Results 61 to 70 of about 979,377 (280)
Mdivi-1, a mitochondrial fission inhibitor, modulates T helper cells and suppresses the development of experimental autoimmune encephalomyelitis. [PDF]
BACKGROUND: Unrestrained activation of Th1 and Th17 cells is associated with the pathogenesis of multiple sclerosis and its animal model, experimental autoimmune encephalomyelitis (EAE).
Chai, Zhi +12 more
core +1 more source
Maintaining trajectory privacy in mobile wireless sensor networks [PDF]
Mobile wireless sensor networks (MWSN) is a subdomain of wireless sensor networks in which sensors and/or sinks are mobile. In this study, we propose a scheme for providing trajectory privacy of mobile sink nodes.
Kiraz, Osman, Levi, Albert
core +2 more sources
Treatment Decision‐Making Roles and Preferences Among Adolescents and Young Adults With Cancer
ABSTRACT Background Decision‐making (DM) dynamics between adolescents and young adults (AYAs) with cancer, parents, and oncologists remain underexplored in diverse populations. We examined cancer treatment DM preferences among an ethnically and socioeconomically diverse group of AYAs and their parents.
Amanda M. Gutierrez +14 more
wiley +1 more source
Deterministic model to evaluate the impact of lactational treatment of subclinical mastitis due to coagulase-negative staphylococci [PDF]
Coagulase-negative staphylococci (CNS) are the most frequently isolated bacteria from milk samples in several studies worldwide. Despite their relative frequency, specific measures aiming at their control are not well established. One possible measure to
Cristina L Vilela +7 more
core +1 more source
ABSTRACT Purpose Cognitive and psychological difficulties could negatively interfere with treatment adherence and quality of life before and after hematopoietic stem cell transplant (HSCT). Methods to mitigate these changes may have positive effects on treatment success.
Kristen L. Votruba +11 more
wiley +1 more source
A Stronger Soft-Covering Lemma and Applications
Wyner's soft-covering lemma is a valuable tool for achievability proofs of information theoretic security, resolvability, channel synthesis, and source coding.
Cuff, Paul
core +1 more source
Secure Cloud Storage: A Framework for Data Protection as a Service in the Multi-cloud Environment [PDF]
This paper introduces Secure Cloud Storage (SCS), a framework for Data Protection as a Service (DPaaS) to cloud computing users. Compared to the existing Data Encryption as a Service (DEaaS) such as those provided by Amazon and Google, DPaaS provides ...
Asal, Rasool +5 more
core +2 more sources
AbstractIt is shown that the Ramsey numberR(Cn,Cn,Cn) is bounded from above by (4+o(1))n. In particular, ifnis odd thenR(Cn,Cn,Cn)=(4+o(1))n.
openaire +1 more source
Pregabalin: a range of misuse-related unanswered questions [PDF]
© 2019 The Authors.
Chiappini, Stephania, Schifano, Fabrizio
core +2 more sources
ABSTRACT A second allogeneic (allo‐)hematopoietic stem cell transplantation (HSCT2) is a potential curative option for pediatric patients with acute lymphoblastic leukemia (ALL) following relapse after first allogeneic transplantation (HSCT1), but its efficacy is limited by high relapse rates and transplant‐related toxicity in highly pretreated ...
Ava Momm +10 more
wiley +1 more source

