Results 101 to 110 of about 336,808 (204)

Paraprofessionals’ Implementation of Constant Time Delay Procedures With Elementary Students With High-Intensity Behavioral Support Needs

open access: yesBehavioral Disorders
Paraprofessionals play a significant role in the education system. However, they often need more training on specific instructional strategies to use with the students they work with. In this study, we trained two paraprofessionals working in a self-contained U.S. elementary classroom for students with high-intensity behavioral support needs.
Allison M. Kroesch   +3 more
openaire   +2 more sources

Dynamic Smooth Sliding Control Applied to UAV Trajectory Tracking

open access: yesIEEE Access
This paper proposes a sliding mode controller with a smooth control signal for a class of linear plants with nonlinear input state-dependent disturbance.
Alessandro Jacoud Peixoto   +2 more
doaj   +1 more source

Design Space Exploration on Blind Equalization Algorithms: Numerical Representation Analysis for SoC-FPGA

open access: yesApplied Sciences
Field-Programmable Gate Arrays (FPGAs) have become an important platform for accelerating real-time communication systems, and System-on-Chip (SoC) devices provide the flexibility to design and optimize architectures that support high data rates ...
David Marquez-Viloria   +3 more
doaj   +1 more source

Symmetry, law invariance, and the physical admissibility of internal time

open access: yesFrontiers in Physics
The pacemaker–accumulator model has long dominated theories of internal time, yet it remains structurally disconnected from the physical principles that define time in the external world.
Dong-Gyun Han
doaj   +1 more source

Measurement-based long-range entangling gates in constant depth

open access: yesPhysical Review Research
The depth of quantum circuits is a critical factor when running them on state-of-the-art quantum devices owing to their limited coherence times. Reducing circuit depth decreases noise in near-term quantum computations and reduces overall computation time.
Elisa Bäumer, Stefan Woerner
doaj   +1 more source

Verifying constant-time implementations in a verified compilation toolchain

open access: yes, 2018
Side-channel attacks are an especially dangerous form of attack. In this thesis, we focus on the timing side-channel. A program is said to be constant-time if it is not vulnerable to timing attacks. We present in this thesis two methods relying on static analysis in order to ensure that a program is constant-time.
openaire   +1 more source

Explainable AI framework for psilocybin depression treatment optimization

open access: yesFrontiers in Computer Science
IntroductionThis computational modeling study introduces a novel Explainable Artificial Intelligence (XAI) framework for optimizing single-dose psilocybin treatment protocols through personalized intervention modeling using publicly available mental ...
Akey Sungheetha   +7 more
doaj   +1 more source

An Improved Implementation of Rip van Winkle Cipher Using Satellite TV Broadcast Transmissions

open access: yesIEEE Access
In 1992, when Rip van Winkle’s (RvW) cipher was first proposed, the needed infinite public source wasn’t practically available yet, and demands for large buffer memory were too high.
Luka Matic   +3 more
doaj   +1 more source

A brain-constrained neural model of cognition and language with NEST: transitioning from the Felix framework. [PDF]

open access: yesCogn Neurodyn
Carriere M   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy