Showing 1,681 - 1,700 results of 3,373 for search '"executed"', query time: 0.05s Refine Results
  1. 1681

    Sex-specific associations between estimated glucose disposal rate and cognitive decline in middle-aged and older adults in China: a longitudinal cohort study by Chun Luo, Shuang Han, Xiaoying Shen, Hao Wu, Jianqing Zhou, Bingyang Liu

    Published 2025-02-01
    “…Cognitive function was calculated as the sum of episodic memory and executive function scores, which was then standardized to a Z-score. …”
    Get full text
    Article
  2. 1682

    Assessing the Impact of a Virtual Reality Cognitive Intervention on Tennis Performance in Junior Tennis Players: Pilot Study by Joaquin A Anguera, Aleem Choudhry, Michael Seaman, Dominick Fedele

    Published 2025-02-01
    “… BackgroundThere is evidence that cognitive training interventions can positively impact executive functions, and that some studies have demonstrated that athletes typically exhibit greater accuracy and faster response times on select cognitive tasks. …”
    Get full text
    Article
  3. 1683

    Protocol for genetic analysis of population-scale ultra-low-depth sequencing data by Jingyu Zeng, Linxuan Li, Ying Lin, Xianmei Lan, Xinyi Zhang, Yingying Wang, Mingzhi Liao, Xin Jin, Huanhuan Zhu

    Published 2025-03-01
    “…This protocol applies to a wide range of ultra-low-depth sequencing studies, extending beyond data from NIPT.For complete details on the use and execution of this profile, please refer to Xiao et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  4. 1684

    Protocol for generating splice isoform-specific mouse mutants using CRISPR-Cas9 and a minigene splicing reporter by Yudong Teng, Kelsey Arbogast, Harald Junge, Zhe Chen

    Published 2025-03-01
    “…Splice isoform-specific mouse mutants provide valuable tools for genetic analyses beyond loss-of-function and transgenic alleles.For complete details on the use and execution of this protocol, please refer to Dailey-Krempel et al.1 and Johnson et al.2 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article
  5. 1685

    Collaborative Cacbe Management Strategy Based on Ant-Colony Replacement Algoritbm in Named Data Networking by Lili Dong, Yong Wang, Yongqiang Dong, Peng Yang

    Published 2014-09-01
    “…The cache replacement problem in a single node was modeled as a 0/1 knapsack problem firstly, which could be well solved by an ant-colony replacement algorithm. To facilitate the execution of the algorithm, the inner content caching value was calculated by taking into account the size of the content, the access frequency of the content, and the status of neighboring cache copies. …”
    Get full text
    Article
  6. 1686

    Software-defined cross-domain scheduling mechanism for time-sensitive networking by Shuo WANG, Yudong HUANG, Tao HUANG, Ru HUO, Yunjie LIU

    Published 2021-10-01
    “…For the cross domain scheduling problem of time-sensitive network, a software-defined cross-domain scheduling mechanism for time-sensitive networking was proposed, which was based on three kinds of wide area clock synchronization technology to ensure nanosecond inter-domain time synchronization.Then, a time slot conflict-free cross domain scheduling model was proposed to solve the problem of time slot alignment caused by inter-domain link delay.The time slot conflict-free constraints were used to strictly limit the arrival time of cross-domain traffic at the edge node.Finally, the gate control list of fusion domains for global scheduling was calculated online.The simulation results show that the model can schedule hundreds of time-sensitive traffic in a typical cross-domain remote control scenario, and has a feasible algorithm execution time in seconds.…”
    Get full text
    Article
  7. 1687

    Audit committee characteristics and audit report lag: evidence from the Iran by Mehdi Maranjory, Mohadeseh Kouchaki Tajani

    Published 2022-03-01
    “…This suggests that more experts and non-executive members on the audit committee minimize audit report lag and reduce the timeliness constraint that dominates the qualitative characteristics financial information. …”
    Get full text
    Article
  8. 1688

    Impaired Functional Connectivity in the Prefrontal Cortex: A Mechanism for Chronic Stress-Induced Neuropsychiatric Disorders by Ignacio Negrón-Oyarzo, Francisco Aboitiz, Pablo Fuentealba

    Published 2016-01-01
    “…We propose that chronic stress impairs mechanisms involved in neuronal functional connectivity in the PFC that are required for the formation of adaptive representations for the execution of adaptive behavioral responses. These considerations could be particularly relevant for understanding the pathophysiology of chronic stress-related neuropsychiatric disorders.…”
    Get full text
    Article
  9. 1689

    New IGIP Curriculum for Advanced Training of Engineering University Teachers by A. N. Solovyev, V. M. Prikhodko, L. G. Petrova, E. I. Makarenko

    Published 2021-01-01
    “…The discussion of the new Curriculum for pedagogical training of teachers of technical disciplines, prior to its approval by the IGIP Executive Committee in the fall of 2019 is considered. …”
    Get full text
    Article
  10. 1690

    Light weighted privacy protection ViT inference framework based on secret sharing by MA Min, FU Yu, HUANG Kai, JIA Xiaofeng

    Published 2024-04-01
    “…Two edge servers collaborated to execute secure computing protocols based on secret sharing design, such as SSoftmax, SLayerNorm, SGeLU, etc. …”
    Get full text
    Article
  11. 1691

    Multilevel Association Rule Mining for Bridge Resource Management Based on Immune Genetic Algorithm by Yang Ou, Zheng Jiang Liu, Hamid Reza Karimi, Ying Tian

    Published 2014-01-01
    “…In this paper, firstly, a cross level coding scheme for mining the multilevel association rules is proposed. Secondly, we execute the immune genetic algorithm with the coding scheme for analyzing BRM. …”
    Get full text
    Article
  12. 1692

    Data access control policy of encrypted deduplication system by Chunfu JIA, Guanxiong HA, Ruiqi LI

    Published 2020-05-01
    “…To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such as identity authentication,authorization deduplication and the update of access control policy.The outsourced data was only deduplicated with the authorized users,and the unauthorized users couldn’t obtain any data information.CP-ABE and the partition of the ElGamal private key were used to update the access control policy of data.Self-control objects was used to encapsulate user’s data and its access policy,providing authentication for data visitors and ensuring the access control policies enforced effectively.Security analysis and simulation results demonstrate that the proposed system enables data access control and executes efficiently.…”
    Get full text
    Article
  13. 1693

    Edward Jurgens i Karol Ruprecht. Polacy z wyboru wobec polskich ruchów niepodległościowych w XIX wieku by Tadeusz Stegner

    Published 2024-01-01
    “…Ruprecht was sentenced to death in 1846 for his conspiratorial activities, but then pardoned at the very last moment before execution, and in 1863 he was a member of the National Government. …”
    Get full text
    Article
  14. 1694

    Optimization Simulation of English Speech RecognitionAccuracy Based on Improved Ant Colony Algorithm by Lu Jing

    Published 2020-01-01
    “…Using new state transition rules and optimal ant parameter selection and other improved methods, the best path can be found in a shorter time and the execution efficiency can be improved. Simulation experiments tested the recognition rates of traditional ant colony algorithm and improved ant colony algorithm. …”
    Get full text
    Article
  15. 1695

    Optimistic Mix-net protocol based on bilinear pairings by Long-hai LI, Shao-feng FU, Rui-dan SU

    Published 2013-11-01
    “…The Mix-net will shuffle and decrypt in-put ciphertexts much faster than all previous Mix-nets with public verifiability when all mix servers execute the mixing protocol honestly.…”
    Get full text
    Article
  16. 1696

    REGIONAL FEATURES OF THE NATIONAL PROJECTS IMPLEMENTATION AND THE ROLE OF CONTROL AND ACCOUNTING BODIES OF OF THE RUSSIAN FEDERATION SUBJECTS IN THE TRANSITION TO PROJECT MANAGEMEN... by M. R. Kara-Sal, V. K. Khomushku

    Published 2020-03-01
    “…The features of the implementation of project management in the executive authorities of the Republic of Tuva have been considered and the essence of the regional project management system has been revealed. …”
    Get full text
    Article
  17. 1697

    Training medical students in participatory rural appraisal methods using ADDIE framework by Saurabh RamBihariLal Shrivastava, Gandes Retno Rahayu, Titi Savitri Prihatiningsih

    Published 2025-01-01
    “…However, all these benefits can only materialize, once we systematically plan and execute the training of medical students, and this essentially requires the adoption of an instructional design. …”
    Get full text
    Article
  18. 1698

    Revolt of Grannies: The Bursylysyas Komi Folk Orthodox Movement by Piret Koosa, Art Leete

    Published 2011-09-01
    “…We argue that men lost their leadership in the movement because their way of execution of religious power was public and thus they became targets for Soviet repression. …”
    Get full text
    Article
  19. 1699

    Analyzing the Pension System of the USSR by A. V. Pudovkin

    Published 2015-04-01
    “…The study presented in the article aims to execute an in-depth analysis of legislature on the soviet pension system with the view to recreate the architecture of the pension system of the USSR. …”
    Get full text
    Article
  20. 1700

    Política de regularização fundiária em Rondônia: limitações do programa terra legal e expectativas socioterritoriais by Alyson Fernando Alves Ribeiro, Ricardo Gilson da Costa Silva, Josefa de Lisboa Santos

    Published 2016-12-01
    “…The presenting text analyzes the development of the program in the Amazon region, with special attention to its execution in the state of Rondônia, from year 2009 to 2014. …”
    Get full text
    Article