Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
1361
-
1362
Toward Semi-Autonomous Robotic Arm Manipulation Operator Intention Detection From Force Data
Published 2025-01-01“…In hazardous environments like nuclear facilities, robotic systems are essential for executing tasks that would otherwise expose humans to dangerous radiation levels, which pose severe health risks and can be fatal. …”
Get full text
Article -
1363
Hybrid Power Generation Supply Chain Financing and Purchasing Strategies with Option Hedging against Disruption
Published 2023-01-01“…Numerical study shows that when the power grid funds are uniformly distributed, executing the double option seems to be the most profitable choice for the power grid and the traditional energy power plant, whereas with the uniform distribution of the grid’s funds, executing the call option but abandoning put is the most profitable to the traditional energy power plant. …”
Get full text
Article -
1364
Thoracolumbar and Lumbopelvic Spinal Alignment During the Barbell Back Squat: A Comparison Between Men and Women
Published 2023-08-01“… # Conclusions Adjustments of spinal alignment, predominantly in the sagittal plane, are made during execution of the back squat in both male and female lifters. …”
Get full text
Article -
1365
Dynamic Task Planning for Multi-Arm Harvesting Robots Under Multiple Constraints Using Deep Reinforcement Learning
Published 2025-01-01“…Finally, we conduct extensive numerical simulations in static environments; when the harvesting targets are set to 25 and 50, the execution time is reduced by 10.7% and 3.1%, respectively, compared to traditional methods. …”
Get full text
Article -
1366
Effect of Mind-regulating Brain-developing Moxibustion on Cognitive Function and Sleep Quality in Patients with Mild Cognitive Impairment
Published 2017-12-01“…There were significant differences between the two groups in the scores of visual space and executive and delayed memory after treatment (<italic>P</italic><0.05).Conclusion:Mind-regulating brain-developing moxibustion can improve the cognitive function and sleep quality of MCI patients.…”
Get full text
Article -
1367
Secondhand Smoke Exposure and Brain Health Indicators in Cuban Preschoolers
Published 2025-01-01“…We assessed archival reports on parental smoking, duration and frequency of exposure, and several indicators of brain health, including executive function, language development, sleep quality, and fluid intelligence. …”
Get full text
Article -
1368
Topical issues of legal regulation of medical humanitarian care in a pandemic
Published 2020-10-01“…The procedure for interaction of a medical organization as a recipient of humanitarian aid with executive authorities and international donors of gratuitous aid has been considered in detail and outlined. …”
Get full text
Article -
1369
Constitutive Parliament and its speakers
Published 2003-12-01“…It performed the control of executive government institutions of all levels. The education of parliament members was much better than the middle education of Lithuanian citizens, but most of them didn't have university education. …”
Get full text
Article -
1370
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
Get full text
Article -
1371
Encouragement of the Personnel of the State Labor Service of Ukraine to Implement International Experience within Labor Protection Management
Published 2021-03-01“…The authors have determined the subjects of influence in the field of protection of labor rights, labor protection, preservation of life and health of the participants in the production process, in particular the executive authorities of public administration and the Federation of Trade Unions of Ukraine. …”
Get full text
Article -
1372
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01“…The results contain different metrics: data confidentiality rate, data integrity rate, authentication time, storage overhead, and execution time. Compared to conventional techniques, findings corroborate the assertion that the proposed PRKCHB technique improves data confidentiality and integrity by up to 9% and 9% while lowering storage overhead, authentication time, and execution time by 10%, 12%, and 12%.…”
Get full text
Article -
1373
Counterfactual thinking in psychiatric and neurological diseases: A scoping review.
Published 2021-01-01“…CFT impairments were reported in both psychiatric and neurological conditions, likely associated with a fronto-executive dysfunction.<h4>Conclusions</h4>Future research might further explore CFT in those psychiatric and neurological conditions in which CFT difficulties have been preliminary reported. …”
Get full text
Article -
1374
Simulation Analysis of Energy Inputs Required by Agricultural Machines to Perform Field Operations
Published 2024-12-01“…The evaluation of direct energy inputs and the assessment of the carbon footprint of an agricultural tractor during the execution of an agricultural operation is a complex task. …”
Get full text
Article -
1375
The Effect of Task Cognitive Difficulty on Perceptual-Cognitive Indicators: Evidence on the Relationship Between Challenge Point Framework (CPF) and Cognitive Development in Table...
Published 2025-01-01“…Pre- and post-test comparisons were made to evaluate changes in cognitive-perceptual performance.Results: Post-test results showed improvements in executive control of attention and cognitive effort across all groups. …”
Get full text
Article -
1376
Presenting a multi-objective decision-making model for cost-time trade-off considering the time value of money and solving it using particle swarm optimization
Published 2024-08-01“…This research aims to establish a balance between time compression and delays in activity execution to optimize resource utilization and facilitate activity scheduling based on existing constraints. …”
Get full text
Article -
1377
Safe development of coordination abilities in 11-year-old basketball players through aerobics
Published 2024-12-01“…Coordination abilities are a key element in the successful execution of technical basketball skills. In this context, developing appropriate comprehensive training programs that do not harm health is a critically important task. …”
Get full text
Article -
1378
Intraoral Scanning Versus Conventional Methods for Obtaining Full-Arch Implant-Supported Prostheses: A Systematic Review with Meta-Analysis
Published 2025-01-01“…The analysis of clinical execution time highlights a notable advantage of the DG over the CG at both scanned patient and implant levels (<i>p</i> < 0.05). …”
Get full text
Article -
1379
Exploring a high-level programming model for the NWP domain using ECMWF microphysics schemes
Published 2025-01-01“…Once the application is ported to Python with GT4Py, we find excellent portability, competitive GPU performance, and robust execution in all tested scenarios including with single precision.…”
Get full text
Article -
1380
Alexandre Jacob, forçat anarchiste en Guyane : politique ou droit commun ?
Published 2013-03-01“…The issue of political offences and crimes, different from the common law offences, is characterized by its intricacy, not so much in terms of special treatment in the execution of the sentence but firstly, in terms of the legal definition of political offence. …”
Get full text
Article