Results 61 to 70 of about 6,954,298 (295)
ABSTRACT Background Families of children with cancer experience significant financial strain, even with universal healthcare. Indirect costs, such as productivity losses and non‐medical expenses, are rarely included in economic evaluations, and little is known about how effectively financial aid programmes alleviate this burden. Childhood brain tumours
Megumi Lim +8 more
wiley +1 more source
Studying the neutron orbital structure by coherent hard exclusive processes off 3He [PDF]
Hard exclusive processes, such as Deeply Virtual Compton Scattering (DVCS), allow to access generalized parton distributions (GPDs). By means of an Impulse Approximation (IA) calculation, it is shown here how, in the low momentum transfer region, the sum
Rinaldi, Matteo, Scopetta, Sergio
core +2 more sources
Inpatient Food Insecurity and Pediatric Hematology Oncology Hospitalization Outcomes
ABSTRACT Children with cancer and blood disorders are at risk for food insecurity (FI). We aimed to describe the association of inpatient food insecurity (IFI) and hospitalization outcomes among patients admitted to the pediatric hematology oncology service. Of 325 caregivers screened for IFI, 60 (18.6%) screened positive.
Joanna M. Robles +4 more
wiley +1 more source
ABSTRACT Introduction Pre‐dilution online hemodiafiltration (Pre‐HDF) is predominantly used in Japan, whereas post‐dilution online HDF (Post‐HDF) is more common in Europe. An asymmetric cellulose triacetate (ATA) membrane may improve biocompatibility.
Kenji Sakurai +4 more
wiley +1 more source
Attribute-based encryption with hidden policies in the access tree
The existing policies-hidden attribute-based encryption (ABE) schemes could only support a limited access structure,which resulted in weak expressiveness.A new structure of access tree was thus proposed to integrate attribute hiding and secret sharing ...
Yan SONG +3 more
doaj
Secret sharing scheme with general access structure based on integer programming [PDF]
In order to simplify the access structure and ensure that all integer programming have solutions,a scheme is proposed to apply integer programming directly to the secret sharing of general access structure.By constructing integer programming,the secret ...
XIE Yang,MIAO Fuyou,BAI Jianfeng
doaj +1 more source
Design for Accessibility for Floating Structures [PDF]
This paper focuses on recent works completed by GHD Pty Ltd in 2016 for the design of accessible ferry terminals and looks at the techniques utilised and designs implemented to develop terminals with the intent to provide inclusive unassisted all-tide access.
openaire +1 more source
An efficient multiversion access structure [PDF]
An efficient multiversion access structure for a transaction-time database is presented. Our method requires optimal storage and query times for several important queries and logarithmic update times. Three version operations-inserts, updates, and deletes-are allowed on the current database, while queries are allowed on any version, present or past ...
Varman, Peter J., Verma, Rakesh M.
openaire +1 more source
ABSTRACT Introduction Bloodstream infections due to repeated vascular access (VA) puncture and circuit connections remain major concerns in hemodialysis. Therefore, we examined current practices for glove, disinfectant, and personal protective equipment (PPE) use according to VA type in national university hospitals in Japan.
Aiko Yamada +6 more
wiley +1 more source
Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice [PDF]
—In order to provide access control on encrypted data, Attribute-based encryption (ABE) defines each user using a set of attributes. Fuzzy identity-based encryption (FIBE) is a variant of ABE that allows for a threshold access structure for users.
Sedigheh Khajouei-Nejad +3 more
doaj

