Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 2
- Internet in public administration 2
- Moral and ethical aspects 2
- Public administration 2
- Communication policy 1
- Government policy 1
- Internet 1
- Photography 1
- Prevention 1
- Psychological aspects 1
- Psychology 1
- Social aspects 1
- Technological innovations 1
- Telecommunication policy 1
- Terrorism 1
- Terrorists 1
- Visual communication 1
-
1741
Healthcare-seeking behaviors and factors influencing non-adherence among cervical cancer patients attending Bugando Oncology Clinic in Mwanza, Tanzania: A qualitative Phenomenologi...
Published 2025-01-01“…The current study explores the health-seeking behavior of cervical cancer patients and the factors that influence their non-adherence to cancer care.…”
Get full text
Article -
1742
The prevalence of risky sexual behaviors among youth center reproductive health clinics users and non-users in Addis Ababa, Ethiopia: A comparative cross-sectional study.
Published 2018-01-01“…The data was entered in EPI-INFO 7 software; and cleaned and analyzed using SPSS version 16.0. The prevalence was computed. Binary and multivariable logistic regression was done to determine the strength, direction and significance of association between youth center reproductive health clinic utilization and risky sexual behavior and to control confounder variables respectively.…”
Get full text
Article -
1743
Peer-reported social adjustment and social media use patterns among adolescents: A latent profile analysis
Published 2025-05-01“…Computers in Human Behavior Reports…”
Get full text
Article -
1744
-
1745
Neural mechanisms of maladaptive risk decision-making across psychiatric disorders
Published 2025-07-01Get full text
Article -
1746
Sleep hygiene games and gamification: where are we and where are we heading?
Published 2025-07-01Get full text
Article -
1747
Memory-augment graph transformer based unsupervised detection model for identifying performance anomalies in highly-dynamic cloud environments
Published 2025-07-01“…Abstract Cloud computing systems provide highly available and scalable computing, storage, and network resources to meet various service demands. …”
Get full text
Article -
1748
Classroom Response Systems as a Formative Assessment Tool: Investigation into Students’ Perceived Usefulness and Behavioural Intention
Published 2020-01-01“…In this context, the perceived usefulnessand behavioral intention of the students to use different classroom responsesystems were investigated. …”
Get full text
Article -
1749
Privacy-preserving multi-party data joint analysis scheme based on multiset operations in smart contracts
Published 2025-07-01“…This paper applies secure multi-party computation (MPC) to smart contracts, based on the secure computation of intersection, union, and difference of multi-party multisets (IUDMM), to protect data privacy while supporting joint analysis. …”
Get full text
Article -
1750
A Comprehensive Survey on Embodied Intelligence: Advancements, Challenges, and Future Perspectives
Published 2024-12-01“…Embodied Intelligence, which integrates physical interaction capabilities with cognitive computation in real-world scenarios, provides a promising path to achieve Artificial General Intelligence (AGI). …”
Get full text
Article -
1751
-
1752
-
1753
-
1754
Adult age differences in the integration of values for self and other
Published 2025-04-01“…Further, the precise cognitive and computational factors contributing to age-related differences in prosocial behavior remain largely unknown. …”
Get full text
Article -
1755
DAHD-YOLO: A New High Robustness and Real-Time Method for Smoking Detection
Published 2025-02-01“…Recent advancements in AI technologies have driven the extensive adoption of deep learning architectures for recognizing human behavioral patterns. However, the existing smoking behavior detection models based on object detection still have problems, including poor accuracy and insufficient real-time performance. …”
Get full text
Article -
1756
-
1757
On the elastic instability of a simple truss structure subjected to a tensile dead load
Published 2024-12-01“…The example admits a complete analytical solution, which makes it ideal for teaching use and as a benchmark problem for testing computational codes.…”
Get full text
Article -
1758
-
1759
ReMAV: Reward Modeling of Autonomous Vehicles for Finding Likely Failure Events
Published 2024-01-01“…Our reward modeling creates a behavior representation that highlights regions of likely uncertain autonomous vehicle behavior, even when performance seems adequate. …”
Get full text
Article -
1760
Study on the migration mechanism of heterogeneous cuttings in long-reach horizontal wells
Published 2025-07-01“…Additionally, the paper proposes optimization strategies for wellbore cleaning based on the transport behavior of cuttings, including adjustments to fluid flow velocity and optimization of well inclination, aimed at enhancing drilling efficiency and reducing drilling costs. …”
Get full text
Article