Results 41 to 50 of about 78,722 (281)

Personalized Selumetinib Dosing in Pediatric Neurofibromatosis Type 1: Insights From a Pilot Therapeutic Drug Monitoring Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate selumetinib exposure using therapeutic drug monitoring (TDM) in pediatric patients with neurofibromatosis type 1 (NF1) and plexiform neurofibromas (PN), assess interpatient pharmacokinetic variability, and explore the relationship between drug exposure, clinical response, and adverse effects.
Janka Kovács   +8 more
wiley   +1 more source

The new normal? Redaction bias in biomedical science

open access: yesRoyal Society Open Science, 2021
A concerning amount of biomedical research is not reproducible. Unreliable results impede empirical progress in medical science, ultimately putting patients at risk.
David Robert Grimes, James Heathers
doaj   +1 more source

Cryptanalysis of SIGABA [PDF]

open access: yes, 2007
SIGABA is a World War II cipher machine used by the United States. Both the United States Army and the United States Navy used it for tactical communication.
Chan, Wing
core   +4 more sources

Adherence to Protocol Recommendations for Children With Wilms Tumour in Two Consecutive Studies in the United Kingdom and Ireland—Does Variation Matter?

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background and Aims Wilms tumour (WT) has excellent event‐free and overall survival (OS). However, small differences exist between countries participating in the same international study. This led us to examine variation in adherence to protocol recommendations as a potential contributing factor.
Suzanne Tugnait   +23 more
wiley   +1 more source

A note on an infeasible linearization of some block ciphers

open access: yes, 2017
A block cipher can be easily broken if its encryption functions can be seen as linear maps on a small vector space. Even more so, if its round functions can be seen as linear maps on a small vector space. We show that this cannot happen for the AES. More
Aragona, Riccardo   +2 more
core   +1 more source

VG1 Cipher – A DNA Indexing Cipher

open access: yesInternational Journal of Innovative Technology and Exploring Engineering, 2020
When it comes to providing security to information systems, encryption emerges as an indispensable tool, as it has been used intensively in past few decades for securing stationary data as well as data in motion. Earlier, the security of an encryption algorithm lied in the manipulation of characters among a word or group of words, which is called the ...
Akhil Kaushik*, Dr. Vikas Thada
openaire   +1 more source

Evaluating the Utility of Paired Tumor and Germline Targeted DNA Sequencing for Pediatric Oncology Patients: A Single Institution Report

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate the diagnostic yield and utility of universal paired tumor–normal multigene panel sequencing in newly diagnosed pediatric solid and central nervous system (CNS) tumor patients and to compare the detection of germline pathogenic/likely pathogenic variants (PV/LPVs) against established clinical referral criteria for cancer ...
Natalie Waligorski   +9 more
wiley   +1 more source

Information Security of Soviet Partisans and Underground during World War II

open access: yesБезопасность информационных технологий, 2011
This article deals with the ciphers and some other methods of data protection and communication means used by the soviet partisans during World War II.
D. A. Larin
doaj  

Homozygous variant of MLC1 results in megalencephalic leukoencephalopathy with subcortical cysts

open access: yesMolecular Genetics & Genomic Medicine
Background Megalencephalic leukoencephalopathy with subcortical cysts (MLC) is a rare, inherited disorder that causes epilepsy, intellectual disorders, and early onset macrocephaly. MLC1 has been identified as a main pathogenic gene.
Jian Zha   +8 more
doaj   +1 more source

Application Research on Fuzzy Cognitive Map in Information Security Risk Assessment [PDF]

open access: yesJisuanji gongcheng, 2016
Since various types of information security risk assessment standards are too complex,as an alternative,most enterprises can only choose to do construction in accordance with safety standards in implementation.This always leads to a substantial gap that ...
CHEN Yu,WANG Yadi,WANG Jindong,WANG Na
doaj   +1 more source

Home - About - Disclaimer - Privacy