نتایج جستجو برای: aes in addition

تعداد نتایج: 16994007  

2017
Evelin Amorim Adriano Veloso

While several methods for automatic essay scoring (AES) for the English language have been proposed, systems for other languages are unusual. To this end, we propose in this paper a multi-aspect AES system for Brazilian Portuguese which we apply to a collection of essays, which human experts evaluated according to the five aspects defined by the Brazilian Government for the National High School...

This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...

2013
Manish Kakkar Elizabeth T. Rogawski Syed Shahid Abbas Sanjay Chaturvedi Tapan N. Dhole Shaikh Shah Hossain Sampath K. Krishnan

In India, quality surveillance for acute encephalitis syndrome (AES), including laboratory testing, is necessary for understanding the epidemiology and etiology of AES, planning interventions, and developing policy. We reviewed AES surveillance data for January 2011-June 2012 from Kushinagar District, Uttar Pradesh, India. Data were cleaned, incidence was determined, and demographic characteris...

2013
Donghoon Chang Mohona Ghosh Somitra Sanadhya

Abstract. Biclique cryptanalysis was proposed by Bogdanov et al. in Asiacrypt 2011 as a new tool for cryptanalysis of block ciphers. A major hurdle in carrying out biclique cryptanalysis is that it has a very high query complexity (of the order of 2 for AES-128, 2 for AES-192 and 2 for AES-256). This naturally puts a big question mark over the practical feasibility of implementing biclique atta...

2013
Eman Mohammed Mahmoud Ahmed Abd El Hafez Talaat A. Elgarf

Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. The main core of AES block cipher is the substitution table or SBox. This S-box is used to provide confusion capability for AES. The aim of this paper is to design dynamic S-box which depends on the secret key. The parameters of the new created SBOXes have characteristics equal to those in the o...

2016
Hans Rutberg Madeleine Borgstedt-Risberg Pelle Gustafson Maria Unbeck

BACKGROUND The national incidence of adverse events (AEs) in Swedish orthopedic care has never been described. A new national database has made it possible to describe incidence, nature, preventability and consequences of AEs in Swedish orthopedic care. METHODS We used national data from a structured two-stage record review with a Swedish modification of the Global Trigger Tool. The sample wa...

Journal: :Expert Systems With Applications 2022

Despite numerous studies of deep autoencoders (AEs) for unsupervised anomaly detection, AEs still lack a way to express uncertainty in their predictions, crucial ensuring safe and trustworthy machine learning systems high-stake applications. Therefore, this work, the formulation Bayesian (BAEs) is adopted quantify total uncertainty, comprising epistemic aleatoric uncertainties. To evaluate qual...

Journal: :BMC Health Services Research 2008
Alan J Forster Kwadwo Kyeremanteng Jon Hooper Kaveh G Shojania Carl van Walraven

BACKGROUND Adverse events (AEs) are patient injuries caused by medical care. Previous studies have reported increased mortality rates and prolonged hospital length of stay in patients having an AE. However, these studies have not adequately accounted for potential biases which might influence these associations. We performed this study to measure the independent influence of intensive care unit...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

the quest for power has formed much of the world history especially in 20th and 21st centuries. oil (energy) particularly after industrial revolution has been a tool for conquest and power and has been transformed to a geopolitical issue. from a geopolitical point of view this has been the case for the last two centuries in central asia and caucasus. central asia and caucasus has always been...

Journal: :IACR Cryptology ePrint Archive 2017
Wei Cheng Chao Zheng Yuchen Cao Yongbin Zhou Hailong Zhang Sylvain Guilley Laurent Sauvage

Rotating Sbox Masking (RSM) scheme is a lightweight and highly efficient first-order masking scheme proposed to protect cryptographic implementations like AES from side channel attacks. It is a Low Entropy Masking Scheme (LEMS) and has attracted special attention from academia and industry with its low overhead and high performance. The two public targets of DPA Contest v4 are both RSM-masked A...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید