Results 51 to 60 of about 243,777 (273)
Athletes' perceptions of coaching effectiveness and athlete-related outcomes in rugby union: An investigation based on the coaching efficacy model [PDF]
This study examined the relationships between athletes' perceptions of coaching effectiveness, based on the coaching efficacy model, and their effort, commitment, enjoyment, self-efficacy, and prosocial and antisocial behavior in rugby union ...
Boardley, Ian D +2 more
core +1 more source
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley +1 more source
ModHE: Modular Homomorphic Encryption Using Module Lattices
The promising field of homomorphic encryption enables functions to be evaluated on encrypted data and produce results for the same computations done on plaintexts.
Anisha Mukherjee +6 more
doaj +1 more source
ABSTRACT Objective Accurate localization of epileptogenic tubers (ETs) in patients with tuberous sclerosis complex (TSC) is essential but challenging, as these tubers lack distinct pathological or genetic markers to differentiate them from other cortical tubers.
Tinghong Liu +11 more
wiley +1 more source
The condition number associated with ideal lattices from odd prime degree cyclic number fields
The condition number of a generator matrix of an ideal lattice derived from the ring of integers of an algebraic number field is an important quantity associated with the equivalence between two computational problems in lattice-based cryptography, the ...
de Araujo Robson Ricardo
doaj +1 more source
With the rapid advancement of quantum computing technology, traditional encryption methods are encountering unprecedented challenges in the Internet of Things (IoT), blockchain systems, and digital learning (e-learning) platforms.
Chin-Ling Chen +5 more
doaj +1 more source
RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices
We propose the RLizard key encapsulation mechanism (KEM), whose security depends on the ring learning with errors and ring learning with rounding problems.
Joohee Lee +4 more
doaj +1 more source
Since the introduction of the ring-learning with errors problem, the number theoretic transform (NTT) based polynomial multiplication algorithm has been studied extensively.
Jose Maria Bermudo Mera +2 more
doaj +1 more source
Ring Learning With Error (RLWE) algorithm is used in Post Quantum Cryptography (PQC) and Homomorphic Encryption (HE) algorithm. The existing classical crypto algorithms may be broken in quantum computers. The adversaries can store all encrypted data.
Baidya, Paresh +2 more
openaire +2 more sources
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick +14 more
wiley +1 more source

