Results 61 to 70 of about 9,831,323 (353)

KV-theory of categories [PDF]

open access: yesTransactions of the American Mathematical Society, 1981
Quillen has constructed a K K -theory K ∗ C {K_{\ast }}C for nice categories, one of which is the category of projective R R -modules. We construct a theory K V
openaire   +2 more sources

Prolonged Corrected QT Interval as an Early Electrocardiographic Marker of Cyclophosphamide‐Induced Cardiotoxicity in Pediatric Hematology and Oncology Patients

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Cyclophosphamide (CY) is associated with potentially fatal cardiotoxicity, yet no electrocardiographic indices have been established for early detection of CY‐induced cardiomyopathy. This study aimed to determine whether corrected QT interval (QTc) prolongation can predict early onset of CY‐related cardiac dysfunction in pediatric ...
Junpei Kawamura   +5 more
wiley   +1 more source

Predicting Chronicity in Children and Adolescents With Newly Diagnosed Immune Thrombocytopenia at the Timepoint of Diagnosis Using Machine Learning‐Based Approaches

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objectives To identify predictors of chronic ITP (cITP) and to develop a model based on several machine learning (ML) methods to estimate the individual risk of chronicity at the timepoint of diagnosis. Methods We analyzed a longitudinal cohort of 944 children enrolled in the Intercontinental Cooperative immune thrombocytopenia (ITP) Study ...
Severin Kasser   +6 more
wiley   +1 more source

Theory of Interface: Category Theory, Directed Networks and Evolution of Biological Networks [PDF]

open access: yes, 2012
Biological networks have two modes. The first mode is static: a network is a passage on which something flows. The second mode is dynamic: a network is a pattern constructed by gluing functions of entities constituting the network.
Haruna, Taichi
core  

Patient‐Level Barriers and Facilitators to Inpatient Physical Therapy in Adolescents and Young Adults With a Hematological Malignancy: A Qualitative Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher   +8 more
wiley   +1 more source

Human-Machine Duality: What’s Next in Cognitive Aspects of Artificial Intelligence?

open access: yesIEEE Access, 2022
The goal of the paper is to find means for the unification of human-machine duality in collective behavior of people and machines, by conciliating approaches that proceed in opposite directions. The first approach proceeds top-down from non-formalizable,
Alexander N. Raikov, Massimiliano Pirani
doaj   +1 more source

Psychological Safety Among Interprofessional Pediatric Oncology Teams in Germany: A Nationwide Survey

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn   +4 more
wiley   +1 more source

Geospatial Modeling of Directions for the Development and Implementation of the Land Administration System at the Regional Level

open access: yesCivil and Environmental Engineering
The article is devoted to researching the topical issue of the development and implementation of a modern land administration system as a direction of land relations, considering the development of geo-information systems, mathematical modeling tools and
Bieliatynskyi Andrii   +4 more
doaj   +1 more source

Formal Model of IDS Based on BDI Logic

open access: yesMathematics, 2021
Computer network security is an important aspect of computer science. Many researchers are trying to increase security using different methods, technologies, or tools.
Ján Perháč   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy