Showing 861 - 880 results of 3,481 for search 'executive function', query time: 0.14s Refine Results
  1. 861

    Early functional changes in lewy body dementia: roles of dynamics, locus coeruleus, and compensation by Kristína Mitterová, Eva Výtvarová, Anežka Kovářová, Martin Lamoš, Jan Fousek, Irena Rektorová

    Published 2025-08-01
    “…Both measures (F(2,123) = 1.86, p =.037; F(2,123) = 1.51, p =.023, respectively) were elevated in the intermediate severity groups—that is, in CN-CCF and possible MCI-LB (i.e., one core clinical feature)—and this was associated with better executive functioning after controlling for age and premorbid intelligence (rho = 0.26, p =.004; rho = 0.28, p =.002, respectively). …”
    Get full text
    Article
  2. 862

    Functional connectivity in distributed cortical networks associated with semantic processing in healthy older adults by Kailey G. Langer, Kailey G. Langer, Alexandria G. O’Neal, Alexandria G. O’Neal, Amanda Garcia, Alexa Chen, Eric C. Porges, Eric C. Porges, John B. Williamson, John B. Williamson, John B. Williamson, Adam J. Woods, Adam J. Woods, Ronald A. Cohen, Ronald A. Cohen

    Published 2025-05-01
    “…ObjectiveWhile word knowledge is typically well-preserved in aging, declines in executive control often observed in older adults may impact access and application of this knowledge. …”
    Get full text
    Article
  3. 863

    Synthesis of binary programs with predominance of branching commands by V.V. Zhukov

    Published 2021-12-01
    “…In this article, a model of binary programs that implement the logic algebra functions (Boolean functions) is considered. These programs consist of one or several modules, which include the following three types of commands: computational, branching, and procedure call commands. …”
    Get full text
    Article
  4. 864

    Association of Chronic Pain with Motor Symptom Severity in Parkinson’s Disease: An Exploratory Cross-Sectional Analysis by Niels Pacheco-Barrios, Vivian D. B. Gagliardi, Roberta R. Grudtner, Iloba Gabriel Njokanma, Ben Illigens, John D. Rolston, Felipe Fregni, Kevin Pacheco-Barrios

    Published 2025-02-01
    “…However, significant differences (<i>p</i>-value < 0.05) emerged in motor symptom severity, coping strategies, and several SF-36 domains (Physical and Social Functioning, Role Functioning, Energy/Fatigue, Pain, General Health, and Health Change). …”
    Get full text
    Article
  5. 865
  6. 866

    Benefits and Limitations of Lean Tools in the Building Design Process: A Functional and Comparative Analysis by Adriana Luna, Rodrigo F. Herrera, Karen Castañeda, Edison Atencio, Clarissa Biotto

    Published 2025-05-01
    “…This study aims to identify, classify, and evaluate Lean tools applicable to the building design phase, emphasizing their functionalities, benefits, and limitations. A systematic literature review and expert validation process led to the identification of 16 Lean tools and 26 design-related functionalities. …”
    Get full text
    Article
  7. 867

    Protocol for embedded 3D bioprinting of arterial models with customized contractile and metabolic functions by Huilong Du, Shuyuan Yu, Ziqi Gao, Yuxuan Wang, Huayong Yang, Hongzhao Zhou, Qi Li

    Published 2025-06-01
    “…Here, we present a protocol for constructing multilayered arterial tissues with cellular alignment that enhances vascular smooth muscle function by modulating contractile and synthetic pathways. …”
    Get full text
    Article
  8. 868

    A rapid and robust protocol for generating loss-of-function alleles in pluripotent stem cells by Erdene Baljinnyam, Laura Grisanti, Shalini Tattari, Chiara Pedicone, Bhavana Shewale, Nicole Dubois, Alison M. Goate, William G. Kerr, Samuele G. Marro

    Published 2025-09-01
    “…Summary: The generation of loss-of-function alleles in human pluripotent stem cells (hPSCs) is used to interrogate gene function and validate reagents; however, identifying clones harboring true loss-of-function alleles remains inefficient. …”
    Get full text
    Article
  9. 869

    Protocol for assessing auditory function, cochlear synaptopathy, and afferent terminal morphology in laboratory mice by Indra Pal, Atri Bhattacharyya, Babak V-Ghaffari, Essence Devine Williams, Maolei Xiao, Mark Allen Rutherford, María Eulalia Rubio

    Published 2025-09-01
    “…Summary: Here, we present a protocol for evaluating auditory function and synaptic molecular-structural integrity in mice, specifically female GluA3-knockout (GluA3KO) mice raised in quiet or ambient sound levels. …”
    Get full text
    Article
  10. 870

    Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps by LIU Jian-dong, FU Xiu-li

    Published 2007-01-01
    “…A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution and desired diffusion and confusion properties.Based on the coupled discrete tent spatiotemporal chaotic maps,a cryptographic Hashing function is constructed to generate 128-bit Hash value from a message with arbitrary length.The approach uses the initial value of coupled discrete tent chaotic dynamical system iteration as the secret key.The key space is very large.There is a high sensitivity and complex and strongly nonlinear coupling relation between the Hash value and the corresponding message and secret key.Theoretic analysis and simulation results are shown that the approach possess not only extremely high security in comparison with earlier chaotic Hash functions,but also the high execution speed.Therefore,the approach can satisfy all the performance requirements of Hash function,such as one-way,key sensitivity and collision resistance.…”
    Get full text
    Article
  11. 871

    Dynamic scheduling method of service function chain executors based on the mimic defense architecture by Chuanhuang LI, Jingjing TANG, Yangting CHEN, Rui LEI, Chao CHEN, Weiming WANG

    Published 2022-04-01
    “…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
    Get full text
    Article
  12. 872

    Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps by LIU Jian-dong, FU Xiu-li

    Published 2007-01-01
    “…A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution and desired diffusion and confusion properties.Based on the coupled discrete tent spatiotemporal chaotic maps,a cryptographic Hashing function is constructed to generate 128-bit Hash value from a message with arbitrary length.The approach uses the initial value of coupled discrete tent chaotic dynamical system iteration as the secret key.The key space is very large.There is a high sensitivity and complex and strongly nonlinear coupling relation between the Hash value and the corresponding message and secret key.Theoretic analysis and simulation results are shown that the approach possess not only extremely high security in comparison with earlier chaotic Hash functions,but also the high execution speed.Therefore,the approach can satisfy all the performance requirements of Hash function,such as one-way,key sensitivity and collision resistance.…”
    Get full text
    Article
  13. 873
  14. 874
  15. 875

    Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data by Joel Kinganga, Nathanael Kasoro, Alain Musesa

    Published 2025-03-01
    “…However, many of these systems suffer from limitations such as slow execution times and large key sizes. Objective: This paper presents a novel cryptosystem for text data encryption that integrates elliptic curve cryptography with chaotic functions to enhance data confidentiality and security. …”
    Get full text
    Article
  16. 876

    Bioactive Metabolites of <i>Dioscorea</i> Species and Their Potential Applications in Functional Food Development by Pengcheng Wang, Yashi Wang, Shiqi Liu, Kai Wang, Yuxuan Yao, Weizhen Liu, Donghui Li, Wei Wang, Bin Li, Yupei Yang

    Published 2025-07-01
    “…Additionally, we discuss the functional food applications and regulations of <i>Dioscorea</i> spp., which possess antioxidant, anti-inflammatory, anti-diabetic, and anticancer properties. …”
    Get full text
    Article
  17. 877

    Development of an in vivo RNAi protocol to investigate gene function in the filarial nematode, Brugia malayi. by Chuanzhe Song, Jack M Gallup, Tim A Day, Lyric C Bartholomay, Michael J Kimber

    Published 2010-12-01
    “…RNA interference (RNAi) is a reverse-genetics tool with great potential to identify novel drug targets and interrogate parasite gene function, but present RNAi protocols for parasitic nematodes, which remove the parasite from the host and execute RNAi in vitro, are unreliable and inconsistent. …”
    Get full text
    Article
  18. 878

    Hybrid Artificial Neural Network Activation Function to Reduce Water Wastage in Agricultural Irrigation by Baraa H. Jawad, Ola A. Alwesabi, Nibras Abdullah, Ahmed Abed Mohammed

    Published 2025-01-01
    “…The achievement of this is done by utilizing a hybrid activation function known as TanElu, which combines the Tanh and ELU functions. …”
    Get full text
    Article
  19. 879

    Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices by Abdullah Sevin

    Published 2025-02-01
    “…Experimental results indicate that the proposed hash function performs comparably to the BLAKE implementation, with slightly slower execution for large message sizes but marginally better performance for smaller ones. …”
    Get full text
    Article
  20. 880

    Different morphology and function of hip extensor muscles between sprint runners and sprint cyclists by Yuta Yamaguchi, Tetsunari Nishiyama, Naoki Wada, Wataru Fukuda, Masuhiko Mizuno, Mitsuo Otsuka

    Published 2025-05-01
    “…Abstract During a specific task, the whole-body motion favors those with muscles suited for its execution; in addition, it leads to adaptations in muscle morphology and function of muscles. …”
    Get full text
    Article