Showing 16,341 - 16,360 results of 18,984 for search '"behaviorism"', query time: 0.11s Refine Results
  1. 16341

    Modelling and Simulation of Pico- and Nano-Grids for Renewable Energy Integration in a Campus Microgrid by Kuan Tak Tan, Sivaneasan Bala Krishnan, Andy Yi Zhuang Chua

    Published 2024-12-01
    “…This paper examines the operational behavior of both pico- and nano-grids during transitions between grid-connected and islanded modes. …”
    Get full text
    Article
  2. 16342
  3. 16343

    Mechanisms for dysregulation of excitatory-inhibitory balance underlying allodynia in dorsal horn neural subcircuits. by Alexander G Ginsberg, Scott F Lempka, Bo Duan, Victoria Booth, Jennifer Crodelle

    Published 2025-01-01
    “…By accounting for experimentally-observed responses under healthy conditions, we specify model parameters defining populations of subcircuits that yield typical behavior under normal conditions. Then, we implement a sensitivity analysis approach to identify the mechanisms most likely to cause allodynia-producing dysregulation of the subcircuit's E-I signaling. …”
    Get full text
    Article
  4. 16344

    DIGITALIZATION AND ESG SYNERGIES. TRANSFORMING REGIONAL DEVELOPMENT THROUGH CORPORATE ACTIONS by SPULBAR LUCIAN FLORIN, MITRACHE DANIEL MARIUS, MITRACHE LAVINIA ADELINA

    Published 2024-12-01
    “…This article delves into potential risks, such as data privacy issues, digital divides, and the need for stronger regulatory frameworks to guide corporate behavior. It emphasizes that meaningful corporate contributions to regional development require collaboration with governments, NGOs, and local stakeholders. …”
    Get full text
    Article
  5. 16345

    Mobile robot navigation path algorithm in 3d industrial internet of thing (iot) environment based on 5g mobile communication by Pei Ping, Yu. N. Petrenko

    Published 2019-07-01
    “…It implicitly indicates the behavior of machine-to-machine communications. Each of industrial IoT as service domains has its own communication requirements that are measured differently in both such as reliability, Quality of service (QoS), and privacy. …”
    Get full text
    Article
  6. 16346

    Contributions of Hope in physical activity and exercise goal attainment in college students by Corinthian E. B. Blythe, Hayami H. Nishio, Alyssa Wright, Perla Flores, Kevin L. Rand, Kelly M. Naugle

    Published 2025-01-01
    “…Research shows that psychological constructs impact behavior and goal attainment. However, little is known regarding the effect of psychological variables on PA levels in students. …”
    Get full text
    Article
  7. 16347
  8. 16348

    Textural, Color, and Sensory Analysis of Cookies Prepared with Hemp Oil-Based Oleogels by Ana Leahu, Cristina Ghinea, Sorina Ropciuc, Cristina Damian

    Published 2025-01-01
    “…The values of the elastic component (G′) and the viscous component (G″) increased, which means that the oleogels used affected the rheological behavior at 25 °C, causing an increase in the dough consistency. …”
    Get full text
    Article
  9. 16349

    Model OLD0: A Physical Parameterization for Clear-Sky Downward Longwave Radiation by Juan Carlos Ceballos, Diego Pereira Enoré, Jaidete Monteiro de Souza, Francisco Luiz Leitão de Mesquita

    Published 2025-01-01
    “…Clouds modulate its behavior, and clear-sky DLF0 is predominant in composition of the final DLF value. …”
    Get full text
    Article
  10. 16350

    The Effects of a Web-Based Need-Supportive Intervention for Physical Education Teachers on Students’ Physical Activity and Related Outcomes: A Randomized Controlled Trial by Hasso Paap, Andre Koka, Pille-Riin Meerits, Henri Tilga

    Published 2025-01-01
    “…Conclusions: Consequently, the web-based need-supportive intervention was effective in promoting need-supportive teacher behavior. As the developed training for PE teachers increased students’ perceptions of need support from their PE teachers, it holds promise for future PE teacher education. …”
    Get full text
    Article
  11. 16351
  12. 16352

    5G-based smart airport network security scheme design and security analysis by Xinxin XING, Qingya ZUO, Jianwei LIU

    Published 2023-10-01
    “…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
    Get full text
    Article
  13. 16353

    Effect of Blade Number on Internal Flow and Performance Characteristics in Low-Head Cross-Flow Turbines by Ephrem Yohannes Assefa, Asfafaw Haileselassie Tesfay

    Published 2025-01-01
    “…Previous studies have identified poor flow profiles as a significant factor contributing to inefficiency, with the number of blades playing a critical role in the flow behavior, efficiency, and structural stability. This study employed numerical simulations to analyze how varying the number of blades affects the internal flow characteristics and performance of the turbine at, and off, its best operating points. …”
    Get full text
    Article
  14. 16354

    Testing Students’ Entrepreneurial Self-Efficacy as an Early Predictor of Entrepreneurial Activities. Evidence From the SEAS Project by Krzysztof Zięba, Jakub Golik

    Published 2018-01-01
    “…One of the research conclusions is that ESE manifested by student-beginners seems to influence their later entrepreneurial behavior in a statstcally signifcant way - potentally making ESE a valuable early predictor of future entrepreneurial actvites. …”
    Get full text
    Article
  15. 16355
  16. 16356

    Guarantees for Exercising and Protecting the Property Right of Internally Displaced Persons by Z. I. Knysh

    Published 2020-12-01
    “…The difference between the content of a subjective right and its realization is, first of all, that the content of a subjective right covers only the possible behavior of an authorized person, and the realization of the right is a real, concrete action that leads to legal consequences. …”
    Get full text
    Article
  17. 16357

    An Effective Phytoconstituent Aconitine: A Realistic Approach for the Treatment of Trigeminal Neuralgia by Dilek Çankal, Esra Küpeli Akkol, Yeliz Kılınç, Mert İlhan, Raffaele Capasso

    Published 2021-01-01
    “…After the neuropathic pain developed, the rats were assigned to one of the treatment groups: carbamazepine 40 or 80 mg/kg; aconitine 0.25, 0.50, or 0.75 mg/kg; or saline injection (control group). Behavioral testing with von Frey filaments and the rotarod test were carried out before the surgical procedure and on the 24th to 29th postoperative days. …”
    Get full text
    Article
  18. 16358

    The role of temporary architecture in the historical environment: Baghdad city/historic Saray axis—A case study by Mahmood Hussein Al-Musawi, Safaaaldeen Hussein Ali

    Published 2025-01-01
    “…From this research, we conclude that temporary architecture is important as a strategy for stimulation and experimentation in the historical environment, advocating for a blend of strategies to attract different behaviors to the historical surroundings.…”
    Get full text
    Article
  19. 16359

    An Analysis of Habitual Mode Use in the Years of Rising Oil Prices by Chansung Kim, Woo-Yung Kim, Jiyoung Park

    Published 2019-01-01
    “…Our results indicate that despite the rise of oil prices, behavior of habitual use (i.e., state dependence) of transportation modes is found in all three modes. …”
    Get full text
    Article
  20. 16360

    Creation of Beta Crystal Structure in Random Polypropylene with the Help of Pimelic Acid-Based Nucleator: the Role of Nucleator Addition Method and the Presence of Isotactic Polypr... by H. Ghorbani, R. Bagheri

    Published 2024-12-01
    “…Tensile and impact tests were performed to examine the mechanical behavior of the samples. According to the differential scanning calorimetry and X-ray diffraction tests, it was observed that the sample made by adding 4 wt. % isotactic polypropylene has the highest amount of beta phase (67 and 72% in each test, respectively). …”
    Get full text
    Article