نتایج جستجو برای: aes in addition
تعداد نتایج: 16994007 فیلتر نتایج به سال:
BACKGROUND To investigate the average and extrapolated excess length of stay and direct costs of adverse events (AEs) and preventable AEs in Dutch hospitals, and to evaluate patient characteristics associated with excess length of stay and costs. METHODS Data of a large retrospective patient record review study on AEs was used. A stratified sample of 20 Dutch hospitals was included. Excess le...
OBJECTIVES Acetaminophen and nonsteroidal anti-inflammatory drugs (NSAIDs) are antipyretic analgesics with established adverse effects (AEs); however, only a few studies have compared their AEs simultaneously. We aimed to compare the AEs of these medications to confirm the respective frequencies of both rare and major AEs. METHODS We used a high-quality database for spontaneous adverse drug e...
Vaccine adverse events (VAEs) are adverse bodily changes occurring after vaccination. Understanding the adverse event (AE) profiles is a crucial step to identify serious AEs. Two different types of seasonal influenza vaccines have been used on the market: trivalent (killed) inactivated influenza vaccine (TIV) and trivalent live attenuated influenza vaccine (LAIV). Different adverse event profil...
AES is the best known and most widely used block cipher. Its three versions (AES128, AES-192, and AES-256) differ in their key sizes (128 bits, 192 bits and 256 bits) and in their number of rounds (10, 12, and 14, respectively). In the case of AES-128, there is no known attack which is faster than the 2 complexity of exhaustive search. However, AES-192 and AES-256 were recently shown to be brea...
In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...
S-box is a unique nonlinear operation in Rijndael, one encryption algorithm chosen as AES, and it determines the performance of AES. In this paper, the weaknesses in complexity and security of AES S-box are analyzed. We propose to increase the complexity and security of AES S-box by modifying the affine transformation and adding an affine transformation. Performance analysis demonstrates that t...
الگوریتم رمزنگاری aes یکی از متداول ترین الگوریتم های رمزنگاری متقارن است. به علت قابلیت های این الگوریتم، آن را می توان بر روی بسترهای مختلفی ازجمله بـر روی بسـترهای سخـت افزاری نظیر fpga پیاده سازی کرد. همچنین به علت ساختار الگوریتم می توان مسیر داده را به صورت چرخشی و یا غیر چرخشی پیاده سازی نمود. ازآنجاکه بسته به کاربرد، استفاده از هریک از این دو معماری تأثیر فراوانی بر میزان گذردهی و میزان...
OBJECTIVE To determine the incidence and incidence density of adverse events (AEs) in Spanish hospitals (including the pre-hospitalisation period). METHOD Retrospective cohort study. RESULTS The incidence of patients with AEs relating directly to hospital care was 8.4% (95% CI 7.7% to 9.1%) and rose 9.3% (95% CI 8.6% to 10.1%), including those from the pre-hospitalisation period. The incide...
تاثیر آموزش تفکر انتقادی به شیوه مباحثه بر روی مهارت درک متن یادگیرندگان انگلیسی به عنوان زبان خارجی
the purpose of the present study was to investigate the effect of instruction through debate on male and female efl learners’ reading comprehension, to examine the differences between the performance of male and female participants on the five dimensions of cctst including analysis, evaluation, inference, deductive reasoning, and inductive reasoning, and to examine the differences between male ...
A common belief in designing deep autoencoders (AEs), a type of unsupervised neural network, is that bottleneck required to prevent learning the identity function. Learning function renders AEs useless for anomaly detection. In this work, we challenge limiting and investigate value non-bottlenecked AEs. The can be removed two ways: (1) overparameterising latent layer, (2) introducing skip conne...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید