Search alternatives:
commuting » competing (Expand Search)
Showing 7,181 - 7,200 results of 7,907 for search '(commuting OR computing) behavior', query time: 0.17s Refine Results
  1. 7181

    Hot wormholes and chaos dynamics in a two-coupled SYK model by Martí Berenguer, Javier Mas, Juan Santos-Suárez, Alfonso V. Ramallo

    Published 2025-03-01
    “…Our results uncover a rich structure within this phase, including both thermal and non-thermal solutions. These behaviors are analyzed in detail, with partial insights provided by the Schwarzian approximation, which captures certain but not all aspects of the observed dynamics.…”
    Get full text
    Article
  2. 7182

    Mode Locking, Farey Sequence, and Bifurcation in a Discrete Predator-Prey Model with Holling Type IV Response by Yun Liu, Xijuan Liu

    Published 2025-05-01
    “…The study employs the normal form approach and bifurcation theory to explore codimension-one and two bifurcation behaviors for this model. The primary conclusions are substantiated by a combination of rigorous theoretical analysis and meticulous computational simulations. …”
    Get full text
    Article
  3. 7183

    Multi-objective optimization of rural water supply system by W.T.P. Silva, L.T.Q. Vieira, D.M.S. Rosa, M.M. Campos, A.A. Santos, M.A.A. Souza

    Published 2016-10-01
    “…Lack of water in water supply systems forces people to take risk behaviors to health, which is very common in rural water supply systems (WSS-rural). …”
    Get full text
    Article
  4. 7184
  5. 7185

    Multi-Biometric Feature Extraction from Multiple Pose Estimation Algorithms for Cross-View Gait Recognition by Ausrukona Ray, Md. Zasim Uddin, Kamrul Hasan, Zinat Rahman Melody, Prodip Kumar Sarker, Md Atiqur Rahman Ahad

    Published 2024-11-01
    “…Gait recognition is a behavioral biometric technique that identifies individuals based on their unique walking patterns, enabling long-distance identification. …”
    Get full text
    Article
  6. 7186

    Diagnosing autism spectrum disorders using a double deep Q-Network framework based on social media footprints by Nesren S. Farhah, Nesren S. Farhah, Ahmed Abdullah Alqarni, Ahmed Abdullah Alqarni, Nadhem Ebrahim, Sultan Ahmad, Sultan Ahmad

    Published 2025-08-01
    “…This research used Twitter as the primary data source to examine the behavioral traits and immediate emotional expressions of persons with ASD. …”
    Get full text
    Article
  7. 7187
  8. 7188
  9. 7189
  10. 7190

    An radio-frequency identification security authentication mechanism for Internet of things applications by Zhen-Yu Wu

    Published 2019-07-01
    “…However, the personal information and privacy exposure, malicious tracking, and counterfeiting behaviors remain the unresolved issues in the security area. …”
    Get full text
    Article
  11. 7191
  12. 7192
  13. 7193
  14. 7194
  15. 7195
  16. 7196
  17. 7197
  18. 7198
  19. 7199
  20. 7200