Results 41 to 50 of about 370,315 (286)

Required force for distraction during medial opening wedge high tibial osteotomy may serve as a predictive indicator for lateral hinge fracture

open access: yesJournal of Experimental Orthopaedics
Introduction Medial open wedge high tibial osteotomy is a biological procedure for treating unicompartmental knee osteoarthritis. The literature repeatedly highlights the significance of preserving an intact lateral hinge during this procedure.
Baran Soykan   +4 more
doaj   +1 more source

Acute exercise and aerobic fitness influence selective attention during visual search

open access: yesFrontiers in Psychology, 2014
Successful goal directed behavior relies on a human attention system that is flexible and able to adapt to different conditions of physiological stress.
Tom eBullock   +3 more
doaj   +1 more source

Privacy and Usability of Image and Text Based Challenge Questions Authentication in Online Examination [PDF]

open access: yes, 2014
In many online examinations, physical invigilation is often replaced with traditional authentication approaches for student identification. Secure and usable authentication approaches are important for high stake online examinations.
Barker, Trevor   +3 more
core   +1 more source

Cognitive Status in People With Epilepsy in the Republic of Guinea: A Prospective, Case–Control Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick   +14 more
wiley   +1 more source

Five years follow-up of implant-prosthetic rehabilitation on a patient after mandibular ameloblastoma removal and ridge reconstruction by fibula graft and bone distraction

open access: yesDental Research Journal, 2012
This case report presents a combination of surgical and prosthetic solutions applied to a case of oral implant rehabilitation in post-oncologic reconstructed mandible.
Giacomo Oteri   +3 more
doaj   +1 more source

Characterizing Technology's Influence on Distractive Behavior at Signalized Intersections

open access: yesTransactions on Transport Sciences, 2023
Distracted driving existed since the invention of the automobile; however, the emergence of the cell phone and electronic devices created another source of distraction that affected drivers visually, physically, cognitively, and audibly.
Jobaidul Alam Boni   +2 more
doaj   +1 more source

Improving Dental Experiences by Using Virtual Reality Distraction: A Simulation Study [PDF]

open access: yes, 2014
Dental anxiety creates significant problems for both patients and the dental profession. Some distraction interventions are already used by healthcare professionals to help patients cope with unpleasant procedures. The present study is novel because it a)
Andrade, J   +7 more
core   +4 more sources

Ultrahigh‐Yield, Multifunctional, and High‐Performance Organic Memory for Seamless In‐Sensor Computing Operation

open access: yesAdvanced Functional Materials, EarlyView.
Molecular engineering of a nonconjugated radical polymer enables a significant enhancement of the glass transition temperature. The amorphous nature and tunability of the polymer, arising from its nonconjugated backbone, facilitates the fabrication of organic memristive devices with an exceptionally high yield (>95%), as well as substantial ...
Daeun Kim   +14 more
wiley   +1 more source

Vital Sign Monitoring and Mobile Phone Usage Detection Using IR-UWB Radar for Intended Use in Car Crash Prevention

open access: yesSensors, 2017
In order to avoid car crashes, active safety systems are becoming more and more important. Many crashes are caused due to driver drowsiness or mobile phone usage.
Seong Kyu Leem, Faheem Khan, Sung Ho Cho
doaj   +1 more source

Retrieval from memory: Vulnerable or inviolable? [PDF]

open access: yes, 2012
We show that retrieval from semantic memory is vulnerable even to the mere presence of speech. Irrelevant speech impairs semantic fluency—namely, lexical retrieval cued by a semantic category name—but only if it is meaningful (forward speech compared to ...
Hughes, Robert W.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy