Academic literature on the topic 'Counter Mode (GCM)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Counter Mode (GCM).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Counter Mode (GCM)"

1

Kim, Kyungho, Seungju Choi, Hyeokdong Kwon, Hyunjun Kim, Zhe Liu, and Hwajeong Seo. "PAGE—Practical AES-GCM Encryption for Low-End Microcontrollers." Applied Sciences 10, no. 9 (2020): 3131. http://dx.doi.org/10.3390/app10093131.

Full text
Abstract:
An optimized AES (Advanced Encryption Standard) implementation of Galois Counter Mode of operation (GCM) on low-end microcontrollers is presented in this paper. Two optimization methods are applied to proposed implementations. First, the AES counter (CTR) mode of operation is speed-optimized and ensures constant timing. The main idea is replacing expensive AES operations, including AddRound Key, SubBytes, ShiftRows, and MixColumns, into simple look-up table access. Unlike previous works, the look-up table does not require look-up table updates during the entire encryption life-cycle. Second, t
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Ping, Hong-Gang Hu, and Qian Yuan. "Close to Optimally Secure Variants of GCM." Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/9715947.

Full text
Abstract:
The Galois/Counter Mode of operation (GCM) is a widely used nonce-based authenticated encryption with associated data mode which provides the birthday-bound security in the nonce-respecting scenario; that is, it is secure up to about 2n/2 adversarial queries if all nonces used in the encryption oracle are never repeated, where n is the block size. It is an open problem to analyze whether GCM security can be improved by using some simple operations. This paper presents a positive response for this problem. Firstly, we introduce two close to optimally secure pseudorandom functions and derive the
APA, Harvard, Vancouver, ISO, and other styles
3

Kankara, Mahidhara Reddy. "Encrypted e-Voting System using IoT." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (2021): 453–60. http://dx.doi.org/10.22214/ijraset.2021.37973.

Full text
Abstract:
Abstract: Elections make a fundamental contribution to democratic governance but a lack of trust among citizens on their electoral system is a hindrance to satisfy the legal requirements of legislators. Even the world’s largest democratic countries suffer from issues like vote rigging, election manipulation and hacking of the electronic voting machines in the current voting system. To provide data security for e-Voting systems, the advanced encryption standard (AES) algorithm has been proposed, but traditional AES gives the same ciphertext for every similar pair of key and plaintext. So, to el
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Shuai, and Nicholas Hopper. "Mailet: Instant Social Networking under Censorship." Proceedings on Privacy Enhancing Technologies 2016, no. 2 (2016): 175–92. http://dx.doi.org/10.1515/popets-2016-0011.

Full text
Abstract:
Abstract Social media websites are blocked in many regimes where Internet censorship is applied. In this paper, we introduce Mailet, an unobservable transport proxy which enables the users to access social websites by email applications. Without assuming the Mailet servers are trustworthy, Mailet can support the services requiring privileges without having the complete credential. Particularly, the credential is split and distributed in two Mailet servers, and neither of them can recover the credential alone. To recover the credential in a TLS record message, we propose a highly efficient Galo
APA, Harvard, Vancouver, ISO, and other styles
5

Seo, Seog Chung, and Donggeun Kwon. "Highly Efficient SCA-Resistant Binary Field Multiplication on 8-Bit AVR Microcontrollers." Applied Sciences 10, no. 8 (2020): 2821. http://dx.doi.org/10.3390/app10082821.

Full text
Abstract:
Binary field ( B F ) multiplication is a basic and important operation for widely used crypto algorithms such as the GHASH function of GCM (Galois/Counter Mode) mode and NIST-compliant binary Elliptic Curve Cryptosystems (ECCs). Recently, Seo et al. proposed a novel SCA-resistant binary field multiplication method in the context of GHASH optimization in AES GCM mode on 8-bit AVR microcontrollers (MCUs). They proposed a concept of Dummy XOR operation with a kind of garbage registers and a concept of instruction level atomicity ( I L A ) for resistance against Timing Analysis (TA) and Simple Pow
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Zhun, Xiang Wang, Qiang Hao, et al. "High-Efficiency Parallel Cryptographic Accelerator for Real-Time Guaranteeing Dynamic Data Security in Embedded Systems." Micromachines 12, no. 5 (2021): 560. http://dx.doi.org/10.3390/mi12050560.

Full text
Abstract:
Dynamic data security in embedded systems is raising more and more concerns in numerous safety-critical applications. In particular, the data exchanges in embedded Systems-on-Chip (SoCs) using main memory are exposing many security vulnerabilities to external attacks, which will cause confidential information leakages and program execution failures for SoCs at key points. Therefore, this paper presents a security SoC architecture with integrating a four-parallel Advanced Encryption Standard-Galois/Counter Mode (AES-GCM) cryptographic accelerator for achieving high-efficiency data processing to
APA, Harvard, Vancouver, ISO, and other styles
7

Gudodagi, Raveendra, and R. Venkata Siva Reddy. "Security Provisioning and Compression of Diverse Genomic Data based on Advanced Encryption Standard (AES) Algorithm." International Journal of Biology and Biomedical Engineering 15 (May 14, 2021): 104–12. http://dx.doi.org/10.46300/91011.2021.15.14.

Full text
Abstract:
Compression of genomic data has gained enormous momentum in recent years because of advances in technology, exponentially growing health concerns, and government funding for research. Such advances have driven us to personalize public health and medical care. These pose a considerable challenge for ubiquitous computing in data storage. One of the main issues faced by genomic laboratories is the 'cost of storage' due to the large data file of the human genome (ranging from 30 GB to 200 GB). Data preservation is a set of actions meant to protect data from unauthorized access or changes. There ar
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Qiong, Anders Berglund, Dapeng Wang, et al. "GENE-46. XAF1 DRIVES DIFFERENTIAL PLASTICITY TOWARDS ADAPTIVE RESISTANCE BETWEEN MGMT-HYPERMETHYLATED AND MGMT-HYPOMETHYLATED GLIOBLASTOMA." Neuro-Oncology 21, Supplement_6 (2019): vi107. http://dx.doi.org/10.1093/neuonc/noz175.448.

Full text
Abstract:
Abstract Although, the epigenetic regulation of O6-alkylguanine DNA alkyltransferase (MGMT) in GBM is an established surrogate of intrinsic resistance to temozolomide (TMZ), the evolution of GBM habitats towards adaptive resistance to TMZ relative to MGMT promoter methylation status remains unclear. We report a novel epigenetic regulation of plasticity towards adaptive resistance in GBM. Using an adaptive TMZ resistance model of MGMT-hypermethylated and MGMT-hypomethylated GBM cellular habitats, a counter-intuitive inverse correlation was noted between intrinsic MGMT-dependent TMZ resistance v
APA, Harvard, Vancouver, ISO, and other styles
9

Svablova, T., N. Ternerova, M. Houdova Megova, P. Busek, and A. Sedo. "P10.01 Effect of mesenchymal cells on infiltration and phenotype of T cells in a 3D glioblastoma spheroid model." Neuro-Oncology 23, Supplement_2 (2021): ii27—ii28. http://dx.doi.org/10.1093/neuonc/noab180.094.

Full text
Abstract:
Abstract BACKGROUND Glioblastoma (GBM), the most malignant primary brain tumor with a median survival less than two years, is characterized by aggressive invasive growth, presence of hypoxic and necrotic regions, and T-cell dysfunction. Mesenchymal cells with characteristics of cancer associated fibroblasts are present in GBMs, but it remains to be established whether they contribute to T cell sequestration in the tumor stroma and functional inactivation similarly to extracranial tumors. Murine models do not reflect several aspects of human immune system and 2D cell culture systems often fail
APA, Harvard, Vancouver, ISO, and other styles
10

Nazarov, Vladimir, and Dmitry Afinogenov. "Global Climate Change as a National Security Threat: American and Russian Political Practices." Vestnik Volgogradskogo gosudarstvennogo universiteta. Serija 4. Istorija. Regionovedenie. Mezhdunarodnye otnoshenija 26, no. 1 (2021): 107–22. http://dx.doi.org/10.15688/jvolsu4.2021.1.10.

Full text
Abstract:
Introduction. The article gives an overview of American and Russian approaches to global climate change (GCC) in the context of the national security policy. The purpose of the study is to improve the national security policy in the context of GCC using international and Russian experience. The authors make proposals for refining Russian approaches to the problem including adjustments to the Russian Federation National Security Strategy, development of a number of other strategic planning documents and new initiatives to tackle threats related to GCC on a broad multilateral basis. Methods and
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Counter Mode (GCM)"

1

Zeileis, Achim, Christian Kleiber, and Simon Jackman. "Regression Models for Count Data in R." Foundation for Open Access Statistics, 2008. http://epub.wu.ac.at/4986/1/Zeileis_etal_2008_JSS_Regression%2DModels%2Dfor%2DCount%2DData%2Din%2DR.pdf.

Full text
Abstract:
The classical Poisson, geometric and negative binomial regression models for count data belong to the family of generalized linear models and are available at the core of the statistics toolbox in the R system for statistical computing. After reviewing the conceptual and computational features of these methods, a new implementation of hurdle and zero-inflated regression models in the functions hurdle() and zeroinfl() from the package pscl is introduced. It re-uses design and functionality of the basic R functions just as the underlying conceptual tools extend the classical models. Both hurdle
APA, Harvard, Vancouver, ISO, and other styles
2

Zeileis, Achim, Christian Kleiber, and Simon Jackman. "Regression Models for Count Data in R." Department of Statistics and Mathematics, WU Vienna University of Economics and Business, 2007. http://epub.wu.ac.at/1168/1/document.pdf.

Full text
Abstract:
The classical Poisson, geometric and negative binomial regression models for count data belong to the family of generalized linear models and are available at the core of the statistics toolbox in the R system for statistical computing. After reviewing the conceptual and computational features of these methods, a new implementation of zero-inflated and hurdle regression models in the functions zeroinfl() and hurdle() from the package pscl is introduced. It re-uses design and functionality of the basic R functions just as the underlying conceptual tools extend the classical models. Both model c
APA, Harvard, Vancouver, ISO, and other styles
3

Δακουρού, Στεφανία. "Υλοποίηση κρυπτο-επεξεργαστικής πλατφόρμας για κρυπτογράφηση μηνυμάτων στο πρότυπο Galois / Counter Mode (GCM)". Thesis, 2009. http://nemertes.lis.upatras.gr/jspui/handle/10889/2066.

Full text
Abstract:
Η παρούσα διπλωματική προτείνει μια hardware υλοποίηση για κρυπτογράφηση μηνυμάτων βασισμένη στο πρότυπο ασφαλείας Galois/Counter Mode (GCM). O αλγόριθμος κρυπτογράφησης Galois/Counter Mode (GCM) εκδόθηκε από τον οργανισμό National Institute of Standards and Technology (NIST) τον Νοέμβριο του 2007. Σε συνεργασία με τον μηχανισμό πιστοποίησης μηνυμάτων, υλοποιείται το συνολικό πρότυπο GCM για online λειτουργία. Στο Κεφάλαιο 1, αρχικά γίνεται μια σύντομη ιστορική αναδρομή στον τομέα της κρυπτογραφίας. Στην συνέχεια παρουσιάζονται οι λόγοι που οδήγησαν στην δημιουργία αυτού του προτύπου ασφαλ
APA, Harvard, Vancouver, ISO, and other styles
4

Σακελλαρίου, Παναγιώτης. "Υλοποίηση κρυπτο-επεξεργαστικής πλατφόρμας για πιστοποίηση μηνυμάτων στο πρότυπο Galois/Counter Mode (GCM)". Thesis, 2009. http://nemertes.lis.upatras.gr/jspui/handle/10889/2067.

Full text
Abstract:
Η παρούσα διπλωματική προτείνει μια hardware υλοποίηση του μηχανισμού πιστοποίησης μηνυμάτων βασισμένη στο πρότυπο Galois/Counter Mode (GCM) . O αλγόριθμος κρυπτογράφησης Galois/Counter Mode (GCM) εκδόθηκε από τον οργανισμό National Institute of Standards and Technology (NIST) τον Νοέμβριο του 2007. Σε συνεργασία με τον μηχανισμός κρυπτογράφησης μηνυμάτων, υλοποιείται το πρότυπο GCM για online λειτουργία. Στο Κεφάλαιο 1, αρχικά γίνεται μια σύντομη ιστορική αναδρομή στον τομέα της κρυπτογραφίας. Στην συνέχεια παρουσιάζονται οι λόγοι που οδήγησαν στην δημιουργία αυτού του αλγορίθμου. Ακολουθ
APA, Harvard, Vancouver, ISO, and other styles
5

Patel, Pujan. "Parallel Multiplier Designs for the Galois/Counter Mode of Operation." Thesis, 2008. http://hdl.handle.net/10012/3789.

