نتایج جستجو برای: aes in addition

تعداد نتایج: 16994007  

2015
Janneke Hoogervorst-Schilp Maaike Langelaan Peter Spreeuwenberg Martine C. de Bruijne Cordula Wagner

BACKGROUND To investigate the average and extrapolated excess length of stay and direct costs of adverse events (AEs) and preventable AEs in Dutch hospitals, and to evaluate patient characteristics associated with excess length of stay and costs. METHODS Data of a large retrospective patient record review study on AEs was used. A stratified sample of 20 Dutch hospitals was included. Excess le...

2017
Junko Nagai Yoshihiro Uesawa Ryotaro Shimamura Hajime Kagaya

OBJECTIVES Acetaminophen and nonsteroidal anti-inflammatory drugs (NSAIDs) are antipyretic analgesics with established adverse effects (AEs); however, only a few studies have compared their AEs simultaneously. We aimed to compare the AEs of these medications to confirm the respective frequencies of both rare and major AEs. METHODS We used a high-quality database for spontaneous adverse drug e...

2012
Sirarat Sarntivijai Zuoshuang Xiang Kerby A. Shedden Howard Markel Gilbert S. Omenn Brian D. Athey Yongqun He

Vaccine adverse events (VAEs) are adverse bodily changes occurring after vaccination. Understanding the adverse event (AE) profiles is a crucial step to identify serious AEs. Two different types of seasonal influenza vaccines have been used on the market: trivalent (killed) inactivated influenza vaccine (TIV) and trivalent live attenuated influenza vaccine (LAIV). Different adverse event profil...

Journal: :IACR Cryptology ePrint Archive 2009
Alex Biryukov Orr Dunkelman Nathan Keller Dmitry Khovratovich Adi Shamir

AES is the best known and most widely used block cipher. Its three versions (AES128, AES-192, and AES-256) differ in their key sizes (128 bits, 192 bits and 256 bits) and in their number of rounds (10, 12, and 14, respectively). In the case of AES-128, there is no known attack which is faster than the 2 complexity of exhaustive search. However, AES-192 and AES-256 were recently shown to be brea...

In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...

2011
Jie Cui Liusheng Huang Hong Zhong Chinchen Chang Wei Yang

S-box is a unique nonlinear operation in Rijndael, one encryption algorithm chosen as AES, and it determines the performance of AES. In this paper, the weaknesses in complexity and security of AES S-box are analyzed. We propose to increase the complexity and security of AES S-box by modifying the affine transformation and adding an affine transformation. Performance analysis demonstrates that t...

Journal: :مهندسی برق دانشگاه تبریز 0
پرهام درّی دانشگاه آزاد اسلامی واحد نجف آباد - دانشکده مهندسی کامپیوتر علی قیاسیان دانشگاه شهرکرد - دانشکده فنی و مهندسی حسین سعیدی دانشگاه صنعتی اصفهان - دانشکده مهندسی برق و کامپیوتر

الگوریتم رمزنگاری aes یکی از متداول ترین الگوریتم های رمزنگاری متقارن است. به علت قابلیت های این الگوریتم، آن را می توان بر روی بسترهای مختلفی ازجمله بـر روی بسـترهای سخـت افزاری نظیر fpga پیاده سازی کرد. همچنین به علت ساختار الگوریتم می توان مسیر داده را به صورت چرخشی و یا غیر چرخشی پیاده سازی نمود. ازآنجاکه بسته به کاربرد، استفاده از هریک از این دو معماری تأثیر فراوانی بر میزان گذردهی و میزان...

Journal: :Journal of epidemiology and community health 2008
J M Aranaz-Andrés C Aibar-Remón J Vitaller-Murillo P Ruiz-López R Limón-Ramírez E Terol-García

OBJECTIVE To determine the incidence and incidence density of adverse events (AEs) in Spanish hospitals (including the pre-hospitalisation period). METHOD Retrospective cohort study. RESULTS The incidence of patients with AEs relating directly to hospital care was 8.4% (95% CI 7.7% to 9.1%) and rose 9.3% (95% CI 8.6% to 10.1%), including those from the pre-hospitalisation period. The incide...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده علوم انسانی 1392

the purpose of the present study was to investigate the effect of instruction through debate on male and female efl learners’ reading comprehension, to examine the differences between the performance of male and female participants on the five dimensions of cctst including analysis, evaluation, inference, deductive reasoning, and inductive reasoning, and to examine the differences between male ...

Journal: :IEEE Access 2022

A common belief in designing deep autoencoders (AEs), a type of unsupervised neural network, is that bottleneck required to prevent learning the identity function. Learning function renders AEs useless for anomaly detection. In this work, we challenge limiting and investigate value non-bottlenecked AEs. The can be removed two ways: (1) overparameterising latent layer, (2) introducing skip conne...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید