Results 81 to 90 of about 30,805,646 (334)
Dependency-aware unequal erasure protection codes [PDF]
Classical unequal erasure protection schemes split data to be protected into classes which are encoded independently. The unequal protection scheme presented in this paper is based on an erasure code which encodes all the data together according to the ...
A. Albanese +4 more
core +1 more source
ABSTRACT Treatment‐associated hepatotoxicity (TAH) is a common complication of pediatric acute lymphoblastic leukemia (ALL) treatment, but genetic risk factors remain poorly understood. We evaluated the SOD2 rs4880 variant in 544 children with ALL at Texas Children's Hospital. After adjusting for demographic and clinical covariates, the rs4880 C allele
Emily J. Mason +14 more
wiley +1 more source
The rapid digitization and digitalization of services, along with extensive use of personal data across public and private sectors, have raised concerns about personal data protection and privacy.
Noe Nnko +7 more
doaj +1 more source
Privacy in (mobile) telecommunications services [PDF]
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den +4 more
core +1 more source
ABSTRACT Introduction Bloodstream infections due to repeated vascular access (VA) puncture and circuit connections remain major concerns in hemodialysis. Therefore, we examined current practices for glove, disinfectant, and personal protective equipment (PPE) use according to VA type in national university hospitals in Japan.
Aiko Yamada +6 more
wiley +1 more source
COVID-19 Contact Tracing and Data Protection Can Go Together
We discuss the implementation of app-based contact tracing to control the coronavirus disease (COVID-19) pandemic and discuss its data protection and user acceptability aspects.
Johannes Abeler +3 more
semanticscholar +1 more source
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi +5 more
wiley +1 more source
Reciprocal control of viral infection and phosphoinositide dynamics
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley +1 more source
The promotion of data sharing in pharmacoepidemiology [PDF]
This article addresses the role of pharmacoepidemiology in patient safety and the crucial role of data sharing in ensuring that such activities occur. Against the backdrop of proposed reforms of European data protection legislation, it considers whether ...
Sethi, Nayha
core +1 more source
Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes +3 more
wiley +1 more source

