Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 2
- Internet in public administration 2
- Moral and ethical aspects 2
- Public administration 2
- Communication policy 1
- Government policy 1
- Internet 1
- Photography 1
- Prevention 1
- Psychological aspects 1
- Psychology 1
- Social aspects 1
- Technological innovations 1
- Telecommunication policy 1
- Terrorism 1
- Terrorists 1
- Visual communication 1
-
641
An Explanatory Study on User Behavior in Discovering Aggregated Multimedia Web Content
Published 2022-01-01Get full text
Article -
642
Sales through note-sharing: influences on the shopping behavior of “Xiaohongshu” users
Published 2025-05-01“…The purpose of this study is to investigate the factors influencing online purchase intention of the “Xiaohongshu” Sales through note-sharing model from a human-computer interaction standpoint, as well as the relationships between these factors. …”
Get full text
Article -
643
A Cloud User Anomaly Detection Method Based on Mouse Behavior
Published 2019-08-01Get full text
Article -
644
Dynamic behavior of a cable-stayed footbridge depending on the calculation accuracy
Published 2024-11-01“…There are many influences on the structure that can affect the dynamic behavior of the structure, including the non-linear behavior of the cable system. …”
Get full text
Article -
645
Students’ and teachers’ understanding of the WebCas questionnaire for assessing healthrelated behaviors
Published 2017-05-01“…The objective of this study was to verify students’ and teachers’ understanding of the WebCas questionnaire, which aims to assess health-related behaviors. This cross-sectional, descriptive and exploratory survey used the qualitative technique of focus groups with 24 students and 6 teachers. …”
Get full text
Article -
646
A Systematic Review of Sensor-Based Methods for Measurement of Eating Behavior
Published 2025-05-01Get full text
Article -
647
Impact of delivery and private Riders' roles on safety behavior in Marrakech Morocco
Published 2025-06-01Get full text
Article -
648
Dynamics Behavior Analysis of Parallel Mechanism with Joint Clearance and Flexible Links
Published 2018-01-01“…In this study, the dynamics behaviors analysis of parallel mechanism considering joint clearance and flexible links are investigated using a computational methodology. …”
Get full text
Article -
649
Pattern mining and prediction techniques for user behavioral trajectories in e-commerce.
Published 2025-01-01Get full text
Article -
650
Abnormal Behavior Detection Using Trajectory Analysis in Camera Sensor Networks
Published 2013-12-01“…In view of the limited power and computational capability of the camera nodes, the paper presents an abnormal behavior detection approach which is convenient and available for camera sensor networks. …”
Get full text
Article -
651
A Multi-Modal Dataset for Teacher Behavior Analysis in Offline Classrooms
Published 2025-07-01Get full text
Article -
652
Male bluegill vary in color and behavior relative to their position in a lek
Published 2025-01-01“…We hypothesize that territorial position within the colony results in different body colors and behavioral profiles. To test this hypothesis, we quantified color patterns in wild communities of bluegill using computer vision, scored the behavior of lek occupying parental males, and categorically classified lek position as a function of neighboring males. …”
Get full text
Article -
653
On the use of the stepped isostress method in the prediction of creep behavior of polyamide 6
Published 2022-10-01“…The stepped isostress method (SSM) is an advanced technique which allows the prediction of the long-term behavior and enables the construction of creep master curves of materials with short-term experimental tests. …”
Get full text
Article -
654
-
655
On the use of the stepped isostress method in the prediction of creep behavior of polyamide 6
Published 2022-09-01“… The stepped isostress method (SSM) is an advanced technique which allows the prediction of the long-term behavior and enables the construction of creep master curves of materials with short-term experimental tests. …”
Get full text
Article -
656
Discovering structural cis‐regulatory elements by modeling the behaviors of mRNAs
Published 2009-04-01Get full text
Article -
657
Predictors of evacuation behavior: dataset on respondents’ route choice and web interaction
Published 2025-01-01“…Abstract Empirical data on human evacuation behavior are invaluable for adjusting and training computational algorithms that simulate evacuation processes, including agent-based modeling. …”
Get full text
Article -
658
Profiling consumers’ online shopping and following social media influencers behaviors
Published 2024-04-01“…First, educational level, income, and age category are the important predictors for consumers’ buying things online using a desktop or laptop computer behavior. Second, age category, geographic location (urban, suburban, rural) are the predictors for consumers’ buying things online using a smartphone behavior. …”
Get full text
Article -
659
Dynamic Behaviors of a Discrete Periodic Predator-Prey-Mutualist System
Published 2015-01-01Get full text
Article -
660
User authentication of industrial internet based on HHT transform of mouse behavior
Published 2022-06-01“…The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.…”
Get full text
Article