Results 61 to 70 of about 66,711 (293)

Changes in the capacity of visual working memory in 5- to 10-year-olds [PDF]

open access: yes, 2006
Using the Luck and Vogel change detection paradigm, we sought to investigate the capacity of visual working memory in 5-, 7-, and 10-year-olds. We found that performance on the task improved significantly with age and also obtained evidence that the ...
Andrew Simpson   +18 more
core   +2 more sources

Application of Neural Networks for Advanced Ir Spectroscopy Characterization of Ceria Catalysts Surfaces

open access: yesAdvanced Intelligent Discovery, EarlyView.
A novel convolutional neural network architecture enables rapid, unsupervised analysis of IR spectroscopic data from DRIFTS and IRRAS. By combining synthetic data generation with parallel convolutional layers and advanced regularization, the model accurately resolves spectral features of adsorbed CO, offering real‐time insights into ceria surface ...
Mehrdad Jalali   +5 more
wiley   +1 more source

Ultrametric embedding: application to data fingerprinting and to fast data clustering [PDF]

open access: yes, 2007
We begin with pervasive ultrametricity due to high dimensionality and/or spatial sparsity. How extent or degree of ultrametricity can be quantified leads us to the discussion of varied practical cases when ultrametricity can be partially or locally ...
Murtagh, Fionn
core   +4 more sources

Two years and counting: The dynamics of long‐term youth mentoring and association with parent and peer relationships

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract The current study seeks to explore the reciprocal associations between mentor–mentee relationship strength and relationships with parents and peers across 2 years of mentoring. It is a secondary analysis of data collected by a national mentoring organization from youth (N = 1368; M age = 11.5 years; 59% female; White [n = 629], 30% Black [n ...
Westley L. Fallavollita   +1 more
wiley   +1 more source

Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack [PDF]

open access: yes, 2016
The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric ...
Daisuke SUZUKI   +2 more
core   +2 more sources

Social Determinants of Health and Health‐Related Quality of Life: The Potential Mediating Role of Social Activities, Access to Medical Services, and Access to Social Services

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This study explored the mediating influences of access to social activities, social services, and health and medical services on the relationship between social determinants of health and health‐related quality of life. A survey of 602 adults was conducted in a regional area of Australia.
Candice Oster   +4 more
wiley   +1 more source

Cerebellum as a kernel machine: A novel perspective on expansion recoding in granule cell layer

open access: yesFrontiers in Computational Neuroscience, 2022
Sensorimotor information provided by mossy fibers (MF) is mapped to high-dimensional space by a huge number of granule cells (GrC) in the cerebellar cortex’s input layer.
Hyojin Bae   +3 more
doaj   +1 more source

Understanding Inequality Within a Personalised System of Disability Support: Australian Children With Disabilities' Unmet Support Needs

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT Disability support has shifted towards models of personalised care, which critics argue may contribute to increased inequalities. There is limited systematic evidence investigating inequalities in support among children with disabilities. To investigate inequalities in support, a survey of parents of children with disabilities aged 2–17 was ...
Martin O'Flaherty   +2 more
wiley   +1 more source

Attenuation of Human Respiratory Viruses by Synonymous Genome Recoding

open access: yesFrontiers in Immunology, 2019
Using computer algorithms and commercial DNA synthesis, one or more ORFs of a microbial pathogen such as a virus can be recoded and deoptimized by several strategies that may involve the introduction of up to thousands of nucleotide (nt) changes without ...
Cyril Le Nouën   +2 more
doaj   +1 more source

Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors [PDF]

open access: yes, 2015
Resource constraints in smart devices demand an efficient cryptosystem that allows for low power and memory consumption. This has led to popularity of comparatively efficient Elliptic curve cryptog-raphy (ECC).
Malik, Yasir
core   +1 more source

Home - About - Disclaimer - Privacy