نتایج جستجو برای: normal behaviour
تعداد نتایج: 731457 فیلتر نتایج به سال:
objectives: the aim of present study was to evaluate some effects of crinum zeylanicum (c. zeylanicum) on central nervous system. materials and methods: c. zeylanicum methanolic bulb extract (250-1000 mg/kg orally), 2 mg chlorpromazine and 4 mg diazepam /kg body weight intraperitoneally respectively were tested in mice using irwin test, pentobarbitone-induced sleep test, spontaneous motor activ...
Eating rate and bite size are important factors affecting food intake, and we hypothesise the underlying role of oral sensory exposure in this. However, the latter currently lacks objective measuring parameters, but an interesting measure could be the extent of in vivo retro-nasal aroma release. Second, the literature is ambiguous about overweight subjects differing from normal-weight subjects ...
In this paper we present a framework in which issues such as mobility and security in the presence of firewalls can be studied. The framework is based on a simple language where mobility is expressed as atomic actions and the behaviour of a firewall is described as logical formulae. We also separate the role of co-ordinators from normal user processes. Co-ordinators can reconfigure firewalls ba...
background: due to difficulty of obtaining a 24h urine (especially in children), a random urine calcium sample is recommended to detect of hypercalciuria. however, recent studies have shown that the urinary calcium/creatinine ratio varies with age and geographic areas. so, the aim of this study was determining the normal value of urinary calcium to creatinine ratio in healthy adolescent’s child...
چکیده ندارد.
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the immune system. The behaviour of human DCs is abstracted to form an algorithm suitable for anomaly detection. We test this algorithm on the real-time problem of port scan detection. Our results show a significant difference in artificial DC behaviour for an outgoing portscan when compared to beh...
let x1;x2;...;xn have a jointly multivariate exchangeable normal distribution. in this work we investigate another proof of the independence of x and s2 using order statistics. we also assume that (xi ; yi); i =1; 2;...; n; jointly distributed in bivariate normal and establish the independence of the mean and the variance of concomitants of order statistics.
This paper presents a method to capture semantic information from design protocols independently of the number of participants. The paper reports on a preliminary study that analyses a design protocol by using the FBS ontology and derives processes within this ontological framework by employing linkography. The usefulness of this method is examined by applying it to the DTRS7 Engineering 1 prot...
There is little consensus about how behaviour change specialists should go about choosing from the large number of available approaches that which is most likely to make their program effective. Here we engage in a systematic consolidation, classifying approaches into four categories, based on their explanatory goals: Psychological approaches focus on the proximate psychological determinants of...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید