Results 11 to 20 of about 717,304 (368)

The price of tumor control: an analysis of rare side effects of anti-CTLA-4 therapy in metastatic melanoma from the ipilimumab network [PDF]

open access: yes, 2013
Background: Ipilimumab, a cytotoxic T-lymphocyte antigen-4 (CTLA-4) blocking antibody, has been approved for the treatment of metastatic melanoma and induces adverse events (AE) in up to 64% of patients.
A Bashey   +88 more
core   +4 more sources

Secure Framework Enhancing AES Algorithm in Cloud Computing

open access: yesSecur. Commun. Networks, 2020
The tremendous growth of computational clouds has attracted and enabled intensive computation on resource-constrained client devices. Predominantly, smart mobiles are enabled to deploy data and computational intensive applications by leveraging on the ...
Ijaz Ahmad Awan   +5 more
semanticscholar   +1 more source

The admission experience survey italian version (I-AES). a factor analytic study on a sample of 156 acute psychiatric in-patients [PDF]

open access: yes, 2019
Coercive treatments are often regarded as an inevitable and yet highly debated feature of psychiatric care. Perceived coercion is often reported by patients involuntarily committed as well as their voluntary counterparts. The Admission Experience Survey (
Biondi, Massimo   +6 more
core   +1 more source

Stacking battery energy storage revenues with enhanced service provision

open access: yesIET Smart Grid, 2019
Battery energy storage systems (BESSs) offer many desirable services from peak demand lopping/valley filling too fast power response services. These services can be scheduled so they enhance each other; in this manner, the inverter size is effectively ...
Paul Vincent Brogan   +4 more
doaj   +1 more source

Reconfiurable multi-launch pipeline processing architecture for block cipher

open access: yesDianzi Jishu Yingyong, 2020
With the wide application of reconfigurable design technology in the field of cryptography, the existing reconfigurable cryptography system can hardly meet the needs of high-speed communication and equipment miniaturization.Therefore, it is the goal of ...
Xue Yuqian, Dai Zibin
doaj   +1 more source

Poly-substance use and sexual risk behaviours: a cross-sectional comparison of adolescents in mainstream and alternative education settings [PDF]

open access: yes, 2019
Background: Surveys of young people under-represent those in alternative education settings (AES), potentially disguising health inequalities. We present the first quantitative UK evidence of health inequalities between AES and mainstream education ...
Elliott, Lawrie   +5 more
core   +3 more sources

A modified Matrices Approach in Advanced Encryption Standard Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2019
The cryptographic algorithms became the main proceeding for protection of very important data from unauthorized access. There are several cryptographic algorithms to ensure the data, but algorithms must be selected according to speed, strength and the ...
Abdul Monem Rahma, Atheer Abbas
doaj   +1 more source

An image encryption method based on chaos system and AES algorithm

open access: yesJournal of Supercomputing, 2019
In this paper, a novel image encryption algorithm is proposed based on the combination of the chaos sequence and the modified AES algorithm. In this method, the encryption key is generated by Arnold chaos sequence.
Alireza Arab, M. Rostami, B. Ghavami
semanticscholar   +1 more source

Optimization of the symmetric encryption mode ECB dedicated to securing medical data [PDF]

open access: yesJournal of Electrical and Electronics Engineering, 2021
Data security is a recurring problem to protected the private life of users, Data encryption is necessary but also delicate step to ensure at the same time speed and security of transmission and reception data, there are different models of cryptography ...
SEGHIRI Naouel   +2 more
doaj  

Type-3 Feistel Network of The 128-bits Block Size Improved Blowfish Cryptographic Encryption [PDF]

open access: yesEngineering and Technology Journal, 2009
In this paper, a new secret-key block cipher called 128-bits Blowfish isproposed which is an evolutionary improvement of 64-bits Blowfish designed tomeet the requirements of the Advanced Encryption Standard (AES) to increasesecurity and to improve ...
Ashwaq T. Hashim
doaj   +1 more source

Home - About - Disclaimer - Privacy