Results 81 to 90 of about 243,777 (279)
Nonparametric Detection of Geometric Structures over Networks
Nonparametric detection of existence of an anomalous structure over a network is investigated. Nodes corresponding to the anomalous structure (if one exists) receive samples generated by a distribution q, which is different from a distribution p ...
Liang, Yingbin +2 more
core +1 more source
Advancing Age Modulates Associations Between Cognitive Impairment and Brain Volumes in Early MS
ABSTRACT Introduction Cognitive impairment is common in multiple sclerosis (MS), but manifestations following the first demyelinating event are relatively unexplored. We investigated cross‐sectional associations between magnetic resonance imaging (MRI)–derived brain volumes and the presence of cognitive impairment outcomes five years after the first ...
Piriyankan Ananthavarathan +14 more
wiley +1 more source
On the Security of Group Ring Learning with Errors
We propose a dimension-reducing transformation on Group Ring Learning with Errors (GRLWE) samples. We exhibit an efficiently computable isomorphism which takes samples defined over the group rings used in the construction of GRLWE to twice as many samples defined over matrix rings, in half the dimension.
Andrew Mendelsohn +2 more
openaire +1 more source
Memory and Resting‐State Connectivity in Acute Transient Global Amnesia: A Case–Control fMRI Study
ABSTRACT Background and Objectives Transient global amnesia (TGA) is a striking model of isolated amnesia. While hippocampal lesions are well described, the network‐level mechanisms and the precise neuropsychological profile remain debated. Our objective was thus to characterize functional and neuropsychological correlates of acute TGA and their ...
Elias El Otmani +10 more
wiley +1 more source
Predicting extreme defects in additive manufacturing remains a key challenge limiting its structural reliability. This study proposes a statistical framework that integrates Extreme Value Theory with advanced process indicators to explore defect–process relationships and improve the estimation of critical defect sizes. The approach provides a basis for
Muhammad Muteeb Butt +8 more
wiley +1 more source
Efficient Security Scheme for Disaster Surveillance UAV Communication Networks
The Unmanned Aerial Vehicles (UAVs) play a significant role to alleviate the negative impacts of disasters by providing essential assistance to the rescue and evacuation operations in the affected areas.
Asmaa Abdallah +3 more
doaj +1 more source
Two-Party Privacy-Preserving Set Intersection with FHE
A two-party private set intersection allows two parties, the client and the server, to compute an intersection over their private sets, without revealing any information beyond the intersecting elements.
Yunlu Cai, Chunming Tang, Qiuxia Xu
doaj +1 more source
What Do Large Language Models Know About Materials?
If large language models (LLMs) are to be used inside the material discovery and engineering process, they must be benchmarked for the accurateness of intrinsic material knowledge. The current work introduces 1) a reasoning process through the processing–structure–property–performance chain and 2) a tool for benchmarking knowledge of LLMs concerning ...
Adrian Ehrenhofer +2 more
wiley +1 more source
Multi-Key Fully Homomorphic Encryption (MKFHE) offers a powerful solution for secure multi-party computations, where data encrypted under different keys can be jointly computed without decryption.
Liang Zhou, Ruwei Huang, Bingbing Wang
doaj +1 more source
A Workflow to Accelerate Microstructure‐Sensitive Fatigue Life Predictions
This study introduces a workflow to accelerate predictions of microstructure‐sensitive fatigue life. Results from frameworks with varying levels of simplification are benchmarked against published reference results. The analysis reveals a trade‐off between accuracy and model complexity, offering researchers a practical guide for selecting the optimal ...
Luca Loiodice +2 more
wiley +1 more source

