Learn More
The power consumed by a circuit varies according to the activity of its individual transistors and other components. As a result, measurements of the power used by actual computers or microchips contain information about the operations being performed and the data being processed. Cryptographic designs have traditionally assumed that secrets are manipulated(More)
BACKGROUND Individuals with intellectual disability (ID) are known to have a high prevalence of both low bone mineral density (BMD) and fractures with significant attendant morbidity. Effective strategies aimed at reducing fractures will be facilitated by the identification of predisposing risk factors. METHODS Bone mineral density was measured by(More)
BACKGROUND The present study was designed to determine the prevalence of abnormal cervical cytology in an institutionalized population with intellectual disability. METHOD A retrospective review of charts for 162 women at a large state-owned facility was performed. Slides from 310 cervical Papanicolau smears were re-screened by a cytotechnologist and then(More)
This study investigates the prevalence and degree of low bone mineral density (BMD) in a group of 108 institutionalized men with developmental disabilities. Speed of sound (SOS) and broadband attenuation (BUA) of the calcaneus were measured to determine a quantitative ultrasound index (QUI). Comparison was made to the values for this index in a reference(More)
This study was designed to assess the prevalence and severity of low bone mineral density in an institutionalized population of postmenopausal women (n = 79) with developmental disabilities, using quantitative ultrasound of the calcaneus. The results demonstrate that this population has a significantly lower quantitative ultrasound index (QUI) of the(More)
The DPA attack can efficiently disclose the secret key of an AES Engine easily. To increase DPA Resistant of the AES engine by XORing the generated 16 bit from Pseudo Random Number Generator with the cipher text from the AES Engine. The cipher text is created by AES algorithm which is very Efficient Algorithm for data Securing. The 16 Bit Sequence Generator(More)
OBJECTIVE Gynecologic examination of some individuals with intellectual disability can be especially problematic. Many of these women reside in a community setting and a widely applicable method for performing these examinations is desirable. METHODS Intellectually disabled women were referred by their primary care providers for gynecologic examinations(More)