نتایج جستجو برای: offensive efficiency
تعداد نتایج: 390229 فیلتر نتایج به سال:
The Great Offensive formed the last stage of Turkish War Independence. As a result offensive, homeland was completely cleared enemy troops. This unique position offensive in history has ensured that areas where prepared and carried out are protected as national heritage. In this study, tangible intangible cultural heritages were discussed. valuable heritage accumulation, significant increase be...
Studies in several species of rodents show that arginine vasopressin (AVP) acting through a V1A receptor facilitates offensive aggression, i.e., the initiation of attacks and bites, whereas serotonin (5-HT) acting through a 5-HT1B receptor inhibits aggressive responding. One area of the CNS that seems critical for the organization of aggressive behavior is the basolateral hypothalamus, particul...
PURPOSE We analyzed the interaction between offensive (i.e. space creation dynamics--SCDs) and defensive (i.e. space protection dynamics--SPDs) actions in six play outcomes (free shot, contested shot, new SCD, reset, foul, and turnover) in Spanish professional basketball games. METHOD Data consisted of 1548 SCD-SPD-outcome triples obtained from six play-off games. We used Bayesian methods to ...
The posting of offensive content in regional languages has increased as a result the accessibility low-cost internet and widespread use online social media. Despite large number comments available online, only small percentage them are offensive, resulting an unequal distribution non-offensive comments. Due to this class imbalance, classifiers may be biased toward with most samples, i.e., class...
Two experiments were conducted to investigate the reaction times (RTs) and anticipation of karate athletes. In Experiment 1, choice RTs and simple RTs were measured with two types of stimuli. One was videotaped scenes of opponent's offensive actions, which simulated the athletes' view in real situations, and the other was static filled circles, or dots. In the choice RT task, participants were ...
Text messaging through the Internet or cellular phones has become a major medium of personal and commercial communication. In the same time, flames (such as rants, taunts, and squalid phrases) are offensive/abusive phrases which might attack or offend the users for a variety of reasons. An automatic discriminative software with a sensitivity parameter for flame or abusive language detection wou...
This paper proposes a method for helping to identify adult web sites by using the image-content as means of detecting erotic material. The image content is classified by investigating probable skinregions, and extracting their feature vectors. These feature vectors are based on color-, texture-, contour-, placementand relative sizeinformation for a given region. The importance of the different ...
Phishing attacks attempt to fraudulently solicit sensitive information from a user by masquerading as a known trustworthy agent. They commonly use spoofed emails in association with fake websites in order to coerce a user into revealing personal financial data. Phishing is now a serious problem with criminals adopting the well-developed and well-known techniques to exploit Internet users with s...
Adverse and stressful experiences during adolescence are often of a social nature. The social defeat model in rats is used as an animal model for bullying in humans. Usually large individual differences in response to social defeat are found. The personality type that is mostly affected and the underlying mechanisms are unknown. We used male rats of the Roman selection lines to test whether soc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید