Showing 1,361 - 1,380 results of 3,373 for search '"executed"', query time: 0.07s Refine Results
  1. 1361
  2. 1362

    Toward Semi-Autonomous Robotic Arm Manipulation Operator Intention Detection From Force Data by Abdullah S. Alharthi, Ozan Tokatli, Erwin Lopez, Guido Herrmann

    Published 2025-01-01
    “…In hazardous environments like nuclear facilities, robotic systems are essential for executing tasks that would otherwise expose humans to dangerous radiation levels, which pose severe health risks and can be fatal. …”
    Get full text
    Article
  3. 1363

    Hybrid Power Generation Supply Chain Financing and Purchasing Strategies with Option Hedging against Disruption by Guoshu Dong, Qing Xia, Bo Xu, Ziguang Dong

    Published 2023-01-01
    “…Numerical study shows that when the power grid funds are uniformly distributed, executing the double option seems to be the most profitable choice for the power grid and the traditional energy power plant, whereas with the uniform distribution of the grid’s funds, executing the call option but abandoning put is the most profitable to the traditional energy power plant. …”
    Get full text
    Article
  4. 1364

    Thoracolumbar and Lumbopelvic Spinal Alignment During the Barbell Back Squat: A Comparison Between Men and Women by Victor Bengtsson, Lars Berglund, Fredrik Öhberg, Ulrika Aasa

    Published 2023-08-01
    “… # Conclusions Adjustments of spinal alignment, predominantly in the sagittal plane, are made during execution of the back squat in both male and female lifters. …”
    Get full text
    Article
  5. 1365

    Dynamic Task Planning for Multi-Arm Harvesting Robots Under Multiple Constraints Using Deep Reinforcement Learning by Feng Xie, Zhengwei Guo, Tao Li, Qingchun Feng, Chunjiang Zhao

    Published 2025-01-01
    “…Finally, we conduct extensive numerical simulations in static environments; when the harvesting targets are set to 25 and 50, the execution time is reduced by 10.7% and 3.1%, respectively, compared to traditional methods. …”
    Get full text
    Article
  6. 1366

    Effect of Mind-regulating Brain-developing Moxibustion on Cognitive Function and Sleep Quality in Patients with Mild Cognitive Impairment by Xinyan JIA, Tingting TAN, Dan WANG, Xu YUAN, Yazi MEI, Shangjie CHEN

    Published 2017-12-01
    “…There were significant differences between the two groups in the scores of visual space and executive and delayed memory after treatment (<italic>P</italic>&lt;0.05).Conclusion:Mind-regulating brain-developing moxibustion can improve the cognitive function and sleep quality of MCI patients.…”
    Get full text
    Article
  7. 1367

    Secondhand Smoke Exposure and Brain Health Indicators in Cuban Preschoolers by Yaser Ramírez Benítez, Miriela Díaz Bringas, Rodneys Mauricio Jiménez-Morales, Ijang Bih Ngyah-Etchutambe, Linda S. Pagani

    Published 2025-01-01
    “…We assessed archival reports on parental smoking, duration and frequency of exposure, and several indicators of brain health, including executive function, language development, sleep quality, and fluid intelligence. …”
    Get full text
    Article
  8. 1368

    Topical issues of legal regulation of medical humanitarian care in a pandemic by O. E. Karpov, D. N. Nikitenko, V. V. Tretyakov, D. S. Voronov

    Published 2020-10-01
    “…The procedure for interaction of a medical organization as a recipient of humanitarian aid with executive authorities and international donors of gratuitous aid has been considered in detail and outlined. …”
    Get full text
    Article
  9. 1369

    Constitutive Parliament and its speakers by Algis Kasperavičius

    Published 2003-12-01
    “…It performed the control of executive government institutions of all levels. The education of parliament members was much better than the middle education of Lithuanian citizens, but most of them didn't have university education. …”
    Get full text
    Article
  10. 1370

    Overview of blockchain assets theft attacks and defense technology by Beiyuan YU, Shanyao REN, Jianwei LIU

    Published 2023-02-01
    “…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
    Get full text
    Article
  11. 1371

    Encouragement of the Personnel of the State Labor Service of Ukraine to Implement International Experience within Labor Protection Management by O. A. Lukianykhina, V. O. Lukianykhin, I. V. Kolesnyk, K. О. Khamlyka

    Published 2021-03-01
    “…The authors have determined the subjects of influence in the field of protection of labor rights, labor protection, preservation of life and health of the participants in the production process, in particular the executive authorities of public administration and the Federation of Trade Unions of Ukraine. …”
    Get full text
    Article
  12. 1372

    Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services by Selvakumar Shanmugam, Rajesh Natarajan, Gururaj H. L., Francesco Flammini, Badria Sulaiman Alfurhood, Anitha Premkumar

    Published 2024-01-01
    “…The results contain different metrics: data confidentiality rate, data integrity rate, authentication time, storage overhead, and execution time. Compared to conventional techniques, findings corroborate the assertion that the proposed PRKCHB technique improves data confidentiality and integrity by up to 9% and 9% while lowering storage overhead, authentication time, and execution time by 10%, 12%, and 12%.…”
    Get full text
    Article
  13. 1373

    Counterfactual thinking in psychiatric and neurological diseases: A scoping review. by Sofia Tagini, Federica Solca, Silvia Torre, Agostino Brugnera, Andrea Ciammola, Ketti Mazzocco, Roberta Ferrucci, Vincenzo Silani, Gabriella Pravettoni, Barbara Poletti

    Published 2021-01-01
    “…CFT impairments were reported in both psychiatric and neurological conditions, likely associated with a fronto-executive dysfunction.<h4>Conclusions</h4>Future research might further explore CFT in those psychiatric and neurological conditions in which CFT difficulties have been preliminary reported. …”
    Get full text
    Article
  14. 1374

    Simulation Analysis of Energy Inputs Required by Agricultural Machines to Perform Field Operations by Francesco Paciolla, Katarzyna Łyp-Wrońska, Tommaso Quartarella, Simone Pascuzzi

    Published 2024-12-01
    “…The evaluation of direct energy inputs and the assessment of the carbon footprint of an agricultural tractor during the execution of an agricultural operation is a complex task. …”
    Get full text
    Article
  15. 1375

    The Effect of Task Cognitive Difficulty on Perceptual-Cognitive Indicators: Evidence on the Relationship Between Challenge Point Framework (CPF) and Cognitive Development in Table... by Taghi MM, Aghdaei M, Farsi A, Badicu G, de Sousa Fernandes MS, Yagin FH, Ardigò LP

    Published 2025-01-01
    “…Pre- and post-test comparisons were made to evaluate changes in cognitive-perceptual performance.Results: Post-test results showed improvements in executive control of attention and cognitive effort across all groups. …”
    Get full text
    Article
  16. 1376

    Presenting a multi-objective decision-making model for cost-time trade-off considering the time value of money and solving it using particle swarm optimization by Mohammadreza Shahriari

    Published 2024-08-01
    “…This research aims to establish a balance between time compression and delays in activity execution to optimize resource utilization and facilitate activity scheduling based on existing constraints. …”
    Get full text
    Article
  17. 1377

    Safe development of coordination abilities in 11-year-old basketball players through aerobics by Vladyslav Heitenko, Volodymyr Prystynskyi, Tetyana Prystynska

    Published 2024-12-01
    “…Coordination abilities are a key element in the successful execution of technical basketball skills. In this context, developing appropriate comprehensive training programs that do not harm health is a critically important task. …”
    Get full text
    Article
  18. 1378

    Intraoral Scanning Versus Conventional Methods for Obtaining Full-Arch Implant-Supported Prostheses: A Systematic Review with Meta-Analysis by Fernanda L. Vieira, Maísa Carnietto, José R. A. Cerqueira Filho, Ester A. F. Bordini, Hiskell F. F. Oliveira, Thiago A. Pegoraro, Joel F. Santiago Junior

    Published 2025-01-01
    “…The analysis of clinical execution time highlights a notable advantage of the DG over the CG at both scanned patient and implant levels (<i>p</i> < 0.05). …”
    Get full text
    Article
  19. 1379

    Exploring a high-level programming model for the NWP domain using ECMWF microphysics schemes by S. Ubbiali, C. Kühnlein, C. Schär, L. Schlemmer, T. C. Schulthess, T. C. Schulthess, M. Staneker, H. Wernli

    Published 2025-01-01
    “…Once the application is ported to Python with GT4Py, we find excellent portability, competitive GPU performance, and robust execution in all tested scenarios including with single precision.…”
    Get full text
    Article
  20. 1380

    Alexandre Jacob, forçat anarchiste en Guyane : politique ou droit commun ? by Colombe de Dieuleveult

    Published 2013-03-01
    “…The issue of political offences and crimes, different from the common law offences, is characterized by its intricacy, not so much in terms of special treatment in the execution of the sentence but firstly, in terms of the legal definition of political offence. …”
    Get full text
    Article