Full text
Abstract:
The Galois/Counter Mode of Operation (GCM), recently standardized by NIST, simultaneously authenticates and encrypts data at speeds not previously possible for both software and hardware implementations. In GCM, data integrity is achieved by chaining Galois field multiplication operations while a symmetric key block cipher such as the Advanced Encryption Standard (AES), is used to meet goals of confidentiality. Area optimization in a number of proposed high throughput GCM designs have been approached through implementing efficient composite Sboxes for AES. Not as much work has been done in red
APA, Harvard, Vancouver, ISO, and other styles
6

(11249646), Alma R. Cortes Selva. "ECONOMIC IMPACTS OF THE EXPANSION OF RENEWABLE ENERGY: THE EXPERIENCE AT THE COUNTY AND NATIONAL LEVEL." Thesis, 2021.

Find full text
Abstract:
<p>This dissertation examines the impact of the expansion of renewable technology at both national and local level, through distinct essays. At the national level, the first paper analyzes the effects of economic and distributional impacts of climate mitigation policy, in the context of a developing country, to understand the interactions between the energy system and the macroeconomic environment. In the case of the local level, the second paper uses synthetic control method, to estimate the effect at the county level of utility scale wind in the development indicators for two counties in the
APA, Harvard, Vancouver, ISO, and other styles
7

Mader, Felix. "Räumliche, GIS-gestützte Analyse von Linientransektstichproben." Doctoral thesis, 2007. http://hdl.handle.net/11858/00-1735-0000-0006-B626-D.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Counter Mode (GCM)"

1

Maher, Garret. Highly Skilled Lebanese Transnational Migrants. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190608873.003.0009.

Full text
Abstract:
This chapter provides new information relating to aspects of transnational migration among high-skilled Lebanese migrants from a dual country perspective; that of the sending country, Lebanon, and of the receiving country, Kuwait. By using a dual, home and host country perspective, the chapter shows a more complete picture of some specific aspects of transnational migration, in particular, the motivations and drivers of migration, and why migrants chose Kuwait as a destination, as opposed to other GCC countries. It then explores aspects of integration and socialization to first identify the Le
APA, Harvard, Vancouver, ISO, and other styles
2

Jamal, Manal A. The ‘Other Arab’ and Gulf Citizens. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190608873.003.0006.

Full text
Abstract:
This chapter explores the fate of Arabs of Palestinian origin in the UAE, culminating in events surrounding the first Gulf War and the Arab uprisings. The specific questions this project addresses include: In the context of the UAE, which factors have historically shaped and changed the position of “other Arabs” over time? How have Palestinians, including younger generations, negotiated and addressed their sometimes tenuous relationship with the UAE? What do current dynamics portend for future relations between Emiratis and Arabs of Palestinian origin who live in the UAE? Two important observa
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Counter Mode (GCM)"

1

Mattsson, John, and Magnus Westerlund. "Authentication Key Recovery on Galois/Counter Mode (GCM)." In Progress in Cryptology – AFRICACRYPT 2016. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31517-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

McGrew, David A., and John Viega. "The Security and Performance of the Galois/Counter Mode (GCM) of Operation." In Progress in Cryptology - INDOCRYPT 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30556-9_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Quicke, Donald, Buntika A. Butcher, and Rachel Kruft Welton. "More generalized linear modelling." In Practical R for biologists: an introduction. CABI, 2021. http://dx.doi.org/10.1079/9781789245349.0171.

Full text
Abstract:
Abstract This chapter employs generalized linear modelling using the function glm when we know that variances are not constant with one or more explanatory variables and/or we know that the errors cannot be normally distributed, for example, they may be binary data, or count data where negative values are impossible, or proportions which are constrained between 0 and 1. A glm seeks to determine how much of the variation in the response variable can be explained by each explanatory variable, and whether such relationships are statistically significant. The data for generalized linear models take the form of a continuous response variable and a combination of continuous and discrete explanatory variables.
APA, Harvard, Vancouver, ISO, and other styles
4

Quicke, Donald, Buntika A. Butcher, and Rachel Kruft Welton. "More generalized linear modelling." In Practical R for biologists: an introduction. CABI, 2021. http://dx.doi.org/10.1079/9781789245349.0015.

Full text
Abstract:
Abstract This chapter employs generalized linear modelling using the function glm when we know that variances are not constant with one or more explanatory variables and/or we know that the errors cannot be normally distributed, for example, they may be binary data, or count data where negative values are impossible, or proportions which are constrained between 0 and 1. A glm seeks to determine how much of the variation in the response variable can be explained by each explanatory variable, and whether such relationships are statistically significant. The data for generalized linear models take the form of a continuous response variable and a combination of continuous and discrete explanatory variables.
APA, Harvard, Vancouver, ISO, and other styles
5

Quenum, Gandome Mayeul L. D., Nana A. B. Klutse, Eric A. Alamou, Emmanuel A. Lawin, and Philip G. Oguntunde. "Precipitation Variability in West Africa in the Context of Global Warming and Adaptation Recommendations." In African Handbook of Climate Change Adaptation. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-45106-6_85.

Full text
Abstract:
AbstractIt is commonly accepted that the Earth’s climate is changing and will continue to change in the future. Rising temperatures are one of the direct indicators of global climate change. To investigate how the rising global temperature will affect the spatial pattern of rainfall in West Africa, the precipitation and potential evapotranspiration variables from ten Global Climate Models (GCMs) under the RCP8.5 scenario were driven by the Rossby Centre regional atmospheric model (RCA4) from the COordinated Regional Climate Downscaling EXperiment (CORDEX) and analyzed at four specific global warming levels (GWLs) (i.e., 1.5 °C, 2.0 °C, 2.5 °C, and 3.0 °C) above the preindustrial level. This study utilized three indices, the precipitation concentration index (PCI), the precipitation concentration degree (PCD), and the precipitation concentration period (PCP) over West Africa to explore the spatiotemporal variations in the characteristics of precipitation concentrations. Besides, the analysis of the effect of the specified GWLs on the Consecutive Dry Days (CDD), Consecutive Wet Days (CWD), and frequency of the intense rainfall events allowed to a better understanding of the spatial and temporal patterns of extreme precipitation in West Africa. Results reveal that, for the projections simulations and at each GWL, the rainfall onset starts one month earlier in the Gulf of Guinea in response to the control period. To encourage adaptation to the various changes in climate in general, and particularly in respect of rainfall, this study proposes several adaptation methods that can be implemented at the local (country) level, as well as some mitigation and adaptation strategies at the regional (West African) level.
APA, Harvard, Vancouver, ISO, and other styles
6

Nyarko, Jackson, Frank A. Yeboah, Felix A. Yeboah, Isaac S. Larbi, and Maxwell Osei-Bonsu. "Green Supply Chain in Solid Waste Management: Case Study of EcoCare H2H Waste Collection, Goaso, Ghana." In Green Supply Chain - Competitiveness and Sustainability. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.93718.

Full text
Abstract:
Today, Green supply chain management (GSCM) has become a multidisciplinary concept by constructing environmental management practices in the context of various supply chains including waste management services. Environmental issues have become an important integration into the supply chain management, so that each step from organization’s materials management and transportation functions to the end customer can be structured to include environmental awareness. The authors analyze the levels of application of GSCM in waste management value chain of Ghana and use our house-to-house waste collection model as case. Review of the social, environmental and economic impacts made by waste EcoCare and other solid waste management companies that incorporate circularity – at least a recovery and recycling channel at some point – into their service shows are setting a pace for understanding, adoption and replication of green supply chain management (GSCM) into waste management in the country. The authors recommend that private-public-partnerships for waste management in Goaso and other cities would be greener if they replicated the circular economy model implemented by EcoCare Waste Initiative and its H2H Waste Collection model.
APA, Harvard, Vancouver, ISO, and other styles
7

Bernal, León Darío Parra, and Milenka Linneth Argote Cusi. "Key Factors of Dynamic SMEs in Colombia Using GEM Data." In Handbook of Research on Increasing the Competitiveness of SMEs. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9425-3.ch007.

Full text
Abstract:
This chapter contributes to the public policy discussion about the key factors related with dynamic SMEs in Colombia. Authors analyze the case of Colombia through a quantitative approach with a binomial logistic model to estimate the level of association between selected independent variables and dynamic SMEs in the country using GEM data 2017. One of the most important outcomes was that the export activity as well as the level of education of entrepreneurs and previous business experience increase the propensity of Dynamic SMEs in the country. In contrast, variables such as seed capital at the beginning of business and business training did not show a significant relationship with Dynamic SMEs for this case. Notwithstanding the prosperity entrepreneurship ecosystem in Colombia, only 3% of entrepreneurs and their companies are classified as dynamic by authors' model, and there are still great challenges to changes in public policy toward knowledge-intensive entrepreneurship.
APA, Harvard, Vancouver, ISO, and other styles
8

Bernal, León Darío Parra, and Milenka Linneth Argote Cusi. "Key Factors of Dynamic SMEs in Colombia Using GEM Data." In Research Anthology on Small Business Strategies for Success and Survival. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-9155-0.ch048.

Full text
Abstract:
This chapter contributes to the public policy discussion about the key factors related with dynamic SMEs in Colombia. Authors analyze the case of Colombia through a quantitative approach with a binomial logistic model to estimate the level of association between selected independent variables and dynamic SMEs in the country using GEM data 2017. One of the most important outcomes was that the export activity as well as the level of education of entrepreneurs and previous business experience increase the propensity of Dynamic SMEs in the country. In contrast, variables such as seed capital at the beginning of business and business training did not show a significant relationship with Dynamic SMEs for this case. Notwithstanding the prosperity entrepreneurship ecosystem in Colombia, only 3% of entrepreneurs and their companies are classified as dynamic by authors' model, and there are still great challenges to changes in public policy toward knowledge-intensive entrepreneurship.
APA, Harvard, Vancouver, ISO, and other styles
9

Mohapatra, Sudhir Kumar. "Automatic Lung Tuberculosis Detection Model Using Thorax Radiography Image." In Deep Learning Applications in Medical Imaging. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5071-7.ch010.

Full text
Abstract:
Tuberculosis (TB) is a communal disease with high death and disease rates worldwide. The chest radiograph (CXR) is commonly used in diagnostic solutions for lung TB. Automatic computer-aided solutions to identify TB using CXRs and can advance the efficiency of the diagnostic of TB. In this chapter, an automatic TB detection model using CXR image is proposed. By identifying open issues include how detect the lung region automatically and what are the features, one can identify if a given CXR image is infected or normal using three public datasets such as Schengen, Montgomery Country (MC), and JSRT. The possible textural features of a lung object are obtained from the first-order and second-order gray level co-occurrence matrix (GLCM) statistical features. The performance of the proposed model was evaluated using accuracy, sensitivity, and specificity, and the model achieved AUC 91%, 62%, 71%, and 81% on Schengen, JSRT, MC, and combined datasets.
APA, Harvard, Vancouver, ISO, and other styles
10

Meki, Muhammad, Kate Roll, and Simon Quinn. "Mutuality and the Potential of Microequity." In Putting Purpose Into Practice. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198870708.003.0016.

Full text
Abstract:
Chapter 16 describes an experiment that is in progress in Kenya to encourage entrepreneurial activity through financing investment by micro-equity rather than micro-debt. The experiment involves individuals distributing Wrigley chewing gum products alongside other goods in Kenya, in particular in areas of the country which were previously impenetrable by existing distribution mechanisms. To assist with their activities, funding arrangements were put in place to allow the distributors to purchase bicycles. The study investigates what happens when the distributors were offered alternative forms of finance ranging from traditional debt instruments to more equity forms of risk (revenue) sharing.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Counter Mode (GCM)"

