Poly-substance use and sexual risk behaviours: a cross-sectional comparison of adolescents in mainstream and alternative education settings [PDF]
Background: Surveys of young people under-represent those in alternative education settings (AES), potentially disguising health inequalities. We present the first quantitative UK evidence of health inequalities between AES and mainstream education ...
Elliott, Lawrie +5 more
core +3 more sources
Psychiatric adverse events in oseltamivir prophylaxis trials: Novel comparative analysis using data obtained from clinical study reports [PDF]
PURPOSE: Estimating the rate of adverse events (AEs) caused by a treatment in clinical trials typically involves comparing the proportions of patients experiencing AEs in intervention and control groups.
Bender +12 more
core +1 more source
An image encryption method based on chaos system and AES algorithm
In this paper, a novel image encryption algorithm is proposed based on the combination of the chaos sequence and the modified AES algorithm. In this method, the encryption key is generated by Arnold chaos sequence.
Alireza Arab, M. Rostami, B. Ghavami
semanticscholar +1 more source
Quantum Security Analysis of AES
In this paper we analyze for the first time the post-quantum security of AES. AES is the most popular and widely used block cipher, established as the encryption standard by the NIST in 2001. We consider the secret key setting and, in particular, AES-256,
X. Bonnetain +2 more
semanticscholar +1 more source
A multi-center, open-labeled, cluster-randomized study of the safety of double and triple drug community mass drug administration for lymphatic filariasis [PDF]
BackgroundThe Global Programme to Eliminate Lymphatic Filariasis (GPELF) provides antifilarial medications to hundreds of millions of people annually to treat filarial infections and prevent elephantiasis.
Bogus, Joshua +23 more
core +3 more sources
A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) [PDF]
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption.
Gaidaa Saeed Mahdi
doaj +1 more source
Evaluation of agricultural ecosystem services in fallowing land based on farmers' participation and model simulation [PDF]
Fallowing with green fertilizer can benefit agricultural ecosystem services (AES). Farmers in Taiwan do not implement fallow practices and plant green fertilizer because the current subsidy level (46,000 NT$ per ha) is too low to manage fallowing.
Chang Kang-tsung +4 more
core +2 more sources
Speed and Power Consumption Comparison between DES and AES Algorithm in Arduino
Telemedicine is commonly used to check or diagnose patients from a long distance. Its application is often combined with sensors as needed, but for delivery, a cryptography algorithm is needed so the data sent safely, illegible, and can not be changed by
Arcelina Sukiatmodjo, YB Dwi Setianto
doaj +1 more source
THE ROLE OF INTERNAL AUDIT IN RISK MANAGEMENT OF CREDIT INSTITUTIONS [PDF]
The gaps revealed by the global financial crisis led to growing expectations in relation with internal audit, both from management bodies in credit institutions and from regulatory authorities.
Clara-Iulia ZINCA (VOICULESCU) +1 more
doaj
The Hybrid Cryptographic Algorithms for Secure RFID Data Protection in The Internet of Things
RFID is often used by companies to identify employees and company assets, as well as in supermarkets to identify goods when shopping. In this increasingly sophisticated era, IoT technology has wide applications. The use of RFID technology in IoT networks
Alief Vickry Thaha Maulidzart +4 more
doaj +1 more source

