Results 41 to 50 of about 91,976 (334)
ABSTRACT Ongoing evidence indicates increased risk of sarcopenic obesity among children and young people (CYP) with acute lymphoblastic leukemia (ALL), often beginning early in treatment, persisting into survivorship. This review evaluates current literature on body composition in CYP with ALL during and after treatment.
Lina A. Zahed +5 more
wiley +1 more source
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein +2 more
doaj +1 more source
Cows, clicks, ciphers, and satire
The social network game Farmville, which allows players to grow crops, raise animals, and produce a variety of goods, proved enormously successful within a year of its launch in 2009, attracting 110 million Facebook users.
Tom Tyler
doaj +1 more source
Application Research on Fuzzy Cognitive Map in Information Security Risk Assessment [PDF]
Since various types of information security risk assessment standards are too complex,as an alternative,most enterprises can only choose to do construction in accordance with safety standards in implementation.This always leads to a substantial gap that ...
CHEN Yu,WANG Yadi,WANG Jindong,WANG Na
doaj +1 more source
Parent‐to‐Child Information Disclosure in Pediatric Oncology
ABSTRACT Background Despite professional consensus regarding the importance of open communication with pediatric cancer patients about their disease, actual practice patterns of disclosure are understudied. Extant literature suggests a significant proportion of children are not told about their diagnosis/prognosis, which is purported to negatively ...
Rachel A. Kentor +12 more
wiley +1 more source
«The black room» the Russian foreign Ministry against Napoleon
This article deals with the successful activity of the Russian Empire cryptographers against Napoleon and his troops. Also some organizational work aspects of interception of French army cipher messages are considered.
D. E. Larin
doaj +1 more source
VG1 Cipher – A DNA Indexing Cipher
When it comes to providing security to information systems, encryption emerges as an indispensable tool, as it has been used intensively in past few decades for securing stationary data as well as data in motion. Earlier, the security of an encryption algorithm lied in the manipulation of characters among a word or group of words, which is called the ...
Akhil Kaushik*, Dr. Vikas Thada
openaire +1 more source
ABSTRACT Background Cyclophosphamide (CY) is associated with potentially fatal cardiotoxicity, yet no electrocardiographic indices have been established for early detection of CY‐induced cardiomyopathy. This study aimed to determine whether corrected QT interval (QTc) prolongation can predict early onset of CY‐related cardiac dysfunction in pediatric ...
Junpei Kawamura +5 more
wiley +1 more source
Information Security of Soviet Partisans and Underground during World War II
This article deals with the ciphers and some other methods of data protection and communication means used by the soviet partisans during World War II.
D. A. Larin
doaj
Homozygous variant of MLC1 results in megalencephalic leukoencephalopathy with subcortical cysts
Background Megalencephalic leukoencephalopathy with subcortical cysts (MLC) is a rare, inherited disorder that causes epilepsy, intellectual disorders, and early onset macrocephaly. MLC1 has been identified as a main pathogenic gene.
Jian Zha +8 more
doaj +1 more source