1

Durad, Muhammad Hanif, Muhammad Nauman Khan, and Zaman Ahmad. "Analysis and optimization of Galois/Counter Mode (GCM) using MPI." In 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, 2015. http://dx.doi.org/10.1109/ibcast.2015.7058525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Geran, Amir Ali Kouzeh, and Arash Reyhani-Masoleh. "A CRC-Based Concurrent Fault Detection Architecture for Galois/Counter Mode (GCM)." In 2016 IEEE 23nd Symposium on Computer Arithmetic (ARITH). IEEE, 2016. http://dx.doi.org/10.1109/arith.2016.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Elhag, Saba, Ibrahem Abdalhakam, and Manar Abel-Rahman. "Prevalence of Consanguinity among ASD Individuals: Systematic Review & Meta-analysis." In Qatar University Annual Research Forum & Exhibition. Qatar University Press, 2020. http://dx.doi.org/10.29117/quarfe.2020.0163.

Full text
Abstract:
Aim: We aim to estimate the global prevalence of consanguinity among the ASD families and compare that among different populations. Methods: Meta-analysis of observational studies reporting prevalence of consanguinity among ASD families was searched systematically in important databases including EMBASE, PubMed and Academic Search Complete. Individual studies were screened by two reviewers independently, extracted data and assessed the risk of bias using a risk of bias tool (Hoy’s tool). Random Effect model was used to calculate pooled weighted estimates due to considerable heterogeneity. Subg
APA, Harvard, Vancouver, ISO, and other styles
4

Eissa, Eiman Abdel Maksoud. "Consumer Behavior in Grocery Shopping: Qatari Community during the GCC Blockade." In Qatar University Annual Research Forum & Exhibition. Qatar University Press, 2020. http://dx.doi.org/10.29117/quarfe.2020.0266.

Full text
Abstract:
While Qatar had the highest GDP in the world in 2016, it faced the dilemma of a blockade in June 2017. This had a direct effect on the Qatari community who united and showed clear signs of patriotism. Consumers turned from the blockade countries’ food products to products that were local or those that came from supporting countries. This blockade was seen as an economic opportunity for local brands as well as many international brands since 40% of the food that was previously available came from blockading countries (IISS, 2017). With this, many new brands entered the market and soon prospered
APA, Harvard, Vancouver, ISO, and other styles
5

Rudolph, J., S. Bergholz, K. Metzger, F. Silber, A. Klenk, and T. Müller. "Advanced Component Fatigue Monitoring Approaches Using the Example of a Boiler Recirculation Pump." In ASME 2020 Pressure Vessels & Piping Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/pvp2020-21053.

Full text
Abstract:
Abstract In the past, lifetime consideration of conventional power plant components focused on the creep behavior under internal pressure loading. Changing operating conditions towards flexible loads and load cycles as well as occurring damages underline the necessity to consider the fatigue and creep-fatigue behavior of the components. It is recommendable to integrate components such as boiler recirculation pumps into a fatigue monitoring program with continuous measurement of thermo-mechanical loads as a key feature. The paper describes the pilot fatigue monitoring of the boiler recirculatio
APA, Harvard, Vancouver, ISO, and other styles
6

LIUBKINA, Olena, Natalia KOVTUN, Mariya KNIR, and Lyudmyla ANISIMOVA. "SCENARIO MODELING OF FRONTIER FINANCIAL MARKET DEVELOPMENT." In International Scientific Conference „Contemporary Issues in Business, Management and Economics Engineering". Vilnius Gediminas Technical University, 2021. http://dx.doi.org/10.3846/cibmee.2021.612.

Full text
Abstract:
Purpose – Hypothesis verification and quantification of the relationship between drivers and the resulting factors for a lasting impact on the long-term ICT development, globalization, structural changes in the geo-economy and changes in socio-ethical standards in society in the frontier financial markets. Research methodology – Based on open source information, a database of almost 19,000 data was formed - 748 obser-vations by country on 25 indicators. The simulation was performed on the basis of a mixed-model, which is a statistical model that is an extended version of the General Linear Mod
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Counter Mode (GCM)"

1

Salowey, J., A. Choudhury, and D. McGrew. AES Galois Counter Mode (GCM) Cipher Suites for TLS. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Viega, J., and D. McGrew. The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rescorla, E. TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter Mode (GCM). RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!