Showing 2,481 - 2,500 results of 3,481 for search 'executive function', query time: 0.14s Refine Results
  1. 2481

    Mined Block Withholding and Imposed Fork by Using Mining Pool Alliance Strategic—A Case Study in Bitcoin System by Yean-Fu Wen, Ming-Fang Chen

    Published 2025-01-01
    “…We developed algorithms to conduct simulation solutions based on the consensus mechanism of the Bitcoin operation, except for the hash function execution. The calculation results are replaced with two types of balls that represent hash values that satisfy the threshold of the mined block. …”
    Get full text
    Article
  2. 2482

    Deep Reinforcement Learning in Non-Markov Market-Making by Luca Lalor, Anatoliy Swishchuk

    Published 2025-02-01
    “…Next, we discuss the training and testing results, where we provide visuals of how important deterministic and stochastic processes such as the bid/ask prices, trade executions, inventory, and the reward function evolved. …”
    Get full text
    Article
  3. 2483

    A Coordinated Pumped Storage Dual Compensated Hydro Governor with PSS Action to Damp Electromechanical Power Oscillations by Narayan Nahak, Samarjeet Satapathy

    Published 2022-01-01
    “…Again, subject to critical oscillatory unstable conditions, the DCG is coordinated with PSS through a multiobjective function employing a new modified Differential Evolutionary-Particle swarm optimization (MDEPSO) algorithm. …”
    Get full text
    Article
  4. 2484

    Comparative Analysis of Stability to Induced Deadlocks for Computing Grids with Various Node Architectures by Tatiana R. Shmeleva

    Published 2018-04-01
    “…After a detailed study, it is shown that the traffic duel configuration does not affect the grid with cut-through nodes if the workload is increases to the peak load, at which the grid comes to a complete deadlock. The execution intensity of guns which generate a malicious traffic is determined by a random function with the Poisson distribution. …”
    Get full text
    Article
  5. 2485

    Potential guidelines for cataract surgery and rehabilitation in visually impaired patients: Literature analysis by Paolo Giuseppe Limoli, Celeste Limoli, Marcella Nebbioso

    Published 2024-12-01
    “…Patients with visual impairments rely on retinal regions with the greatest residual function, and cataract surgery aims to enhance focus on these areas, improving reading quality and reducing scotoma perception. …”
    Get full text
    Article
  6. 2486

    Cooperative UAV clustering for fair coverage of communication regions by Jiehong Wu, Linpeng Gu, Zhongli Jia, Jinsong Wu

    Published 2025-03-01
    “…Our solution is a centralized training distributed execution architecture and defines a cluster structure for leader UAVs and follower UAVs. …”
    Get full text
    Article
  7. 2487

    Exploring Fintech, financial literacy, and stock market participants nexus in Dar es Salaam Stock Exchange, Tanzania by Abraham Charles Nathanael, Magwana Ibrahim Ngollo

    Published 2025-08-01
    “…Furthermore, the study emphasizes the essential function of financial literacy, suggesting that elevated levels of financial knowledge are positively correlated with an increase in stock market participation. …”
    Get full text
    Article
  8. 2488

    AUDIT COMMITTEE’S ATTRIBUTES AND QUALITY OF FINANCIAL REPORTING ON LISTED CONSUMER GOODS FIRMS IN NIGERIA by Idris Kayode MUHAMMED, Ganiyu ABDULYAKEEN, Kate Theophilus AJIDE, Kolapo Olufemi OYALEKE

    Published 2024-10-01
    “…To maintain an effective oversight function and foster a positive environment for the legally required audit that promotes a reliable and unbiased perspective of the financial information, this study proposed that the governing board of executives guarantee the nomination of appropriate audit committee members who have adequate financial skills, including shareholders. …”
    Get full text
    Article
  9. 2489

    Ensuring the integrity of information in an autonomous group of unmanned aerial vehicles by methods of modular arithmetic by Dmitriy Vladimirovich Samoylenko, Oleg Anatolievich Finko

    Published 2022-09-01
    “…When performing special tasks autonomous group drones form a spatially distributed and scalable data processing system with unpredictable and dynamically changeable structure in which the execution of the main "target" function to process information depends on the communication environment. …”
    Get full text
    Article
  10. 2490

    The effect of the strategy to nominate ideas on divided and selective attention and perform some volleyball skills by Fadya Abdul Hussein Kadhim, Alyaa Hussein Farhan, Tahseen Husnl Tahseen, Suhad Qassem Saeed Al-Mousawi, Haider Radhi Raheem

    Published 2025-02-01
    “… Introduction: Attention is a fundamental cognitive function in sports, particularly in volleyball, where players must process multiple stimuli and make rapid decisions. …”
    Get full text
    Article
  11. 2491

    Optimal Computation Offloading Decisions Based on System Utility and Cost Balance by Bingxue Zhang, Xisheng Li, Jia You

    Published 2025-01-01
    “…Based on the new evaluation model, an objective function is constructed to minimize the system’s cost-utility ratio, and an improved particle swarm optimization algorithm with enhanced search capabilities is proposed to solve it by designing a computation offloading strategy. …”
    Get full text
    Article
  12. 2492

    Exploring the Future Energy Value of Long-Duration Energy Storage by Anna H. Schleifer, Stuart M. Cohen, Wesley Cole, Paul Denholm, Nate Blair

    Published 2025-03-01
    “…Long-duration storage value and deployment potential are a function of evolving electricity sector infrastructure, markets, and policy, making it critical to consistently revisit potential long-duration storage contributions to the grid.…”
    Get full text
    Article
  13. 2493

    A new method of task aggregation and optimization allocation for multiple groups collaborative task networks by WeiWei Du, XiaoWei Chen

    Published 2025-07-01
    “…The clustering cost function for tasks is constructed by analyzing the similarity between formation force locations and resource requirements, and between sub-task locations and resource requirements. …”
    Get full text
    Article
  14. 2494

    Left Bronchial Sleeve Resection for Metastatic Typical Carcinoid: A Case Report and Literature Review by Abdelrahman Mohamed, Mohamed Rahouma

    Published 2025-01-01
    “…The successful outcome underscores the importance of meticulous surgical planning and execution in achieving favorable results in complex thoracic surgeries.…”
    Get full text
    Article
  15. 2495

    Design of a personalized oral‒motor exercise device for speech impairment rehabilitation by Seong Tak Woo, Ji-Wan Ha, Sungdae Na

    Published 2025-03-01
    “…Current devices used for rehabilitation often fail to accurately assess exercise execution, which limits their effectiveness.Methods: This study introduces a novel oral-motor rehabilitation device designed to overcome these limitations. …”
    Get full text
    Article
  16. 2496

    Exploring Image Decolorization: Methods, Implementations, and Performance Assessment by Ivana Žeger, Ivan Šetka, Domagoj Marić, Sonja Grgic

    Published 2024-12-01
    “…This paper discusses the decolorization process and provides an overview of the methods based on the different principles used: basic conversion from RGB to YUV format using ITU Recommendations 601, 709, and 2020; basic conversion from RGB to LAB color space; the method using cumulative distribution function of color channels; one global decolorization method; and one based on deep learning. …”
    Get full text
    Article
  17. 2497

    A UAV path planning algorithm for bridge construction safety inspection in complex terrain by Wenyuan Xu, Chuang Cui, Yongcheng Ji, Xiang Li, Shuai Li

    Published 2025-04-01
    “…Thereby, UAVs are empowered to execute path-planning endeavors expeditiously and precisely within intricate environments.…”
    Get full text
    Article
  18. 2498

    ANALYSIS OF MEDICAL SERVICE CONTROL PROCESS IN THE SCOPE OF COMPULSORY HEALTH INSURANCE PROGRAM by M. A. Taranik, G. D. Kopanitsa

    Published 2015-06-01
    “…In respect that human factor influence on the main stages of the analyzed process, we propose to use fuzzy logic as an inference engine. The self-learning function of the system will provide case-based reasoning.…”
    Get full text
    Article
  19. 2499

    A recurrent multimodal sparse transformer framework for gastrointestinal disease classification by V. Sharmila, S. Geetha

    Published 2025-07-01
    “…Classification is performed using an ensemble of random forest KNN, proximal policy optimization (PPO), and a sparse radial basis function (RBF) kernel to ensure accuracy and interpretability. …”
    Get full text
    Article
  20. 2500

    Two-party cooperative blind signature based on SM2 by Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG

    Published 2022-12-01
    “…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
    Get full text
    Article