期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Exploration on "Application of Behavior Analysis Therapy" to Improve Communication Ability of Autistic Children
1
作者 ZHANGLijuan 《外文科技期刊数据库(文摘版)教育科学》 2022年第5期086-089,共4页
For a long time, people have little understanding of autism, let alone how to help and treat them. In order to better improve the behavior habits and speech and social disorders of autistic children, I will mainly tal... For a long time, people have little understanding of autism, let alone how to help and treat them. In order to better improve the behavior habits and speech and social disorders of autistic children, I will mainly talk about the most effective intervention method-the application of behavior analysis therapy. We can use this method to analyze various behaviors of autistic children, distinguish the good behavior and the bad behavior, help autistic children to establish good behaviors, and at the same time improve or eliminate their problem behaviors, so that they can better communicate with people and integrate into social life. In fact, these autistic children from the stars are not so difficult to get along with. As long as we really help them with our heart and let them enter our hearts, slowly you will find that you have also entered their hearts. "Application of behavior analysis therapy" is to decompose the target task (i.e. teaching knowledge, skills, behaviors, habits, etc.) into a series of smaller or relatively independent links according to a certain method and order, and then use appropriate reinforcement methods to train each small link step by step according to the order determined by the task decomposition, until the children master all links, and finally can complete the task independently, and can apply the knowledge and skills they have learned in other situations. "Applied behavioral analysis" mainly emphasizes the change and shaping of autisms explicit behavior. It uses the principle and method of operation restriction to shape childrens behavior, designs corresponding situations according to childrens behavior and selects the reinforcement that can affect the target behavior, and establishes new adaptive behavior with their spontaneous reaction behavior to eliminate or improve inappropriate behavior caused by autism symptoms. 展开更多
关键词 application of behavior analysis therapy children with autism behavioral problems communication a
暂未订购
THE EXISTENCE AND ASYMPTOTIC BEHAVIOR OF SOLUTIONS FOR EVOLUTION EQUATIONS AND APPLICATIONS TO P. D. E.
2
作者 张壮志 《Acta Mathematica Scientia》 SCIE CSCD 1991年第2期231-240,共10页
The main purpose of this paper is to discuss the existence and asymptotic behavior of solutions for [GRAPHICS] and for which the sufficient conditions of asymptotic behavior are obtained and the restriction for the ex... The main purpose of this paper is to discuss the existence and asymptotic behavior of solutions for [GRAPHICS] and for which the sufficient conditions of asymptotic behavior are obtained and the restriction for the existence is reduced. 展开更多
关键词 THE EXISTENCE AND ASYMPTOTIC behavior OF SOLUTIONS FOR EVOLUTION EQUATIONS AND applicationS TO P
在线阅读 下载PDF
Research on Application's Credibility Verification Based on ABD
3
作者 YU Xuejun JIANG Guangzhi +3 位作者 WANG Pu SONG Hongbo WANG Kun LIANG Yong 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期63-68,共6页
Software credibility refers to the matching degree between the expected result and system behavior in the real running environment.This paper focuses on the application of software creditability verification method ba... Software credibility refers to the matching degree between the expected result and system behavior in the real running environment.This paper focuses on the application of software creditability verification method based on the application behavior declaration(ABD),in which the application of software credibility validation process and the software behavior declaration definition statement are put forward.In the integration of the process and the software development life cycle,the ABD is embedded into the software development phases to make the software behavior be consistent with the judgment and the final realization meet the requirement of trusted software verification. 展开更多
关键词 software credibility application behavior declaration(ABD) whole life cycle
原文传递
Network traffic identification in packet sampling environment 被引量:2
4
作者 Shi Dong Yuanjun Xia 《Digital Communications and Networks》 SCIE CSCD 2023年第4期957-970,共14页
With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management... With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management systems.In this paper,in order to improve the accuracy of network traffic identification,sampled NetFlow data is applied to traffic identification,and the impact of packet sampling on the accuracy of the identification method is studied.This study includes feature selection,a metric correlation analysis for the application behavior,and a traffic identification algorithm.Theoretical analysis and experimental results show that the significance of behavior characteristics becomes lower in the packet sampling environment.Meanwhile,in this paper,the correlation analysis results in different trends according to different features.However,as long as the flow number meets the statistical requirement,the feature selection and the correlation degree will be independent of the sampling ratio.While in a high sampling ratio,where the effective information would be less,the identification accuracy is much lower than the unsampled packets.Finally,in order to improve the accuracy of the identification,we propose a Deep Belief Networks Application Identification(DBNAI)method,which can achieve better classification performance than other state-of-the-art methods. 展开更多
关键词 Network measurement application identification Packet sampling application behavior CHARACTERISTIC Metric correlation Network management
在线阅读 下载PDF
ASYMPTOTIC BEHAVIOR OF UNSTABLE ARMA PROCESSES WITH APPLICATION TO LEAST SQUARES ESTIMATES OF THEIR PARAMETERS 被引量:2
5
作者 安鸿志 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 1989年第2期148-168,共21页
A time series x(t), t≥1, is said to be an unstable ARMA process if x(t) satisfies an unstableARMA model such asx(t)=a_1x(t-1)+a_2x(t-2)+…+a_8x(t-s)+w(t)where w(t) is a stationary ARMA process; and the characteristic... A time series x(t), t≥1, is said to be an unstable ARMA process if x(t) satisfies an unstableARMA model such asx(t)=a_1x(t-1)+a_2x(t-2)+…+a_8x(t-s)+w(t)where w(t) is a stationary ARMA process; and the characteristic polynomial A(z)=1-a_1z-a_2z^2-…-a_3z^3 has all roots on the unit circle. Asymptotic behavior of sum form 1 to n (x^2(t)) will be studied by showing somerates of divergence of sum form 1 to n (x^2(t)). This kind of properties Will be used for getting the rates of convergenceof least squares estimates of parameters a_1, a_2,…, a_? 展开更多
关键词 ARMA ASYMPTOTIC behavior OF UNSTABLE ARMA PROCESSES WITH application TO LEAST SQUARES ESTIMATES OF THEIR PARAMETERS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部