Results 41 to 50 of about 1,559,860 (292)

Evaluation of the Utility of Baseline Echocardiogram in Patients With Standard Risk Precursor B‐Lymphoblastic Leukemia

open access: yesPediatric Blood &Cancer, EarlyView.
Abstract Background A routine baseline echocardiogram is often obtained prior to anthracycline administration in children with cancer. The utility of baseline echocardiogram is unclear in patients with standard risk B‐cell acute lymphoblastic leukemia (SR B‐ALL) as their anthracycline cumulative dose is low.
Ziyad Alrajhi   +4 more
wiley   +1 more source

An Improved Data Integrity Verification Method for Cloud Storage [PDF]

open access: yesJisuanji gongcheng, 2019
Most existing cloud storage data integrity verification methods have low efficiency and high communication overhead.To solve this problem,an improved data integrity verification method for cloud storage is proposed.The bilinear pairing technique is used ...
WU Yinghao,LING Jie
doaj   +1 more source

Active Sampling-based Binary Verification of Dynamical Systems

open access: yes, 2018
Nonlinear, adaptive, or otherwise complex control techniques are increasingly relied upon to ensure the safety of systems operating in uncertain environments. However, the nonlinearity of the resulting closed-loop system complicates verification that the
Ali A.   +11 more
core   +1 more source

Gemcitabine, Docetaxel, Melphalan, Carboplatin as Part of Sequential Cycles of High‐Dose Chemotherapy With Autologous Hematopoietic Stem‐Cell Rescue for Multiply Relapsed/Refractory Pediatric Germ Cell Tumors

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Although most malignant germ cell tumors (GCTs) are highly curable with cisplatin‐based therapy, options for patients with multiply relapsed/refractory disease remain limited. For this population, we report the first pediatric use of gemcitabine, docetaxel, melphalan, and carboplatin (GemDMC) as part of sequential cycles of high‐dose ...
Maria Frost   +10 more
wiley   +1 more source

Radar Data Integrity Verification Using 2D QIM-Based Data Hiding

open access: yesSensors, 2020
The modern-day vehicle is evolved in a cyber-physical system with internal networks (controller area network (CAN), Ethernet, etc.) connecting hundreds of micro-controllers.
Raghu Changalvala   +2 more
doaj   +1 more source

VP_TT: A value propagation based equivalence checker for testability transformations

open access: yesIET Software, 2021
Testability transformation (TT) is a source‐to‐source programme transformation that aims to improve the ability of a given test generation method to generate test data for the original programme.
Ramanuj Chouksey   +2 more
doaj   +1 more source

Verification of Okun’s Law on Russian Data

open access: yesФинансы: теория и практика, 2022
The purpose of the study is to assess the empirical relationship between economic growth and unemployment in the Russian economy. The research methodology is based on an econometric analysis of time series representing data on unemployment and economic ...
Yu. K. Zaitsev
doaj   +1 more source

Tree-formed Verification Data for Trusted Platforms

open access: yes, 2012
The establishment of trust relationships to a computing platform relies on validation processes. Validation allows an external entity to build trust in the expected behaviour of the platform based on provided evidence of the platform's configuration.
Andreas Brett   +54 more
core   +1 more source

CPX‐351 in High‐Risk Relapsed Pediatric Acute Leukemia: Real‐World Phase 1 Data Establishing the FDA‐Approved Dose

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Outcomes for pediatric relapsed/refractory (R/R) acute myeloid leukemia (AML) remain dismal. CPX‐351, a liposomal formulation of cytarabine and daunorubicin, may have less off‐target toxicities than traditional chemotherapies and has shown improved outcomes for adults with newly diagnosed therapy‐related AML.
Jonathan D. Bender   +17 more
wiley   +1 more source

Enhanced Security and Efficiency in Blockchain With Aggregated Zero-Knowledge Proof Mechanisms

open access: yesIEEE Access
Blockchain technology has emerged as a revolutionary tool in ensuring data integrity and security in digital transactions. However, the current approaches to data verification in blockchain systems, particularly in Ethereum, face challenges in terms of ...
Oleksandr Kuznetsov   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy