Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 4
- Management 4
- Executive ability 3
- Methodology 3
- Common law 2
- History 2
- Interpretation and construction 2
- Law 2
- African Americans 1
- Business and Management 1
- Character 1
- Communication 1
- Corporate culture 1
- Courtship 1
- Decision making 1
- Evaluation 1
- Executive coaching 1
- Farmers 1
- Financial services industry 1
- Führung 1
- Integrity 1
- Internet marketing 1
- Organizational change 1
- Policy sciences 1
- Political planning 1
- Quality control 1
- Quantitative research 1
- Research 1
- Six sigma (Quality control standard) 1
- Social justice 1
-
1681
Sex-specific associations between estimated glucose disposal rate and cognitive decline in middle-aged and older adults in China: a longitudinal cohort study
Published 2025-02-01“…Cognitive function was calculated as the sum of episodic memory and executive function scores, which was then standardized to a Z-score. …”
Get full text
Article -
1682
Assessing the Impact of a Virtual Reality Cognitive Intervention on Tennis Performance in Junior Tennis Players: Pilot Study
Published 2025-02-01“… BackgroundThere is evidence that cognitive training interventions can positively impact executive functions, and that some studies have demonstrated that athletes typically exhibit greater accuracy and faster response times on select cognitive tasks. …”
Get full text
Article -
1683
Protocol for genetic analysis of population-scale ultra-low-depth sequencing data
Published 2025-03-01“…This protocol applies to a wide range of ultra-low-depth sequencing studies, extending beyond data from NIPT.For complete details on the use and execution of this profile, please refer to Xiao et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1684
Protocol for generating splice isoform-specific mouse mutants using CRISPR-Cas9 and a minigene splicing reporter
Published 2025-03-01“…Splice isoform-specific mouse mutants provide valuable tools for genetic analyses beyond loss-of-function and transgenic alleles.For complete details on the use and execution of this protocol, please refer to Dailey-Krempel et al.1 and Johnson et al.2 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1685
Collaborative Cacbe Management Strategy Based on Ant-Colony Replacement Algoritbm in Named Data Networking
Published 2014-09-01“…The cache replacement problem in a single node was modeled as a 0/1 knapsack problem firstly, which could be well solved by an ant-colony replacement algorithm. To facilitate the execution of the algorithm, the inner content caching value was calculated by taking into account the size of the content, the access frequency of the content, and the status of neighboring cache copies. …”
Get full text
Article -
1686
Software-defined cross-domain scheduling mechanism for time-sensitive networking
Published 2021-10-01“…For the cross domain scheduling problem of time-sensitive network, a software-defined cross-domain scheduling mechanism for time-sensitive networking was proposed, which was based on three kinds of wide area clock synchronization technology to ensure nanosecond inter-domain time synchronization.Then, a time slot conflict-free cross domain scheduling model was proposed to solve the problem of time slot alignment caused by inter-domain link delay.The time slot conflict-free constraints were used to strictly limit the arrival time of cross-domain traffic at the edge node.Finally, the gate control list of fusion domains for global scheduling was calculated online.The simulation results show that the model can schedule hundreds of time-sensitive traffic in a typical cross-domain remote control scenario, and has a feasible algorithm execution time in seconds.…”
Get full text
Article -
1687
Audit committee characteristics and audit report lag: evidence from the Iran
Published 2022-03-01“…This suggests that more experts and non-executive members on the audit committee minimize audit report lag and reduce the timeliness constraint that dominates the qualitative characteristics financial information. …”
Get full text
Article -
1688
Impaired Functional Connectivity in the Prefrontal Cortex: A Mechanism for Chronic Stress-Induced Neuropsychiatric Disorders
Published 2016-01-01“…We propose that chronic stress impairs mechanisms involved in neuronal functional connectivity in the PFC that are required for the formation of adaptive representations for the execution of adaptive behavioral responses. These considerations could be particularly relevant for understanding the pathophysiology of chronic stress-related neuropsychiatric disorders.…”
Get full text
Article -
1689
New IGIP Curriculum for Advanced Training of Engineering University Teachers
Published 2021-01-01“…The discussion of the new Curriculum for pedagogical training of teachers of technical disciplines, prior to its approval by the IGIP Executive Committee in the fall of 2019 is considered. …”
Get full text
Article -
1690
Light weighted privacy protection ViT inference framework based on secret sharing
Published 2024-04-01“…Two edge servers collaborated to execute secure computing protocols based on secret sharing design, such as SSoftmax, SLayerNorm, SGeLU, etc. …”
Get full text
Article -
1691
Multilevel Association Rule Mining for Bridge Resource Management Based on Immune Genetic Algorithm
Published 2014-01-01“…In this paper, firstly, a cross level coding scheme for mining the multilevel association rules is proposed. Secondly, we execute the immune genetic algorithm with the coding scheme for analyzing BRM. …”
Get full text
Article -
1692
Data access control policy of encrypted deduplication system
Published 2020-05-01“…To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such as identity authentication,authorization deduplication and the update of access control policy.The outsourced data was only deduplicated with the authorized users,and the unauthorized users couldn’t obtain any data information.CP-ABE and the partition of the ElGamal private key were used to update the access control policy of data.Self-control objects was used to encapsulate user’s data and its access policy,providing authentication for data visitors and ensuring the access control policies enforced effectively.Security analysis and simulation results demonstrate that the proposed system enables data access control and executes efficiently.…”
Get full text
Article -
1693
Edward Jurgens i Karol Ruprecht. Polacy z wyboru wobec polskich ruchów niepodległościowych w XIX wieku
Published 2024-01-01“…Ruprecht was sentenced to death in 1846 for his conspiratorial activities, but then pardoned at the very last moment before execution, and in 1863 he was a member of the National Government. …”
Get full text
Article -
1694
Optimization Simulation of English Speech RecognitionAccuracy Based on Improved Ant Colony Algorithm
Published 2020-01-01“…Using new state transition rules and optimal ant parameter selection and other improved methods, the best path can be found in a shorter time and the execution efficiency can be improved. Simulation experiments tested the recognition rates of traditional ant colony algorithm and improved ant colony algorithm. …”
Get full text
Article -
1695
Optimistic Mix-net protocol based on bilinear pairings
Published 2013-11-01“…The Mix-net will shuffle and decrypt in-put ciphertexts much faster than all previous Mix-nets with public verifiability when all mix servers execute the mixing protocol honestly.…”
Get full text
Article -
1696
REGIONAL FEATURES OF THE NATIONAL PROJECTS IMPLEMENTATION AND THE ROLE OF CONTROL AND ACCOUNTING BODIES OF OF THE RUSSIAN FEDERATION SUBJECTS IN THE TRANSITION TO PROJECT MANAGEMEN...
Published 2020-03-01“…The features of the implementation of project management in the executive authorities of the Republic of Tuva have been considered and the essence of the regional project management system has been revealed. …”
Get full text
Article -
1697
Training medical students in participatory rural appraisal methods using ADDIE framework
Published 2025-01-01“…However, all these benefits can only materialize, once we systematically plan and execute the training of medical students, and this essentially requires the adoption of an instructional design. …”
Get full text
Article -
1698
Revolt of Grannies: The Bursylysyas Komi Folk Orthodox Movement
Published 2011-09-01“…We argue that men lost their leadership in the movement because their way of execution of religious power was public and thus they became targets for Soviet repression. …”
Get full text
Article -
1699
Analyzing the Pension System of the USSR
Published 2015-04-01“…The study presented in the article aims to execute an in-depth analysis of legislature on the soviet pension system with the view to recreate the architecture of the pension system of the USSR. …”
Get full text
Article -
1700
Política de regularização fundiária em Rondônia: limitações do programa terra legal e expectativas socioterritoriais
Published 2016-12-01“…The presenting text analyzes the development of the program in the Amazon region, with special attention to its execution in the state of Rondônia, from year 2009 to 2014. …”
Get full text
Article