Results 31 to 40 of about 755,843 (383)

Poly-substance use and sexual risk behaviours: a cross-sectional comparison of adolescents in mainstream and alternative education settings [PDF]

open access: yes, 2019
Background: Surveys of young people under-represent those in alternative education settings (AES), potentially disguising health inequalities. We present the first quantitative UK evidence of health inequalities between AES and mainstream education ...
Elliott, Lawrie   +5 more
core   +3 more sources

Psychiatric adverse events in oseltamivir prophylaxis trials: Novel comparative analysis using data obtained from clinical study reports [PDF]

open access: yes, 2018
PURPOSE: Estimating the rate of adverse events (AEs) caused by a treatment in clinical trials typically involves comparing the proportions of patients experiencing AEs in intervention and control groups.
Bender   +12 more
core   +1 more source

An image encryption method based on chaos system and AES algorithm

open access: yesJournal of Supercomputing, 2019
In this paper, a novel image encryption algorithm is proposed based on the combination of the chaos sequence and the modified AES algorithm. In this method, the encryption key is generated by Arnold chaos sequence.
Alireza Arab, M. Rostami, B. Ghavami
semanticscholar   +1 more source

Quantum Security Analysis of AES

open access: yesIACR Cryptology ePrint Archive, 2019
In this paper we analyze for the first time the post-quantum security of AES. AES is the most popular and widely used block cipher, established as the encryption standard by the NIST in 2001. We consider the secret key setting and, in particular, AES-256,
X. Bonnetain   +2 more
semanticscholar   +1 more source

A multi-center, open-labeled, cluster-randomized study of the safety of double and triple drug community mass drug administration for lymphatic filariasis [PDF]

open access: yes, 2018
BackgroundThe Global Programme to Eliminate Lymphatic Filariasis (GPELF) provides antifilarial medications to hundreds of millions of people annually to treat filarial infections and prevent elephantiasis.
Bogus, Joshua   +23 more
core   +3 more sources

A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) [PDF]

open access: yesEngineering and Technology Journal, 2011
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption.
Gaidaa Saeed Mahdi
doaj   +1 more source

Evaluation of agricultural ecosystem services in fallowing land based on farmers' participation and model simulation [PDF]

open access: yes, 2012
Fallowing with green fertilizer can benefit agricultural ecosystem services (AES). Farmers in Taiwan do not implement fallow practices and plant green fertilizer because the current subsidy level (46,000 NT$ per ha) is too low to manage fallowing.
Chang Kang-tsung   +4 more
core   +2 more sources

Speed and Power Consumption Comparison between DES and AES Algorithm in Arduino

open access: yesScientific Journal of Informatics, 2019
Telemedicine is commonly used to check or diagnose patients from a long distance. Its application is often combined with sensors as needed, but for delivery, a cryptography algorithm is needed so the data sent safely, illegible, and can not be changed by
Arcelina Sukiatmodjo, YB Dwi Setianto
doaj   +1 more source

THE ROLE OF INTERNAL AUDIT IN RISK MANAGEMENT OF CREDIT INSTITUTIONS [PDF]

open access: yesEconomica, 2017
The gaps revealed by the global financial crisis led to growing expectations in relation with internal audit, both from management bodies in credit institutions and from regulatory authorities.
Clara-Iulia ZINCA (VOICULESCU)   +1 more
doaj  

The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of Things

open access: yesJurnal ELTIKOM: Jurnal Teknik Elektro, Teknologi Informasi dan Komputer, 2023
RFID is often used by companies to identify employees and company assets, as well as in supermarkets to identify goods when shopping. In this increasingly sophisticated era, IoT technology has wide applications. The use of RFID technology in IoT networks
Alief Vickry Thaha Maulidzart   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy