Search alternatives:
commuting » competing (Expand Search)
Showing 7,361 - 7,380 results of 7,907 for search '(commuting OR computing) behavior', query time: 0.15s Refine Results
  1. 7361
  2. 7362

    Does music counteract mental fatigue? A systematic review. by Cong Ding, Soh Kim Geok, He Sun, Samsilah Roslan, Shudian Cao, Yue Zhao

    Published 2025-01-01
    “…Personal preference music is effective in counteracting behavioral performance decrements in motor control and endurance tasks. …”
    Get full text
    Article
  3. 7363

    ACIVY: An Enhanced IVY Optimization Algorithm with Adaptive Cross Strategies for Complex Engineering Design and UAV Navigation by Heming Jia, Mahmoud Abdel-salam, Gang Hu

    Published 2025-07-01
    “…The Adaptive Cross Ivy (ACIVY) algorithm is a novel bio-inspired metaheuristic that emulates ivy plant growth behaviors for complex optimization problems. While the original Ivy Optimization Algorithm (IVYA) demonstrates a competitive performance, it suffers from limited inter-individual information exchange, inadequate directional guidance for local optima escape, and abrupt exploration–exploitation transitions. …”
    Get full text
    Article
  4. 7364
  5. 7365
  6. 7366

    Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis by Du Tianqing

    Published 2025-01-01
    “…In this paper, PCAP refers to Packet Capture, Network Intrusion Detection Systems refers to NIDS, Artificial Intelligence refers to AI, machine learning refers to ML, Computer Vision refers to CV, and Natural Language Processing refers to NLP. …”
    Get full text
    Article
  7. 7367

    Study of an Extensive Set of Eye Movement Features: Extraction Methods and Statistical Analysis by Ioannis Rigas, Lee Friedman, Oleg Komogortsev

    Published 2018-03-01
    “…The presented methods and analysis can provide a valuable tool for researchers in various fields that explore eye movements, such as in behavioral studies, attention and cognition research, medical research, biometric recognition, and human-computer interaction.…”
    Get full text
    Article
  8. 7368

    Multi-Fidelity Temporal Reasoning: A Stratified Logic for Cross-Scale System Specifications by Ali Baheri, Peng Wei

    Published 2025-06-01
    “…We present <b>S</b>tratified <b>M</b>etric <b>T</b>emporal <b>L</b>ogic (SMTL), a novel formalism for specifying and verifying the properties of complex cyber–physical systems that exhibit behaviors across multiple temporal and abstraction scales. …”
    Get full text
    Article
  9. 7369

    Cognitive Intraindividual Variability and White Matter Integrity in Aging by Nathalie Mella, Sandrine de Ribaupierre, Roy Eagleson, Anik de Ribaupierre

    Published 2013-01-01
    “…For both methods, fractional anisotropy, along with the mean, radial, and axial diffusivity parameters, was computed. In accord with previous studies, our results showed that the DTI parameters were more related to IIV than to mean performance. …”
    Get full text
    Article
  10. 7370
  11. 7371
  12. 7372
  13. 7373
  14. 7374
  15. 7375
  16. 7376
  17. 7377

    Current Status and Research Trend on Ecological Migration of Radionuclides and Radiation Dose Assessment by LIU Senlin, WU Renjie, ZHANG Xinyu, LI Jinfeng

    Published 2024-10-01
    “…From multi-dimensional perspectives, such as computational models, evaluation methods, and parameters, etc., this paper explores the transport and transfer behaviors of radionuclides in the ecological environment. …”
    Get full text
    Article
  18. 7378
  19. 7379

    Combining Supervised and Reinforcement Learning to Build a Generic Defensive Cyber Agent by Muhammad Omer Farooq, Thomas Kunz

    Published 2025-05-01
    “…Sophisticated mechanisms for attacking computer networks are emerging, making it crucial to have equally advanced mechanisms in place to defend against these malicious attacks. …”
    Get full text
    Article
  20. 7380