavior of single pile as pile friction resistance. …”
    Get full text
    Article
  5. 15585

    Gas and Water Seepage of Tight Gas and Its Application in Well Production Analysis by Rui Zhang, Yang Gao, Yanbin Zhang, Peng Zhang, Xiaoli Pan, Wenjing Yang, Ligang Lv, Xingguan Chen

    Published 2023-01-01
    “…Figuring out gas and water seepage behaviors matters a lot for maximizing gas reservoir recovery. …”
    Get full text
    Article
  6. 15586

    EVALUATING LOYALTY IN SOUTH AFRICA’S HOTEL INDUSTRY: THE EFFECT OF SERVICE QUALITY AND BRAND EQUITY by Sharmila Ragunanan, Michael C. Cant, Johannes A. Wiid

    Published 2024-05-01
    “…These findings emphasize the importance of exceptional service experiences, robust brand equity, and understanding cultural nuances in consumer behavior, providing actionable insights for achieving a sustainable competitive advantage in the South African hotel industry. …”
    Get full text
    Article
  7. 15587

    A Survey of Nature-Inspired Meta-Heuristic Algorithms in Network Alignment by Anagh Awal, Farsuram Pandit

    Published 2024-09-01
    “…These algorithms, inspired by natural processes such as evolution, swarm behavior, and other biological phenomena, provide effective solutions for complex optimization problems. …”
    Get full text
    Article
  8. 15588

    IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions by ZHENG Yonghui, ZHAO Dongliang, GU Chunxiang, ZHANG Xieli

    Published 2024-08-01
    “…This enabled the exploration of deep protocol interaction behavior and state space. Utilizing the aforementioned methods, an IKE protocol stateful fuzz testing tool named IKEChecker was implemented, supporting testing of both IKEv1 and IKEv2 protocols. …”
    Get full text
    Article
  9. 15589
  10. 15590

    Next Generation Data Infrastructures: Towards an Extendable Model of the Asset Management Data Infrastructure as Complex Adaptive System by Paul Brous, Marijn Janssen, Paulien Herder

    Published 2019-01-01
    “…By adopting a CAS lens in the design, the resulting data infrastructure is extendable to deal with evolution of asset management data infrastructures in the face of new technologies and new requirements and to steadily exhibit new forms of emergent behavior. This paper concludes that asset management data infrastructures are inherently multilevel, consisting of subsystems, links, and nodes, all of which are interdependent in several ways.…”
    Get full text
    Article
  11. 15591

    Using ERA-5 LAND reanalysis rainfall data to better evaluate the performance of the regional shallow landslide early warning system of Piemonte (north-western Italy) in the context... by Valentina Botto, Davide Tiranti, Simona Barbarino, Christian Ronchi

    Published 2025-01-01
    “…To correctly understand how and whether climate change has influenced the behavior of shallow landslide events over the last century, it is essential to carefully identify the historical series of phenomena and their respective triggering causes, as well as to accurately select the most appropriate analytical tools to minimize the degree of uncertainty in statistical correlation of causes and effects. …”
    Get full text
    Article
  12. 15592

    Quantum complexity phase transitions in monitored random circuits by Ryotaro Suzuki, Jonas Haferkamp, Jens Eisert, Philippe Faist

    Published 2025-02-01
    “…Our results combine quantum complexity growth, phase transitions, and computation with measurements to help understand the behavior of monitored random circuits and to make progress towards determining the computational power of measurements in many-body systems.…”
    Get full text
    Article
  13. 15593
  14. 15594

    Quo Vadis: Anthropological Dimension of the Modern Civilization Crisis by V. M. Shapoval, I. V. Tolstov

    Published 2021-06-01
    “…New consciousness, since it is formed, will mark the transition to a new theoretical picture of the world and a model of human behavior, in which people will act, driven by proven knowledge, and not willfulness and prejudice. …”
    Get full text
    Article
  15. 15595

    The Evaluation of Various Restoration Techniques on Internal Adaptation of Composites in Class V Cavities by D. Dionysopoulos, C. Papadopoulos, E. Koliniotou-Koumpia

