Results 51 to 60 of about 243,777 (279)

Athletes' perceptions of coaching effectiveness and athlete-related outcomes in rugby union: An investigation based on the coaching efficacy model [PDF]

open access: yes, 2008
This study examined the relationships between athletes' perceptions of coaching effectiveness, based on the coaching efficacy model, and their effort, commitment, enjoyment, self-efficacy, and prosocial and antisocial behavior in rugby union ...
Boardley, Ian D   +2 more
core   +1 more source

Estimating the Security of Ring Learning with Errors (RLWE)

open access: yes, 2022
This article was written by my colleague, Cathie Yun. Cathie is an applied cryptographer and security engineer, currently working with me to make fully homomorphic encryption a reality at Google. She’s also done a lot of cool stuff with zero knowledge proofs.
openaire   +1 more source

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

A Multiscale Pyramid Transform for Graph Signals [PDF]

open access: yes, 2015
Multiscale transforms designed to process analog and discrete-time signals and images cannot be directly applied to analyze high-dimensional data residing on the vertices of a weighted graph, as they do not capture the intrinsic geometric structure of ...
Faraji, Mohammad Javad   +2 more
core   +2 more sources

The skills required for transition to university and study in biological sciences: A student perspective

open access: yesFEBS Open Bio, EarlyView.
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley   +1 more source

Predicting Epileptogenic Tubers in Patients With Tuberous Sclerosis Complex Using a Fusion Model Integrating Lesion Network Mapping and Machine Learning

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Accurate localization of epileptogenic tubers (ETs) in patients with tuberous sclerosis complex (TSC) is essential but challenging, as these tubers lack distinct pathological or genetic markers to differentiate them from other cortical tubers.
Tinghong Liu   +11 more
wiley   +1 more source

The condition number associated with ideal lattices from odd prime degree cyclic number fields

open access: yesJournal of Mathematical Cryptology
The condition number of a generator matrix of an ideal lattice derived from the ring of integers of an algebraic number field is an important quantity associated with the equivalence between two computational problems in lattice-based cryptography, the ...
de Araujo Robson Ricardo
doaj   +1 more source

Lightweight Post-Quantum Cryptography: Applications and Countermeasures in Internet of Things, Blockchain, and E-Learning

open access: yesEngineering Proceedings
With the rapid advancement of quantum computing technology, traditional encryption methods are encountering unprecedented challenges in the Internet of Things (IoT), blockchain systems, and digital learning (e-learning) platforms.
Chin-Ling Chen   +5 more
doaj   +1 more source

RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices

open access: yesIEEE Access, 2019
We propose the RLizard key encapsulation mechanism (KEM), whose security depends on the ring learning with errors and ring learning with rounding problems.
Joohee Lee   +4 more
doaj   +1 more source

Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Since the introduction of the ring-learning with errors problem, the number theoretic transform (NTT) based polynomial multiplication algorithm has been studied extensively.
Jose Maria Bermudo Mera   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy