Results 51 to 60 of about 2,828,600 (279)
Abstract Introduction The TEDDI trial tested the feasibility and reproducibility of deep‐inspiration breath‐hold (DIBH) in pediatric patients referred for radiotherapy. This report presents final results, including patient‐reported outcomes (PRO) and dosimetric comparison of DIBH and free‐breathing (FB).
Daniella Elisabet Østergaard +11 more
wiley +1 more source
A Blockchain-Based Efficient Data Integrity Verification Scheme in Multi-Cloud Storage
The cloud storage service provides the storage and access function for massive data, reducing the management cost for large amounts of data. The data integrity verification scheme in cloud storage can be employed to help users confirm the integrity of ...
Yiran Zhang, Huizheng Geng, Li Su, Li Lu
doaj +1 more source
ABSTRACT Background Cyclophosphamide (CY) is associated with potentially fatal cardiotoxicity, yet no electrocardiographic indices have been established for early detection of CY‐induced cardiomyopathy. This study aimed to determine whether corrected QT interval (QTc) prolongation can predict early onset of CY‐related cardiac dysfunction in pediatric ...
Junpei Kawamura +5 more
wiley +1 more source
Enhancing Data Integrity in Blockchain Oracles Through Multi-Label Analysis
The oracle problem in blockchain refers to the critical need to obtain reliable external data for the correct execution of smart contracts. Dependence on these external sources involves risks of manipulation and inaccuracies that can compromise automated
Cristian Camilo Ordoñez +2 more
doaj +1 more source
Secure Hop-by-Hop Aggregation of End-to-End Concealed Data in Wireless Sensor Networks
In-network data aggregation is an essential technique in mission critical wireless sensor networks (WSNs) for achieving effective transmission and hence better power conservation. Common security protocols for aggregated WSNs are either hop-by-hop or end-
Aly, Salah A., Mlaih, Esam
core +1 more source
ABSTRACT Surveillance imaging aims to detect tumour relapse before symptoms develop, but it's unclear whether earlier detection of relapse leads to better outcomes in children and young people (CYP) with medulloblastoma and ependymoma. This systematic review aims to identify relevant literature to determine the efficacy of surveillance magnetic ...
Lucy Shepherd +3 more
wiley +1 more source
This paper explores cybersecurity risk modeling for open data in Smart City environments, with a specific case study focused on the Hradec Kralove Region.
Vladimir Sobeslav, Josef Horalek
doaj +1 more source
Answer Sets for Consistent Query Answering in Inconsistent Databases
A relational database is inconsistent if it does not satisfy a given set of integrity constraints. Nevertheless, it is likely that most of the data in it is consistent with the constraints. In this paper we apply logic programming based on answer sets to
Arenas, Marcelo +2 more
core +3 more sources
Pathogenic Germline PALB2 and RAD50 Variants in Patients With Relapsed Ewing Sarcoma
ABSTRACT Approximately 10% of patients with Ewing sarcoma (EwS) have pathogenic germline variants. Here, we report two cases: first, a novel germline pathogenic variant in partner and localizer of BRCA2 (PALB2) in a patient with a late EwS relapse. Its impact on homologous recombination is demonstrated, and breast cancer risk is discussed.
Molly Mack +12 more
wiley +1 more source
Secure Delivery Method for Preserving Data Integrity of a Video Frame with Sensitive Objects
Data integrity and authenticity verification are essential requirements to provide reliability for applications running in a video delivery system. We design a prototype system for handling data integrity as well as encoding sensitive objects in a video ...
You-Rak Choi, Yunhee Kang
doaj +1 more source

