Results 31 to 40 of about 668,009 (390)

AE-GPT: Using Large Language Models to Extract Adverse Events from Surveillance Reports-A Use Case with Influenza Vaccine Adverse Events [PDF]

open access: yes, 2023
Though Vaccines are instrumental in global health, mitigating infectious diseases and pandemic outbreaks, they can occasionally lead to adverse events (AEs). Recently, Large Language Models (LLMs) have shown promise in effectively identifying and cataloging AEs within clinical reports.
arxiv   +1 more source

THE ROLE OF INTERNAL AUDIT IN RISK MANAGEMENT OF CREDIT INSTITUTIONS [PDF]

open access: yesEconomica, 2017
The gaps revealed by the global financial crisis led to growing expectations in relation with internal audit, both from management bodies in credit institutions and from regulatory authorities.
Clara-Iulia ZINCA (VOICULESCU)   +1 more
doaj  

A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) [PDF]

open access: yesEngineering and Technology Journal, 2011
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption.
Gaidaa Saeed Mahdi
doaj   +1 more source

DES22: DES BASED ALGORITHM WITH IMPROVED SECURITY

open access: yesJordanian Journal of Computers and Information Technology, 2022
We live in a world where the Internet has become the backbone of most of our dealings. The Internet has turned this big planet into a small village. The internet can be reached by everyone, everywhere, and anytime. Some authors predict that the number of
Malek M. Barhoush   +4 more
doaj   +1 more source

AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments

open access: yesIEEE Access, 2018
Currently, Internet of Things (IoT) as an essential infrastructure proposed for industries and different applications has been popularly applied to different domains, such as healthcare and smart farming, for helping people to do something, aiming to ...
K. Tsai   +5 more
semanticscholar   +1 more source

Reconfiurable multi-launch pipeline processing architecture for block cipher

open access: yesDianzi Jishu Yingyong, 2020
With the wide application of reconfigurable design technology in the field of cryptography, the existing reconfigurable cryptography system can hardly meet the needs of high-speed communication and equipment miniaturization.Therefore, it is the goal of ...
Xue Yuqian, Dai Zibin
doaj   +1 more source

Optimization of the symmetric encryption mode ECB dedicated to securing medical data [PDF]

open access: yesJournal of Electrical and Electronics Engineering, 2021
Data security is a recurring problem to protected the private life of users, Data encryption is necessary but also delicate step to ensure at the same time speed and security of transmission and reception data, there are different models of cryptography ...
SEGHIRI Naouel   +2 more
doaj  

A multi-center, open-labeled, cluster-randomized study of the safety of double and triple drug community mass drug administration for lymphatic filariasis [PDF]

open access: yes, 2018
BackgroundThe Global Programme to Eliminate Lymphatic Filariasis (GPELF) provides antifilarial medications to hundreds of millions of people annually to treat filarial infections and prevent elephantiasis.
Bogus, Joshua   +23 more
core   +3 more sources

Geographic variation in the skulls of the horseshoe bats, Rhinolophus simulator and R. cf. simulator: Determining the relative contributions of adaptation and drift using geometric morphometrics

open access: yesEcology and Evolution, 2021
The relative contributions of adaptation and genetic drift to morphological diversification of the skulls of echolocating mammals were investigated using two horseshoe bat species, Rhinolophus simulator and R. cf. simulator, as test cases.
Gregory L. Mutumi   +2 more
doaj   +1 more source

AS. SCǢNAN = AE. SHEEN. [PDF]

open access: yesAnglia - Zeitschrift für englische Philologie, 1917
n ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy