Search alternatives:
use » used (Expand Search)
Showing 881 - 900 results of 17,967 for search 'use behavior data', query time: 0.34s Refine Results
  1. 881
  2. 882
  3. 883

    Factors influencing high-risk fertility practices among women of childbearing age in Tanzania: using DHS 2022 by Hiwot Altaye Asebe

    Published 2025-04-01
    “…Women’s educational levels, Age of women, wealth index, media exposure, decision-making autonomy, contraceptive use, and rural residence were found to be predictors of high-risk fertility behavior. …”
    Get full text
    Article
  4. 884

    Correlation between behavioral and dietary factors and trends in esophageal cancer mortality in key rural areas of four Chinese provinces from 2008 to 2021: a surveillance data ana... by Chuchu WEI, Yarong HAN, Xiaoying YANG, Xuefei FENG, Xiangyi RUI, Baohua WANG

    Published 2025-06-01
    “…MethodsBased on the National Mortality Surveillance Database from 2008 to 2021 and data from three surveys on tumors and behavioral risk factors conducted in 2013, 2016, and 2019 among residents in key rural areas of Jiangsu, Anhui, Shandong, and Henan provinces, Joinpoint 5.2.0 software was used to calculate the average annual percentage change (AAPC) and analyze the temporal trends of the age-standardized mortality rate of esophageal cancer in the Chinese population (referred to as the Chinese standardized mortality rate). …”
    Get full text
    Article
  5. 885
  6. 886

    Analyzing the use of fact-checking tools in disaster-risk reduction in Europe through the lens of the heuristic-systematic model by Nadejda Komendantova, Tahereh Zobeidi, Masoud Yazdanpanah

    Published 2025-05-01
    “…Identifying false information can curb its spread and reduce its impact on people’s attitudes and behaviors. Understanding how and why people in a disaster situation use fact-checking tools is crucial, as disaster-risk messages containing false content can usually be detected using systematic or heuristic processing. …”
    Get full text
    Article
  7. 887
  8. 888

    Using modern clustering techniques for parametric fault diagnostics of turbofan engines by I. J. Buraimah

    Published 2020-12-01
    “…These technological upgrades have made engines very complex and expensive machines which need constant monitoring during their working phase. As the demand and use of such engines is growing steadily, both in the civilian and military sectors, it becomes necessary to monitor and predict the behavior of parametric data generated by these complex engines during their working phases. …”
    Get full text
    Article
  9. 889

    PENGARUH ATTITUDE TOWARD BEHAVIORAL, SUBJECTIVE NORM, PERCEIVED BEHAVIORAL CONTROL TERHADAP ENTREPRENEURIAL INTENTION by Marcellino Widjaja, Liliana Dewi

    Published 2023-02-01
    “…In this research, it will use non probability sampling and data retrieval uses purposive sampling technique by using quantitative data type. …”
    Get full text
    Article
  10. 890

    The use of a matched controls design and publicly available outcome data to evaluate a multiyear urban school-based SEL intervention by Angela W. Wang, Simon Daniel, Maurice J. Elias

    Published 2025-06-01
    “…Our findings indicate mixed results across academic and behavioral indicators, such as significant improvement in Math scores but smaller effects for behavioral metrics, such as substance use. …”
    Get full text
    Article
  11. 891
  12. 892

    A Study of Determining Factors Influencing the Intention of Cryptocurrency Investors Using UTAUT 2 Approach by Ladia Puspanegara, Jono M. Munandar, Bagus Sartono

    Published 2025-01-01
    “…“The data were analyzed using two methods,“descriptive statistical analysis and SEM (Structural Equation Modeling).”The research findings indicate that several variables such as price value, social influence, hedonic motivation, performance expectancy, effort expectancy, and facilitating conditions have a positive and significant influence on BI (Behavioral Intention).”Additionally, the perceived risk variable has a negative and significant influence on behavioral intention. …”
    Get full text
    Article
  13. 893

    Multimodal framework for phishing attack detection and mitigation through behavior analysis using EM-BERT and SPCA-BASED EAI-SC-LSTM by Mahmoud Murhej, G. Nallasivan

    Published 2025-07-01
    “…Thus, multiple data sources, including SMS, E-Mail, and URL links, are used in this paper to detect and mitigate phishing attacks.MethodsInitially, the input data is collected from the SMS, E-Mail, and URL datasets. …”
    Get full text
    Article
  14. 894

    The Effectiveness of Information Services by Using the Drama Film "Cry Me A Sad River" to Minimize Bullying Behavior in Middle School Students by Yuli Lestari, Alfin Siregar

    Published 2023-06-01
    “…The sample for this research was 20 junior high school students who were selected using a purposive sampling technique. Data collection techniques in this study used bullying behavior scale instruments and interviews. …”
    Get full text
    Article
  15. 895
  16. 896

    Investigating the impact of behavioral biases and financial literacy on investment decisions using the structural equation model: a case study of Kerman households by Mohammadali Maghsoudpour, Behnam Karamshahi

    Published 2024-12-01
    “…The statistical population of the study consists of residents of Kerman who have experience in investing in financial markets. The required data were collected using a two-stage random sampling method from 388 residents of different areas of Kerman. …”
    Get full text
    Article
  17. 897

    Robbing Behavior in Honey Bees by Ryan Willingham, Jeanette Klopchin, James D. Ellis

    Published 2015-03-01
    “… Western honey bee workers can invade and steal honey/nectar from other colonies or sugar/corn syrup from feeders used to deliver syrup to other colonies. This is called “robbing” behavior. …”
    Get full text
    Article
  18. 898

    Robbing Behavior in Honey Bees by Ryan Willingham, Jeanette Klopchin, James D. Ellis

    Published 2015-03-01
    “… Western honey bee workers can invade and steal honey/nectar from other colonies or sugar/corn syrup from feeders used to deliver syrup to other colonies. This is called “robbing” behavior. …”
    Get full text
    Article
  19. 899

    Behavioral Intentions Of Bank Customers by Irawan Fakhrudin Mahalizikri, Ungsi Antara Oku Marmai, Elda Martha Suri

    Published 2020-10-01
    “…The purpose of this study was to analyze the factors that influence bank customers' switching behavior intentions. This research method uses a quantitative approach and data collection using a questionnaire given to 150 bank customers taken by non-probability sampling and analyzed using SPSS version 16. …”
    Get full text
    Article
  20. 900

    TRUST AND INNOVATIVE WORK BEHAVIOR: by Nur Auliyah, Muhammad Ali Fikri, Made Galih Wisnu Wardana

    Published 2025-03-01
    “…This study aims to determine the effect of trust and innovative work behavior mediated by knowledge sharing. This study uses a quantitative data processing method using partial least squares analysis of structural equivalence modeling with SmartPLS 4.0 statistical tools. …”
    Get full text
    Article