Results 81 to 90 of about 243,777 (279)

Nonparametric Detection of Geometric Structures over Networks

open access: yes, 2016
Nonparametric detection of existence of an anomalous structure over a network is investigated. Nodes corresponding to the anomalous structure (if one exists) receive samples generated by a distribution q, which is different from a distribution p ...
Liang, Yingbin   +2 more
core   +1 more source

Advancing Age Modulates Associations Between Cognitive Impairment and Brain Volumes in Early MS

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Cognitive impairment is common in multiple sclerosis (MS), but manifestations following the first demyelinating event are relatively unexplored. We investigated cross‐sectional associations between magnetic resonance imaging (MRI)–derived brain volumes and the presence of cognitive impairment outcomes five years after the first ...
Piriyankan Ananthavarathan   +14 more
wiley   +1 more source

On the Security of Group Ring Learning with Errors

open access: yesIACR Communications in Cryptology
We propose a dimension-reducing transformation on Group Ring Learning with Errors (GRLWE) samples. We exhibit an efficiently computable isomorphism which takes samples defined over the group rings used in the construction of GRLWE to twice as many samples defined over matrix rings, in half the dimension.
Andrew Mendelsohn   +2 more
openaire   +1 more source

Memory and Resting‐State Connectivity in Acute Transient Global Amnesia: A Case–Control fMRI Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background and Objectives Transient global amnesia (TGA) is a striking model of isolated amnesia. While hippocampal lesions are well described, the network‐level mechanisms and the precise neuropsychological profile remain debated. Our objective was thus to characterize functional and neuropsychological correlates of acute TGA and their ...
Elias El Otmani   +10 more
wiley   +1 more source

Characterization of Defect Distribution in an Additively Manufactured AlSi10Mg as a Function of Processing Parameters and Correlations with Extreme Value Statistics

open access: yesAdvanced Engineering Materials, EarlyView.
Predicting extreme defects in additive manufacturing remains a key challenge limiting its structural reliability. This study proposes a statistical framework that integrates Extreme Value Theory with advanced process indicators to explore defect–process relationships and improve the estimation of critical defect sizes. The approach provides a basis for
Muhammad Muteeb Butt   +8 more
wiley   +1 more source

Efficient Security Scheme for Disaster Surveillance UAV Communication Networks

open access: yesInformation, 2019
The Unmanned Aerial Vehicles (UAVs) play a significant role to alleviate the negative impacts of disasters by providing essential assistance to the rescue and evacuation operations in the affected areas.
Asmaa Abdallah   +3 more
doaj   +1 more source

Two-Party Privacy-Preserving Set Intersection with FHE

open access: yesEntropy, 2020
A two-party private set intersection allows two parties, the client and the server, to compute an intersection over their private sets, without revealing any information beyond the intersecting elements.
Yunlu Cai, Chunming Tang, Qiuxia Xu
doaj   +1 more source

What Do Large Language Models Know About Materials?

open access: yesAdvanced Engineering Materials, EarlyView.
If large language models (LLMs) are to be used inside the material discovery and engineering process, they must be benchmarked for the accurateness of intrinsic material knowledge. The current work introduces 1) a reasoning process through the processing–structure–property–performance chain and 2) a tool for benchmarking knowledge of LLMs concerning ...
Adrian Ehrenhofer   +2 more
wiley   +1 more source

Enhancing Multi-Key Fully Homomorphic Encryption with Efficient Key Switching and Batched Multi-Hop Computations

open access: yesApplied Sciences
Multi-Key Fully Homomorphic Encryption (MKFHE) offers a powerful solution for secure multi-party computations, where data encrypted under different keys can be jointly computed without decryption.
Liang Zhou, Ruwei Huang, Bingbing Wang
doaj   +1 more source

A Workflow to Accelerate Microstructure‐Sensitive Fatigue Life Predictions

open access: yesAdvanced Engineering Materials, EarlyView.
This study introduces a workflow to accelerate predictions of microstructure‐sensitive fatigue life. Results from frameworks with varying levels of simplification are benchmarked against published reference results. The analysis reveals a trade‐off between accuracy and model complexity, offering researchers a practical guide for selecting the optimal ...
Luca Loiodice   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy