The price of tumor control: an analysis of rare side effects of anti-CTLA-4 therapy in metastatic melanoma from the ipilimumab network [PDF]
Background: Ipilimumab, a cytotoxic T-lymphocyte antigen-4 (CTLA-4) blocking antibody, has been approved for the treatment of metastatic melanoma and induces adverse events (AE) in up to 64% of patients.
A Bashey +88 more
core +4 more sources
Secure Framework Enhancing AES Algorithm in Cloud Computing
The tremendous growth of computational clouds has attracted and enabled intensive computation on resource-constrained client devices. Predominantly, smart mobiles are enabled to deploy data and computational intensive applications by leveraging on the ...
Ijaz Ahmad Awan +5 more
semanticscholar +1 more source
The admission experience survey italian version (I-AES). a factor analytic study on a sample of 156 acute psychiatric in-patients [PDF]
Coercive treatments are often regarded as an inevitable and yet highly debated feature of psychiatric care. Perceived coercion is often reported by patients involuntarily committed as well as their voluntary counterparts. The Admission Experience Survey (
Biondi, Massimo +6 more
core +1 more source
Stacking battery energy storage revenues with enhanced service provision
Battery energy storage systems (BESSs) offer many desirable services from peak demand lopping/valley filling too fast power response services. These services can be scheduled so they enhance each other; in this manner, the inverter size is effectively ...
Paul Vincent Brogan +4 more
doaj +1 more source
Reconfiurable multi-launch pipeline processing architecture for block cipher
With the wide application of reconfigurable design technology in the field of cryptography, the existing reconfigurable cryptography system can hardly meet the needs of high-speed communication and equipment miniaturization.Therefore, it is the goal of ...
Xue Yuqian, Dai Zibin
doaj +1 more source
Poly-substance use and sexual risk behaviours: a cross-sectional comparison of adolescents in mainstream and alternative education settings [PDF]
Background: Surveys of young people under-represent those in alternative education settings (AES), potentially disguising health inequalities. We present the first quantitative UK evidence of health inequalities between AES and mainstream education ...
Elliott, Lawrie +5 more
core +3 more sources
A modified Matrices Approach in Advanced Encryption Standard Algorithm [PDF]
The cryptographic algorithms became the main proceeding for protection of very important data from unauthorized access. There are several cryptographic algorithms to ensure the data, but algorithms must be selected according to speed, strength and the ...
Abdul Monem Rahma, Atheer Abbas
doaj +1 more source
An image encryption method based on chaos system and AES algorithm
In this paper, a novel image encryption algorithm is proposed based on the combination of the chaos sequence and the modified AES algorithm. In this method, the encryption key is generated by Arnold chaos sequence.
Alireza Arab, M. Rostami, B. Ghavami
semanticscholar +1 more source
Optimization of the symmetric encryption mode ECB dedicated to securing medical data [PDF]
Data security is a recurring problem to protected the private life of users, Data encryption is necessary but also delicate step to ensure at the same time speed and security of transmission and reception data, there are different models of cryptography ...
SEGHIRI Naouel +2 more
doaj
Type-3 Feistel Network of The 128-bits Block Size Improved Blowfish Cryptographic Encryption [PDF]
In this paper, a new secret-key block cipher called 128-bits Blowfish isproposed which is an evolutionary improvement of 64-bits Blowfish designed tomeet the requirements of the Advanced Encryption Standard (AES) to increasesecurity and to improve ...
Ashwaq T. Hashim
doaj +1 more source

