Results 101 to 110 of about 1,743,904 (288)

Comparing the Effect of Semi‐Immersive Virtual Reality, Computerized Cognitive Training, and Traditional Rehabilitation on Cognitive Function in Multiple Sclerosis: A Randomized Clinical Trial

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Cognitive impairment is a common non‐motor symptom in Multiple Sclerosis (MS), negatively affecting autonomy and Quality of Life (QoL). Innovative rehabilitation strategies, such as semi‐immersive virtual reality (VR) and computerized cognitive training (CCT), may offer advantages over traditional cognitive rehabilitation (TCR ...
Maria Grazia Maggio   +8 more
wiley   +1 more source

Memory and Resting‐State Connectivity in Acute Transient Global Amnesia: A Case–Control fMRI Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background and Objectives Transient global amnesia (TGA) is a striking model of isolated amnesia. While hippocampal lesions are well described, the network‐level mechanisms and the precise neuropsychological profile remain debated. Our objective was thus to characterize functional and neuropsychological correlates of acute TGA and their ...
Elias El Otmani   +10 more
wiley   +1 more source

A Q‐Learning Algorithm to Solve the Two‐Player Zero‐Sum Game Problem for Nonlinear Systems

open access: yesInternational Journal of Adaptive Control and Signal Processing, Volume 39, Issue 3, Page 566-581, March 2025.
A Q‐learning algorithm to solve the two‐player zero‐sum game problem for nonlinear systems. ABSTRACT This paper deals with the two‐player zero‐sum game problem, which is a bounded L2$$ {L}_2 $$‐gain robust control problem. Finding an analytical solution to the complex Hamilton‐Jacobi‐Issacs (HJI) equation is a challenging task.
Afreen Islam   +2 more
wiley   +1 more source

An Adaptive Human Pilot Model With Reaction Time Delay for Enhanced Adaptive Control in Piloted Systems

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
This work introduces an adaptive human pilot model that captures pilot time‐delay effects in adaptive control systems. The model enables the prediction of pilot–controller interactions, facilitating safer integration and improved design of adaptive controllers for piloted applications.
Abdullah Habboush, Yildiray Yildiz
wiley   +1 more source

A Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
Block Diagram of the Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller. ABSTRACT This article introduces a discrete‐time robust adaptive one‐sample‐ahead preview super‐twisting sliding mode controller. A stability analysis of the controller by Lyapunov criteria is developed to demonstrate its robustness in handling both ...
Guilherme Vieira Hollweg   +5 more
wiley   +1 more source

Learning from errors: Exploration of the monitoring learning effect. [PDF]

open access: yesCognition, 2022
Middleton EL   +3 more
europepmc   +1 more source

Robust Learning with Kernel Mean p-Power Error Loss

open access: yesIEEE transactions on cybernetics, 2016
11 pages, 7 figures, 10 ...
Chen, Badong   +4 more
openaire   +3 more sources

Characterization of Defect Distribution in an Additively Manufactured AlSi10Mg as a Function of Processing Parameters and Correlations with Extreme Value Statistics

open access: yesAdvanced Engineering Materials, EarlyView.
Predicting extreme defects in additive manufacturing remains a key challenge limiting its structural reliability. This study proposes a statistical framework that integrates Extreme Value Theory with advanced process indicators to explore defect–process relationships and improve the estimation of critical defect sizes. The approach provides a basis for
Muhammad Muteeb Butt   +8 more
wiley   +1 more source

Anonymous Quantum Safe Construction of Three Party Authentication and Key Agreement Protocol for Mobile Devices

open access: yesIEEE Access
Once the shared secret key is established, three parties can use it for secure communication using symmetric-key encryption AES (128, 192, 256) algorithms or other cryptographic primitives.
Dharminder Chaudhary   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy