Results 61 to 70 of about 2,872,014 (281)
ABSTRACT Background Kaposiform lymphangiomatosis (KLA) is an aggressive complex lymphatic anomaly. Patients exhibit malformed lymphatic vessels and often develop hemorrhagic effusions and elevated angiopoietin‐2 (Ang‐2) levels. A somatic NRAS p.Q61R (NRASQ61R) mutation has been associated with KLA.
C. Griffin McDaniel +3 more
wiley +1 more source
ABSTRACT Background The management of clinically apparent single lesions or oligofocal nephroblastomatosis, a facultative precursor of nephroblastoma, remains debated. Methods We retrospectively analyzed 37 patients with clinically apparent single or oligofocal nephroblastomatosis (two to three lesions per kidney) among 2347 patients registered between
Nils Welter +17 more
wiley +1 more source
Dynamic Information Flow Analysis in Ruby [PDF]
With the rapid increase in usage of the internet and online applications, there is a huge demand for applications to handle data privacy and integrity.
Chandrasekaran, Vigneshwari
core +1 more source
ABSTRACT End‐of‐life conversations with adolescents and young adults (AYAs) with cancer rarely occur without the guidance of healthcare professionals. As a part of the ‘Difficult Discussions’ study, focused on palliative care and advance care planning discussions with AYAs with cancer, we investigated the factors that healthcare professionals identify ...
Justine Lee +9 more
wiley +1 more source
A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks
Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks (WSNs). However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct ...
Qiang Zhou, Geng Yang, Liwen He
doaj +1 more source
ABSTRACT Purpose Pediatric central nervous system (CNS) tumors often recur despite multimodality therapy. Although re‐irradiation (re‐RT) has historically been limited by concerns for severe late toxicities, modern techniques have renewed interest in this approach. Proton therapy provides dosimetric advantages that may enable curative re‐treatment with
Jin‐Ho Song +15 more
wiley +1 more source
Blockchain Beyond Cryptocurrency: Emerging Applications in Secure Data Sharing [PDF]
Background: Blockchain, mainly known for supporting cryptocurrencies, has a much broader role, as seen in this paper. These fundamental features of decentralization and immutability guarantee improved security and transparency in multiple spheres of ...
Mohammed Abdul Jaleel Maktoof +4 more
doaj +1 more source
Secure Hop-by-Hop Aggregation of End-to-End Concealed Data in Wireless Sensor Networks
In-network data aggregation is an essential technique in mission critical wireless sensor networks (WSNs) for achieving effective transmission and hence better power conservation. Common security protocols for aggregated WSNs are either hop-by-hop or end-
Aly, Salah A., Mlaih, Esam
core +1 more source
ABSTRACT Background Survivors of childhood acute lymphoblastic leukemia (ALL) often exhibit early deficits in muscle and movement competence, which can compromise long‐term health. Integrative neuromuscular training (INT), a multifaceted approach combining fundamental movement activities with strength exercises, may help address these deficits during ...
Anna Maria Markarian +7 more
wiley +1 more source
Integrating IoT, Artificial Intelligence, and Blockchain Technologies for the Development of Smart Networks [PDF]
Background: IoT Smart networks are the latest creation of smart technology where Internet of Things, Artificial Intelligence, and Blockchain technologies have merged.
Sura Sabah +4 more
doaj +1 more source

