Search alternatives:
use » used (Expand Search)
Showing 641 - 660 results of 17,967 for search 'use behavior data', query time: 0.27s Refine Results
  1. 641
  2. 642

    Mothers’ intention to vaccinate their daughters against human papillomavirus in NorthWest Ethiopia, using the theory of planned behavior by Samrawit Tilahun, Habtamu Wondiye, Zeamanuel Anteneh Yigzaw

    Published 2023-12-01
    “…The study participants were selected using a multi-stage random sampling technique. Data was collected using an interview-administered questionnaire. …”
    Get full text
    Article
  3. 643

    Effect of fracture energy estimation on the predictions of mode II behavior of bonded joints using cohesive zone models by Michele Perrella, Enrico Armentani, Giuseppe Lamanna, Valentino Paolo Berardi

    Published 2025-04-01
    “…The mode II cohesive traction-separation law was identified by numerical differentiation of SERR and best fit equation systems were adopted for an analytical description of cohesive interface behavior. Moreover, the obtained CZM laws were used for predicting the decohesion process by finite element analyses. …”
    Get full text
    Article
  4. 644

    Relationship between the Health Literacy and Intention to Conduct Diabetes Testing in At-risk Individuals using the Theory of Planned Behavior by Narges Abdolmaleki, Afshin Bahmani, Sayran Nili, Arezoo Fallahi

    Published 2024-10-01
    “…Data were analyzed using the SPSS (version 23) software, descriptive tests (mean and standard deviation), and analytical tests (chi-square, Pearson correlation, and multiple regressions). …”
    Get full text
    Article
  5. 645

    Detecting Anomalies in CPU Behavior Using Clustering Algorithms from the Scikit-Learn Library in Python Programming Language by Artem Turashev, Vladimir Sukhomlin

    Published 2024-03-01
    “…This article examines the problem of detecting anomalies in central processing unit (CPU) operation using time series clustering algorithms. The central processing unit is the main computing component responsible for executing instructions and processing data. …”
    Get full text
    Article
  6. 646

    Effect of fracture energy estimation on the predictions of mode II behavior of bonded joints using cohesive zone models by Michele Perrella, Enrico Armentani, Giuseppe Lamanna, Valentino Paolo Berardi

    Published 2025-03-01
    “…The mode II cohesive traction-separation law was identified by numerical differentiation of SERR and best fit equation systems were adopted for an analytical description of cohesive interface behavior. Moreover, the obtained CZM laws were used for predicting the decohesion process by finite element analyses. …”
    Get full text
    Article
  7. 647
  8. 648
  9. 649
  10. 650
  11. 651
  12. 652
  13. 653

    Longitudinal analysis of behavioral factors and techniques used to identify vaccine hesitancy among Twitter users: Scoping review by Sulaiman Khan, Md. Rafiul Biswas, Zubair Shah

    Published 2023-12-01
    “…This scoping review aims to identify the community and individual factors that longitudinally influence public behavior toward vaccination. The secondary aim is to gain insight into techniques and methodologies used to extract these factors from Twitter data. …”
    Get full text
    Article
  14. 654
  15. 655

    Application of Behavior-Based Safety to Reduce Unsafe Actions in Preventive Maintenance Work Using the JSA and DO IT Methods by Aura Irsyaf Putri, Muhammad Nur, Misra Hartati, Anwardi, M. Isnaini Hadiyul Umam

    Published 2025-04-01
    “…This study aims to reduce unsafe actions during PM activities by implementing the Job Safety Analysis (JSA) method and the DO IT (Define, Observe, Intervene, and Test) approach within the Behavior Based Safety (BBS) framework. The research was conducted using field observations, interviews with workers, and accident data collected from 2023. …”
    Get full text
    Article
  16. 656
  17. 657
  18. 658

    Predicting Breast Cancer Screening Behaviors Using Protective Motivation Theory: A Structural Equation Modeling Approach by Yizheng Gao, Jianwei Yu, Hairuo Wang, Binhao Liu, Shunhua Zhang

    Published 2023-08-01
    “…Methods: This cross-sectional study included 895 women from eastern China. Data were collected using an online questionnaire that included sociodemographic information, PMT theoretical construction, and breast cancer screening behavior. …”
    Get full text
    Article
  19. 659

    Classification of overweight/obesity among Saudi adolescents relative to lifestyle behaviors using the IOTF or WHO reference standards by Hazzaa M. Al-Hazzaa, Hazzaa M. Al-Hazzaa, Amal Alhakami, Ahlam M. Alotaibi, Ahlam M. Alotaibi

    Published 2025-08-01
    “…PurposeTo compare two BMI classifications (the IOTF and WHO references) in assessing overweight/obesity prevalence among Saudi adolescents and to evaluate the ability of the two standards to detect risks of unhealthy lifestyle behaviors.MethodsHealthy Saudi adolescents (15–19 years) were drawn from two data sets (n = 2,263) collected previously in 2009 and 2019, using a random multistage stratified cluster sampling technique. …”
    Get full text
    Article
  20. 660