Suggested Topics within your search.
Suggested Topics within your search.
-
681
Scalable Behavioral Authentication
Published 2021-01-01“…It is primarily used as a second factor in user authentication. A BA system starts with an initial database of user profiles, and uses a verification algorithm to accept or reject a verification request, that consists of a claimed identity and behavioral data by measuring the distance between the profile of the claimed identity and the presented behavioral data. …”
Get full text
Article -
682
Monitoring Behavior and Welfare of Cattle in Response to Summer Weather in an Arizona Rangeland Pasture Using a Commercial Rumen Bolus
Published 2025-05-01“…The objective of this case study was to evaluate the effectiveness of a commercial rumen temperature bolus in monitoring changes in cattle body temperature and behavior during the summer on Arizona rangelands. Ten 2-year-old Corriente heifers were monitored by using SmaXtec Classic Boluses from 1 June to 29 August 2023. …”
Get full text
Article -
683
Predictors of mothers’ preventive behaviors for children’s dental trauma: a cross-sectional study using the health belief model
Published 2025-06-01“…Data were analyzed using SPSS 21 and descriptive statistics (standard deviation, mean, median and range), inferential tests (Pearson correlation coefficient, regression) and path analysis to test the direct and indirect effect of model constructs on the dependent variable by AMOS software. …”
Get full text
Article -
684
Detecting Older Adults’ Behavior Changes During Adverse External Events Using Ambient Sensing: Longitudinal Observational Study
Published 2025-05-01“…Information derived from smart home sensors can provide objective data about behavior changes to support a learning health care system. …”
Get full text
Article -
685
Challenges of Using Applied Behavior Analysis (ABA) by Saudi Special Education Teachers to Improve the Social Skills of Students with Autism
Published 2025-07-01“…A qualitative method was used to analyze phenomena under inquiry from two different data points: surveys ( n = 51) and interviews ( n = 6). …”
Get full text
Article -
686
The role of virtual reality in enhancing behavioral empathy: exploring cognitive absorption, engagement, and emotional moderation using multivariate methods
Published 2025-07-01“…Abstract Virtual reality (VR) is increasingly being used to promote altruistic behavior, yet its mechanisms for enhancing altruistic behavior remain underexplored. …”
Get full text
Article -
687
-
688
-
689
Exploring the relationship between sports media use, sports participation behavior, and sport commitment: a mixed-methods study using structural equation modeling and qualitative i...
Published 2025-07-01“…Abstract Background This study investigates the complex relationships between sports media use (SMU), sports participation behavior (SPB), and sports commitment. …”
Get full text
Article -
690
Using online surveys for health behavior research with college students: How does recruitment method impact study results?
Published 2024-12-01“…Online surveys are a popular way to collect data from college students for health behavior research. …”
Get full text
Article -
691
A Mediation Analysis to Detect the Effects of Servant Leadership on Teacher Organizational Citizenship Behavior Using PLS-SEM and IPMA
Published 2025-05-01“…Partial least squares structural equation modeling (PLS-SEM) was used for data analysis. Importance-Performance Map Analysis (IPMA) was also performed. …”
Get full text
Article -
692
-
693
Validating ajzen’s theory of planned behavior in Saudi translation education programs using a reflective structural equation model
Published 2025-06-01“…This study revisits Ajzen’s Theory of Planned Behavior (TPB) to explore how students’ beliefs influence their engagement in translation programs using a new model. …”
Get full text
Article -
694
-
695
-
696
Evaluation Method for the Liquefaction Potential Using the Standard Penetration Test Value Based on the CPTU Soil Behavior Type Index
Published 2019-01-01“…N63.5 is expressed by a single Ic, which is calculated from the CPTU data. Compared with existing evaluation methods, this method can provide continuous standard penetration test values, moreover, this method involves a simple calculation, and the results obtained using the method are reliable.…”
Get full text
Article -
697
Changes in bullying behavior through agents of change using the balinese fable animation "Tat Twam Asi" in Jembrana regency
Published 2025-04-01“…The analysis was conducted in two stages and statistical analysis using the Wilcoxon signed-rank test, following a normality test of the data. …”
Get full text
Article -
698
Effect of Nb/B addition on the flow behavior and mechanical properties of low-carbon steel using compact strip production
Published 2025-01-01“…The microstructure and high-temperature flow behavior were studied using thermomechanical controlled processing at different deformation temperatures with a 40% reduction using the Gleeble physical simulator. …”
Get full text
Article -
699
Wearable Sensor-Based Behavioral User Authentication Using a Hybrid Deep Learning Approach with Squeeze-and-Excitation Mechanism
Published 2024-12-01“…We present a hybrid deep learning network called SE-DeepConvNet, which integrates a squeeze-and-excitation (SE) method to proficiently simulate and authenticate user behavior characteristics. Our methodology utilizes data collected by wearable sensors, such as accelerometers, gyroscopes, and magnetometers, to obtain a thorough behavioral appearance. …”
Get full text
Article -
700
Behavior Modeling and Bio-Hybrid Systems: Using Reinforcement Learning to Enhance Cyborg Cockroach in Bio-Inspired Swarm Robotics
Published 2025-01-01“…The proposed methodology includes modeling cockroach behaviors through data-driven techniques, designing a control framework using RL, and integrating these systems into a swarm robotics architecture. …”
Get full text
Article