نتایج جستجو برای: outflow intrusions
تعداد نتایج: 23227 فیلتر نتایج به سال:
Individuals with current major depression were interviewed to investigate the prevalence of distressing intrusive mental imagery among depressed patients and study the phenomenology of these intrusions. Of the 39 currently depressed patients, 17 experienced some form of repetitive intrusive imagery (i.e., either an intrusive memory or image), with intrusive memories being more common than image...
Two experiments compared episodic word-list recall of young and older adults. In Experiment 1, using standard free-recall procedures, older adults recalled significantly fewer correct items and made significantly more intrusions (recall of items that had not appeared on the target list) than younger adults. In Experiment 2, we introduced a new method, called externalized free recall, in which p...
Two experiments examined the construct of causal knowledge structure (CKS) in a social setting. The content, memorial properties, and judgmental consequences of subjects' CKSs regarding the defection of either Soviet citizens to the United States or American citizens to the Soviet Union were assessed through open-ended causal accounts (Experiment 1), intrusions in free recall, unsolicited attri...
Do-Chah metamorphic-igneous complex is one of the Iranian crystalline basement complexess which is located in the SE Shahrood in northern edge of Central Iran structural zone. This complex includes a wide compositional range of metamorphic rocks such as metabasite, metapelite, metacarbonate and metapsammite, and meanwhile is host of leucogranite and biotite granite intrusions. Protolith of meta...
The studied intrusions with parallel northwest – southeast trend, are located in southwest of Robat Village, Shahr-babk. General exposure of the northern trend is massive and consists of urallitized gabbro, hornblende gabbro, olivine gabbro, anortosite and plagiogranitic dikes and are highly altered. The composition of rocks in the southern trend consists of dunite, pyroxenite, olivine gabbro a...
Network intrusions may illicitly retrieve data/information, or prevent legitimate access. Reliable detection of network intrusions is an important problem, misclassification of an intrusion is an issue by the resultant overall reduction of accuracy of detection. A variety of potential methods exist to develop an improved system to perform classification more accurately. Feature selection is one...
As computer security becomes important, various system security mechanisms have been developed. Especially anomaly detection using hidden Markov model has been actively exploited. However, it can only detect abnormal behaviors under predefined threshold, and it cannot identify the type of intrusions. This paper aims to identify the type of intrusions by analyzing the state sequences using Viter...
This 4-year prospective study (N=662) of victims of a fireworks disaster examines the independent predictive value of peritraumatic dissociation for self-reported intrusions, avoidance reactions, and posttraumatic stress disorder (PTSD) symptom severity at both 18-months (T2) and almost 4-years postdisaster (T3). Peritraumatic dissociation was measured 2-3 weeks after the disaster (T1). Hierarc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید