Showing 3,201 - 3,220 results of 3,481 for search 'executive function', query time: 0.11s Refine Results
  1. 3201

    Coping with pain among adults with chronic tic disorders by Agnieszka Małek

    Published 2025-07-01
    “…Pain can result from the repetitive nature of tics, leading to muscle strain, joint stress, or even injury due to the forceful execution of movements. Additionally, pain resulting from rapid and repeated movements or vocalizations can contribute to chronic discomfort, significantly affecting daily functioning and quality of life. …”
    Get full text
    Article
  2. 3202

    Concept design, application and optimization of operational parameters for new forced safety injection tank system [version 2; peer review: 2 approved] by Hyun Gook Kang, Asad Ullah Amin Shah, Ali Mansoor, Junyung Kim

    Published 2025-05-01
    “…Background The engineered safety systems are designed to execute fundamental safety functions encompassing reactivity confinement, reactivity control and decay heat removal. …”
    Get full text
    Article
  3. 3203

    Comparative analysis of spring mechanisms of vibroprotective chairs of road construction machines by Korytov M.S., Sherbakov V.S., Pochekueva I.E.

    Published 2020-03-01
    “…In addition, the dependences of the values of the curvature of the functions of the vertical forces of the three mechanisms on the vertical movement of the working point are obtained by a numerical method. …”
    Get full text
    Article
  4. 3204

    Recognition of State of Health Based on Discharge Curve of Battery by Signal Temporal Logic by Jing Ning, Bing Xiao, Wenhui Zhong

    Published 2025-02-01
    “…Secondly, the impurity measures of the information gain, misclassification gain, Gini gain, and robust extended gain are presented as the objective functions. Thirdly, the interpreter embedded in the MCU can interpret and execute each STL sentence. …”
    Get full text
    Article
  5. 3205

    TECHNOLOGICAL CAPABILITY MODEL FOR INNOVATION MANAGEMENT FOR AEROSPACE ENTERPRISE by Cezar Honorato, Herlandí de Souza Andrade, Francisco Lourenço de Melo

    Published 2025-06-01
    “…To achieve this goal, the research method applied was action research, starting with the mapping of the literature to identify the most relevant studies, recognize the state-of-the-art, theoretical propositions and in a collaborative way with the participation of experts and professionals that act, directly or indirectly, in the innovations development; the model is co-creation under two evaluation perspectives: the first called technological functions that represent the main areas that have an impact on the success in evaluating strategies, planning, development, execution and in the innovations results in industrial companies and the second perspective that are the competence levels, which at the highest level strongly favor and support innovation in industrial companies, so that organizations can measure themselves, compare themselves with others and, through planning, achieve excellence. …”
    Get full text
    Article
  6. 3206

    Configuring adaptive PID-controllers of the automatic speed control system of the GTE by K. E. Chertilin, V. D. Ivchenko

    Published 2020-12-01
    “…The parameters of the "classic" controller were optimized using linear programming methods. The membership functions and the rule base were proposed for the fuzzy controller. …”
    Get full text
    Article
  7. 3207

    NVPE: An FPGA-Based Non-Volatile Processor Emulator for Intermittent Computing by Idris Somoye, Kevin Yang

    Published 2024-05-01
    “…As a case study, an AES block cipher is executed throughout power-down and power-up sequences. …”
    Get full text
    Article
  8. 3208

    Multi-robot path planning in online dynamic obstacle environments based on parallel cooperative strategy optimization algorithm by Chia-Hung Wang, Kun Hu, Xiaojing Wu

    Published 2025-07-01
    “…The algorithm’s performance was tested using 10-dimensional and 20-dimensional benchmark functions from the CEC2022 test suite and compared with other state-of-the-art algorithms, such as GA, PSO, and RSA. …”
    Get full text
    Article
  9. 3209

    F@BOOL@: experiment with a simple verifying compiler based on SAT-solvers by N. V. Shilov

    Published 2010-12-01
    “…A verifying compiler is a system computer program that translates programs written by man from a high-level language into equivalent executable programs, and besides, proves (veri¯es) mathematical statements speci¯ed by man about the properties of the programs being translated. …”
    Get full text
    Article
  10. 3210

    Quantum Approximate Optimization Algorithm for the Max-Cut Problem: JavaScript Programming Language Implementation by Dmytro Sapozhnyk

    Published 2024-11-01
    “…The framework includes functions for building quantum circuits, optimizing the parameters of the QAOA algorithm, and visualizing the resulting quantum states. …”
    Get full text
    Article
  11. 3211

    Validation of an Eye-Tracking Algorithm Based on Smartphone Videos: A Pilot Study by Wanzi Su, Damon Hoad, Leandro Pecchia, Davide Piaggio

    Published 2025-06-01
    “…<b>Methods:</b> The investigation primarily focused on comparing two algorithms, which were named CHT_TM and CHT_ACM, abbreviated from the core functions: Circular Hough Transform (CHT), Active Contour Models (ACMs), and Template Matching (TM). …”
    Get full text
    Article
  12. 3212

    Investigation of Technological Operations Affecting the Determination of Concentration of Ionol Additive in Insulating Oil in High-Voltage Equipment by Korobeynikov S.M., Lyutikova M.N.

    Published 2018-04-01
    “…Executed researches show that the main input into “correct” final result obtention during calculation of additional additive concentration was made by such technological operations as water content in extractant and technology of sample introduction into chromatograph’s evaporation tank…”
    Get full text
    Article
  13. 3213

    Anxiety in Children: The Contribution of Parental Characteristics by Beáta Bécsi, Jenifer Pataki, Gergő József Szőllősi

    Published 2025-04-01
    “…<b>Methods</b>: The data were sourced from a Hungarian representative database from 2019. The analysis was executed using multivariate and multiple logistic regressions. …”
    Get full text
    Article
  14. 3214

    Development of a Cloud Service for Comprehensive Research of Polymer Synthesis Processes by Eldar Miftakhov, Sofya Mustafina, Anastasiya Kashnikova, Andrey Akimov

    Published 2024-12-01
    “…The storage subsystem is managed by the MongoDB database management system, which supports distributed information storage functions. The organization of test computational experiments in evaluating the detailed properties of polymer products allowed for the assessment of the system’s core logic in web interface mode and the adequacy of the obtained calculation results.   …”
    Get full text
    Article
  15. 3215

    Neurocognitive factors of new drone Pilots: Identifying candidates with expert potential by Miguel A. Ramallo-Luna, Sara Gonzalez-Torre, Álvaro Rodríguez-Mora, Gabriel G. de la Torre

    Published 2025-08-01
    “…Participants completed the WinSCAT, which assessed neurocognitive functions such as visuospatial working memory, attention, and processing speed. …”
    Get full text
    Article
  16. 3216

    Non-Profiled Partial Nibble Recovery on Power Attack Resilient Adiabatic PRESENT Block Cipher Through AI Vulnerability Assessment by Anjana Jyothi Banu, A. A.

    Published 2025-01-01
    “…Artificial Intelligence (AI) techniques, by eliminating the need for prior knowledge of cryptographic algorithms, have emerged as powerful tools for executing effective SCAs on secure implementations. …”
    Get full text
    Article
  17. 3217

    Risk Mitigation of a Heritage Bridge Using Noninvasive Sensors by Ricky W. K. Chan, Takahiro Iwata

    Published 2025-06-01
    “…This model enabled the execution of various “what-if” simulations, including passage of overweight vehicles and loss of foundation due to scouring, providing quantitative assessments of potential risk scenarios. …”
    Get full text
    Article
  18. 3218

    A Data-Driven Artificial Neural Network Approach to Software Project Risk Assessment by Mohammed Naif Alatawi, Saleh Alyahyan, Shariq Hussain, Abdullah Alshammari, Abdullah A. Aldaeej, Ibrahim Khalil Alali, Hathal Salamah Alwageed

    Published 2023-01-01
    “…We compare the performance of mean squared error (MSE) and mean absolute error (MAE) as error functions and find that MAE yields superior results. …”
    Get full text
    Article
  19. 3219

    D-BADGE: Decision-Based Adversarial Batch Attack With Directional Gradient Estimation by Geunhyeok Yu, Minwoo Jeon, Hyoseok Hwang

    Published 2024-01-01
    “…This simple yet efficient decision-based method functions similarly to a score-based attack, enabling the generation of UAPs in real-world scenarios, and can be easily extended to targeted attacks. …”
    Get full text
    Article
  20. 3220

    OpenStage: a low-cost motorized microscope stage with sub-micron positioning accuracy. by Robert A A Campbell, Robert W Eifert, Glenn C Turner

    Published 2014-01-01
    “…Recent progress in intracellular calcium sensors and other fluorophores has promoted the widespread adoption of functional optical imaging in the life sciences. Home-built multiphoton microscopes are easy to build, highly customizable, and cost effective. …”
    Get full text
    Article