-
3201
Coping with pain among adults with chronic tic disorders
Published 2025-07-01“…Pain can result from the repetitive nature of tics, leading to muscle strain, joint stress, or even injury due to the forceful execution of movements. Additionally, pain resulting from rapid and repeated movements or vocalizations can contribute to chronic discomfort, significantly affecting daily functioning and quality of life. …”
Get full text
Article -
3202
Concept design, application and optimization of operational parameters for new forced safety injection tank system [version 2; peer review: 2 approved]
Published 2025-05-01“…Background The engineered safety systems are designed to execute fundamental safety functions encompassing reactivity confinement, reactivity control and decay heat removal. …”
Get full text
Article -
3203
Comparative analysis of spring mechanisms of vibroprotective chairs of road construction machines
Published 2020-03-01“…In addition, the dependences of the values of the curvature of the functions of the vertical forces of the three mechanisms on the vertical movement of the working point are obtained by a numerical method. …”
Get full text
Article -
3204
Recognition of State of Health Based on Discharge Curve of Battery by Signal Temporal Logic
Published 2025-02-01“…Secondly, the impurity measures of the information gain, misclassification gain, Gini gain, and robust extended gain are presented as the objective functions. Thirdly, the interpreter embedded in the MCU can interpret and execute each STL sentence. …”
Get full text
Article -
3205
TECHNOLOGICAL CAPABILITY MODEL FOR INNOVATION MANAGEMENT FOR AEROSPACE ENTERPRISE
Published 2025-06-01“…To achieve this goal, the research method applied was action research, starting with the mapping of the literature to identify the most relevant studies, recognize the state-of-the-art, theoretical propositions and in a collaborative way with the participation of experts and professionals that act, directly or indirectly, in the innovations development; the model is co-creation under two evaluation perspectives: the first called technological functions that represent the main areas that have an impact on the success in evaluating strategies, planning, development, execution and in the innovations results in industrial companies and the second perspective that are the competence levels, which at the highest level strongly favor and support innovation in industrial companies, so that organizations can measure themselves, compare themselves with others and, through planning, achieve excellence. …”
Get full text
Article -
3206
Configuring adaptive PID-controllers of the automatic speed control system of the GTE
Published 2020-12-01“…The parameters of the "classic" controller were optimized using linear programming methods. The membership functions and the rule base were proposed for the fuzzy controller. …”
Get full text
Article -
3207
NVPE: An FPGA-Based Non-Volatile Processor Emulator for Intermittent Computing
Published 2024-05-01“…As a case study, an AES block cipher is executed throughout power-down and power-up sequences. …”
Get full text
Article -
3208
Multi-robot path planning in online dynamic obstacle environments based on parallel cooperative strategy optimization algorithm
Published 2025-07-01“…The algorithm’s performance was tested using 10-dimensional and 20-dimensional benchmark functions from the CEC2022 test suite and compared with other state-of-the-art algorithms, such as GA, PSO, and RSA. …”
Get full text
Article -
3209
F@BOOL@: experiment with a simple verifying compiler based on SAT-solvers
Published 2010-12-01“…A verifying compiler is a system computer program that translates programs written by man from a high-level language into equivalent executable programs, and besides, proves (veri¯es) mathematical statements speci¯ed by man about the properties of the programs being translated. …”
Get full text
Article -
3210
Quantum Approximate Optimization Algorithm for the Max-Cut Problem: JavaScript Programming Language Implementation
Published 2024-11-01“…The framework includes functions for building quantum circuits, optimizing the parameters of the QAOA algorithm, and visualizing the resulting quantum states. …”
Get full text
Article -
3211
Validation of an Eye-Tracking Algorithm Based on Smartphone Videos: A Pilot Study
Published 2025-06-01“…<b>Methods:</b> The investigation primarily focused on comparing two algorithms, which were named CHT_TM and CHT_ACM, abbreviated from the core functions: Circular Hough Transform (CHT), Active Contour Models (ACMs), and Template Matching (TM). …”
Get full text
Article -
3212
Investigation of Technological Operations Affecting the Determination of Concentration of Ionol Additive in Insulating Oil in High-Voltage Equipment
Published 2018-04-01“…Executed researches show that the main input into “correct” final result obtention during calculation of additional additive concentration was made by such technological operations as water content in extractant and technology of sample introduction into chromatograph’s evaporation tank…”
Get full text
Article -
3213
Anxiety in Children: The Contribution of Parental Characteristics
Published 2025-04-01“…<b>Methods</b>: The data were sourced from a Hungarian representative database from 2019. The analysis was executed using multivariate and multiple logistic regressions. …”
Get full text
Article -
3214
Development of a Cloud Service for Comprehensive Research of Polymer Synthesis Processes
Published 2024-12-01“…The storage subsystem is managed by the MongoDB database management system, which supports distributed information storage functions. The organization of test computational experiments in evaluating the detailed properties of polymer products allowed for the assessment of the system’s core logic in web interface mode and the adequacy of the obtained calculation results. …”
Get full text
Article -
3215
Neurocognitive factors of new drone Pilots: Identifying candidates with expert potential
Published 2025-08-01“…Participants completed the WinSCAT, which assessed neurocognitive functions such as visuospatial working memory, attention, and processing speed. …”
Get full text
Article -
3216
Non-Profiled Partial Nibble Recovery on Power Attack Resilient Adiabatic PRESENT Block Cipher Through AI Vulnerability Assessment
Published 2025-01-01“…Artificial Intelligence (AI) techniques, by eliminating the need for prior knowledge of cryptographic algorithms, have emerged as powerful tools for executing effective SCAs on secure implementations. …”
Get full text
Article -
3217
Risk Mitigation of a Heritage Bridge Using Noninvasive Sensors
Published 2025-06-01“…This model enabled the execution of various “what-if” simulations, including passage of overweight vehicles and loss of foundation due to scouring, providing quantitative assessments of potential risk scenarios. …”
Get full text
Article -
3218
A Data-Driven Artificial Neural Network Approach to Software Project Risk Assessment
Published 2023-01-01“…We compare the performance of mean squared error (MSE) and mean absolute error (MAE) as error functions and find that MAE yields superior results. …”
Get full text
Article -
3219
D-BADGE: Decision-Based Adversarial Batch Attack With Directional Gradient Estimation
Published 2024-01-01“…This simple yet efficient decision-based method functions similarly to a score-based attack, enabling the generation of UAPs in real-world scenarios, and can be easily extended to targeted attacks. …”
Get full text
Article -
3220
OpenStage: a low-cost motorized microscope stage with sub-micron positioning accuracy.
Published 2014-01-01“…Recent progress in intracellular calcium sensors and other fluorophores has promoted the widespread adoption of functional optical imaging in the life sciences. Home-built multiphoton microscopes are easy to build, highly customizable, and cost effective. …”
Get full text
Article