    Published 2014-01-01
    “…Different restoration techniques exhibit different behavior regarding internal adaptation to dentin after photopolymerization.…”
    Get full text
    Article
  16. 15596

    Estimation of Phenology Stages of Rapeseed Using Remote Sensing Vegetation Indices and Digital Camera Images Index by Akbar Mirahmadi, Hojjatollah Yazdan Panah, Mehdi Momeni

    Published 2024-03-01
    “…The Brightness index curve shows the inverse behavior to other curves. According to Pearsonchr('39')s correlation test, GCC index data are correlated with NDVI and Brightness index data .we used the ratio threshold, rate of change and first derivative methods, to estimate "start of season" and "end of season" and the results showed that the first derivative and ratio threshold methods with an average difference of 18 and 19 days in the "start of the season"  and the rate of change method, with an average difference of 8 days, has the best performance in estimating the “end of the season”. …”
    Get full text
    Article
  17. 15597

    Study on the Vibroimpact Response of the Particle Elastic Impact on the Metal Plate by Yang Yang, Lirong Wan

    Published 2019-01-01
    “…The conclusions will provide a theoretical calculation method for the medium vertical reciprocating impact and a theoretical basis for the setting of the damping term in Adams simulation and support the research basis for the study of the impact behavior between coal gangue particles and the metal plate.…”
    Get full text
    Article
  18. 15598

    Damage of Rock Mass by Double-Hole Blasting with Slit Charge and Development of Stress Wave under High In Situ Stress by Jianyu Zhang, Zegong Liu, Shigui Fu, Guodong Qiao

    Published 2022-01-01
    “…A theoretical analysis shows that, in blasting under ground stress conditions, at the near end of the blasting source, the loading stress does not increase sufficiently upon unloading, and the stress wave peak value decreases with the increase in ground stress, while the opposite behavior is obtained at the far end of the blasting source. …”
    Get full text
    Article
  19. 15599

    Nonintrusive Load Disaggregation Based on Attention Neural Networks by Shunfu Lin, Jiayu Yang, Yi Li, Yunwei Shen, Fangxing Li, Xiaoyan Bian, Dongdong Li

    Published 2025-01-01
    “…Recently, NILM has garnered significant attention as it can assist households in reducing energy usage and improving their electricity behaviors. In this paper, we propose a two-subnetwork model consisting of a regression subnetwork and a seq2point-based classification subnetwork for NILM. …”
    Get full text
    Article
  20. 15600

    Blockchain-based high transparent PKI authentication protocol by Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN

    Published 2022-08-01
    “…The public key infrastructure (PKI), as an significant component of the current Internet security infrastructure, guarantees the information transmission with the necessary authenticity, integrity, confidentiality and non-repudiation.However, the existing PKI also has shortcomings of excessive power of certification authority and difficulties in revoking and querying.Blockchain can be used to solve those problems by leveraging its advantages, such as decentralization, high transparency and flat structure.Furthermore, the ability and efficiency of the entire Internet to establish trust relationships may be improved.The transparent public key infrastructure (PKI) certification protocol based on the blockchain was proposed.The TS-PBFT algorithm was designed in the proposed protocol by adopting the threshold signature technology to the Practical Byzantine fault tolerance (PBFT) algorithm.The TS-PBFT algorithm reduced the communication overhead via reducing the communication complexity, strengthened the supervision via introducing external monitoring mechanism in the master node election of the view change protocol, and also improved the performance of the consensus mechanism via adding a batch processing mechanism.Moreover, a transparent blockchain-based PKI certification protocol was designed.The proposed protocol increased the security of certificate revocation and query, it also improved the efficiency of the certificate query by the introduction of counting bloom filters.Besides, the proposed protocol added audit function into the certificate lifecycle management.Accordingly, it can supervise the behavior of the certificate authority (CA), prompt it to improve security standards, and then achieve the purpose of limiting its authority.According to the security analysis and efficiency experiments, the proposed protocol was equipped with security properties, such as the resistance to spoofing certificate application attacks, and it achieved the best performance on TLS/SSL handshake time compared with existing PKI protocols.…”
    Get full text
    Article