نتایج جستجو برای: horneyan defensive strategies
تعداد نتایج: 395881 فیلتر نتایج به سال:
BACKGROUND Adequate use of different learning strategies is one of the most important prerequisites of academic success. The actual use of learning strategies is the result of an interaction between individual and situational variables. Against this background we conducted a longitudinal study with first year medical students to investigate whether individuals show different patterns in their u...
Recent research has revealed that learning behavior is associated with academic achievement at the college level, but the impact of specific learning strategies on academic success as well as gender differences therein are still not clear. Therefore, the aim of this study was to investigate gender differences in the incremental contribution of learning strategies over general cognitive ability ...
IDS are regularly evaluated by comparing their false positive and false negative rates on ROC curves. However, this mechanism generally ignores both the context within which the IDS operates and the attacker’s own ability to adapt to IDS behavior. In this paper, we propose an alternative strategy for evaluating IDS based around multiple strategies. Each strategy defines how an attacker profits ...
A nonempty set S ⊂ V is a defensive k-alliance in G = (V,E), k ∈ [−Δ,Δ] ∪ Z, if for every v ∈ S, dS(v) ≥ dS̄(v) + k. A defensive k-alliance S is called exact, if S is defensive k-alliance but is no defensive (k+1)-alliance in G. In this paper we study the mathematical properties of exact defensive k-alliances in graphs. In particular, we obtain several bounds for defensive k-alliance of a graph....
There has been very limited research on the use of self-worth protection strategies in the achievement context of school physical education (PE). Thus, this study aimed to examine some antecedents and consequences of defensive pessimism and selfhandicapping. The sample comprised 534 (females n = 275; males n = 259) British pupils recruited from two schools who responded to established questionn...
There has been very limited research on the use of self-worth protection strategies in the achievement context of school physical education (PE). Thus, this study aimed to examine some antecedents and consequences of defensive pessimism and selfhandicapping. The sample comprised 534 (females n = 275; males n = 259) British pupils recruited from two schools who responded to established questionn...
the present research was an attempt to see how quranic lexical collocations were translated into english by two professional translators namely, abdullah yusuf(2005), and muhammad s. shakir(2012). the study attempted qualitatively to shed light on how translators dealt with quranic lexical collocations when transferring them to the target language based on the newmark(1988) model , and quantit...
Optimal resource allocation in security has been a significant challenge for critical infrastructure protection. Numerous studies use game theory as the method of choice, because of the fact that an attacker can often observe the defender’s investment in security and adapt his choice of strategies accordingly. However, most of these models do not explicitly consider deterrence, with the result ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید