baseline behavior

baseline behavior

a specified frequency and form of a particular behavior during preexperimental or pretherapeutic conditions.
Mentioned in ?
References in periodicals archive ?
This is especially difficult when you haven't known a person's baseline behavior.
In the second graph of Figure l, we see a similar pattern: holding poverty constant, students who had typical baseline behavior were predicted to have 2.
None of these were terribly severe, and most of them looked similar to fluctuations in peoples' baseline behavior," said Dr.
The same thing was found for the relationship between baseline sexual risk behaviors and their corresponding nine-month sexual risk behaviors, except that unprotected sex with a casual partner at nine months was predicted by the same baseline behavior.
Most importantly, it is able to constantly incorporate new data so that baseline behavior and performance thresholds are always up to date and mapped to new behavior.
For regular exercise the intervention group increased over time while the control group did not (control: baseline behavior score = 2.
It is used to quantitate baseline behavior and medication response.
It measures baseline behavior, such as suggestive selling, and then quantifies how much that baseline behavior has improved.
These include using facial expressions as clues to deception (13) and establishing a baseline behavior of which the interviewee is unaware, changes in which can then be used to assess the truthfulness of responses to set questions.
Prelert self-learns the baseline behavior of each IT component as well as how all components interact to deliver a service, application or transaction.
The clinical population of children and teens with developmental disabilities is heterogenous, so know what the individual's baseline behavior is.
Guardium 7 automatically locates and classifies sensitive data such as credit card numbers and magnetic stripe data in corporate databases, and analyzes baseline behavior to understand how and when line-of-business applications are accessing vulnerable databases.