Results 31 to 40 of about 668,009 (390)
AE-GPT: Using Large Language Models to Extract Adverse Events from Surveillance Reports-A Use Case with Influenza Vaccine Adverse Events [PDF]
Though Vaccines are instrumental in global health, mitigating infectious diseases and pandemic outbreaks, they can occasionally lead to adverse events (AEs). Recently, Large Language Models (LLMs) have shown promise in effectively identifying and cataloging AEs within clinical reports.
arxiv +1 more source
THE ROLE OF INTERNAL AUDIT IN RISK MANAGEMENT OF CREDIT INSTITUTIONS [PDF]
The gaps revealed by the global financial crisis led to growing expectations in relation with internal audit, both from management bodies in credit institutions and from regulatory authorities.
Clara-Iulia ZINCA (VOICULESCU)+1 more
doaj
A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) [PDF]
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption.
Gaidaa Saeed Mahdi
doaj +1 more source
DES22: DES BASED ALGORITHM WITH IMPROVED SECURITY
We live in a world where the Internet has become the backbone of most of our dealings. The Internet has turned this big planet into a small village. The internet can be reached by everyone, everywhere, and anytime. Some authors predict that the number of
Malek M. Barhoush+4 more
doaj +1 more source
AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments
Currently, Internet of Things (IoT) as an essential infrastructure proposed for industries and different applications has been popularly applied to different domains, such as healthcare and smart farming, for helping people to do something, aiming to ...
K. Tsai+5 more
semanticscholar +1 more source
Reconfiurable multi-launch pipeline processing architecture for block cipher
With the wide application of reconfigurable design technology in the field of cryptography, the existing reconfigurable cryptography system can hardly meet the needs of high-speed communication and equipment miniaturization.Therefore, it is the goal of ...
Xue Yuqian, Dai Zibin
doaj +1 more source
Optimization of the symmetric encryption mode ECB dedicated to securing medical data [PDF]
Data security is a recurring problem to protected the private life of users, Data encryption is necessary but also delicate step to ensure at the same time speed and security of transmission and reception data, there are different models of cryptography ...
SEGHIRI Naouel+2 more
doaj
A multi-center, open-labeled, cluster-randomized study of the safety of double and triple drug community mass drug administration for lymphatic filariasis [PDF]
BackgroundThe Global Programme to Eliminate Lymphatic Filariasis (GPELF) provides antifilarial medications to hundreds of millions of people annually to treat filarial infections and prevent elephantiasis.
Bogus, Joshua+23 more
core +3 more sources
The relative contributions of adaptation and genetic drift to morphological diversification of the skulls of echolocating mammals were investigated using two horseshoe bat species, Rhinolophus simulator and R. cf. simulator, as test cases.
Gregory L. Mutumi+2 more
doaj +1 more source