Results 61 to 70 of about 1,734,839 (338)
This study addressed how a senior research thesis is perceived by undergraduate students. It assessed students' perception of research skills, epistemological beliefs, and career goals in Biochemistry (science) and BDC (science‐business) students. Completing a thesis improved confidence in research skills, resilience, scientific identity, closed gender‐
Celeste Suart +4 more
wiley +1 more source
Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes
The first identity-based fully homomorphic encryption (IBFHE) scheme was constructed from identity-based encryption (IBE) and lattice-based cryptography by Gentry, Sahai, and Waters in CRYPTO 2013. Their IBFHE scheme is improved in this paper, exploiting
Tongchen Shen +4 more
doaj +1 more source
What factors make for an effective digital learning tool in Higher Education? This systematic review identifies elements of a digital tool that published examples reveal to be features of an engaging and impactful digital tool. A systematic literature search yielded 25 research papers for analysis.
Akmal Arzeman +4 more
wiley +1 more source
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE
The dual attack is one of the most efficient attack algorithms for learning with errors (LWE) problem. Recently, an efficient variant of the dual attack for sparse and small secret LWE was reported by Albrecht (Eurocrypt 2017), which forces some LWE ...
Jung Hee Cheon +3 more
doaj +1 more source
The role of error analysis in ELT [PDF]
In Second Language Acquisition learners usually make errors that are part of the normal learning process. Errors Analysis is, generally, a method through which we can identify and classify these errors which, in turn, reflect a given stage in the learner’
Nhapulo, Marcos
core
ABSTRACT Objective Epilepsy is increasingly associated with immune dysregulation and inflammation. The T cell receptor (TCR), a key mediator of adaptive immunity, shows repertoire alterations in various immune‐mediated diseases. The unique TCR sequence serves as a molecular barcode for T cells, and clonal expansion accompanied by reduced overall TCR ...
Yong‐Won Shin +12 more
wiley +1 more source
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure key storage is expensive, novel solutions have been developed based on the idea of deriving the key from noisy ...
Christopher Huth +4 more
doaj +1 more source
A Convex Formulation for Mixed Regression with Two Components: Minimax Optimal Rates [PDF]
We consider the mixed regression problem with two components, under adversarial and stochastic noise. We give a convex optimization formulation that provably recovers the true solution, and provide upper bounds on the recovery errors for both arbitrary ...
Caramanis, Constantine +2 more
core
Diffusion Tractography Biomarker for Epilepsy Severity in Children With Drug‐Resistant Epilepsy
ABSTRACT Objective To develop a novel deep‐learning model of clinical DWI tractography that can accurately predict the general assessment of epilepsy severity (GASE) in pediatric drug‐resistant epilepsy (DRE) and test if it can screen diverse neurocognitive impairments identified through neuropsychological assessments.
Jeong‐Won Jeong +7 more
wiley +1 more source
Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output
Since hash proof system (HPS) can be utilized to build versatilely cryptographic schemes, the study on realizing this cryptographic primitive has been a very active research area. With the increasing concerns on the huge progress in quantum computing, it
Momeng Liu +3 more
doaj +1 more source

