Results 61 to 70 of about 243,099 (282)

Cognitive Status in People With Epilepsy in the Republic of Guinea: A Prospective, Case–Control Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick   +14 more
wiley   +1 more source

Improved Lattice-Based Signcryption in the Standard Model

open access: yesIEEE Access, 2019
Signcryption is a basic cryptographic primitive that simultaneously captures the functions of encryption and signature. To realize comprehensive information security against quantum computing attacks, lattice-based signcryption schemes have been ...
Xiaopeng Yang   +3 more
doaj   +1 more source

Hardness of Module-LWE with Semiuniform Seeds from Module-NTRU

open access: yesIET Information Security, 2023
The module learning with errors (MLWE) problem has attracted significant attention and has been widely used in building a multitude of lattice-based cryptographic primitives. The hardness of the MLWE problem has been established for several variants, but
Wenjuan Jia, Jiang Zhang, Baocang Wang
doaj   +1 more source

Configurable Encryption and Decryption Architectures for CKKS-Based Homomorphic Encryption

open access: yesSensors, 2023
With the increasing number of edge devices connecting to the cloud for storage and analysis, concerns about security and data privacy have become more prominent.
Jaehyeok Lee, Phap Ngoc Duong, Hanho Lee
doaj   +1 more source

Comparing instance-averaging with instance-saving learning algorithms [PDF]

open access: yes, 1988
The goal of our research is to understand the power and appropriateness of instance-based representations and their associated acquisition methods. This paper concerns two methods for reducing storage requirements for instance-based learning algorithms ...
Aha, David W., Kibler, Dennis
core  

Adult‐Onset Subacute Sclerosing Panencephalitis Presenting With Subacute Cognitive Deficits

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT We describe the case of a 41‐year‐old man diagnosed with adult‐onset subacute sclerosing panencephalitis (SSPE). The patient presented with subacute progressive cognitive deficits and a neuropsychological profile indicating predominant frontoparietal dysfunction. MRI showed only mild parietal‐predominant cerebral atrophy.
Dennis Yeow   +4 more
wiley   +1 more source

Unraveling the Molecular Mechanisms of Glioma Recurrence: A Study Integrating Single‐Cell and Spatial Transcriptomics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Glioma recurrence severely impacts patient prognosis, with current treatments showing limited efficacy. Traditional methods struggle to analyze recurrence mechanisms due to challenges in assessing tumor heterogeneity, spatial dynamics, and gene networks.
Lei Qiu   +10 more
wiley   +1 more source

Remote Assessment of Ataxia Severity in SCA3 Across Multiple Centers and Time Points

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Spinocerebellar ataxia type 3 (SCA3) is a genetically defined ataxia. The Scale for Assessment and Rating of Ataxia (SARA) is a clinician‐reported outcome that measures ataxia severity at a single time point. In its standard application, SARA fails to capture short‐term fluctuations, limiting its sensitivity in trials.
Marcus Grobe‐Einsler   +20 more
wiley   +1 more source

High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography

open access: yesIEEE Access, 2019
This paper presents a high-secure fingerprint authentication system using ring learning with errors (ring-LWE) cryptography to protect users' fingerprint data more securely.
Tuy Nguyen Tan, Hanho Lee
doaj   +1 more source

Design and Implementation of Constant-Round Dynamic Group Key Exchange from RLWE

open access: yesIEEE Access, 2020
Group Key Exchange (GKE) is required for secure group communication with high confidentiality. In particular, a trusted authority can handle issues that happen by the malicious actions of group members, but it is expensive to deploy and not suitable in a
Rakyong Choi   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy