Results 71 to 80 of about 6,040,269 (294)
ABSTRACT A second allogeneic (allo‐)hematopoietic stem cell transplantation (HSCT2) is a potential curative option for pediatric patients with acute lymphoblastic leukemia (ALL) following relapse after first allogeneic transplantation (HSCT1), but its efficacy is limited by high relapse rates and transplant‐related toxicity in highly pretreated ...
Ava Momm +10 more
wiley +1 more source
Provably Correct Control-Flow Graphs from Java Programs with Exceptions [PDF]
We present an algorithm to extract flow graphs from Java bytecode, focusing on exceptional control flows. We prove its correctness, meaning that the behaviour of the extracted control-flow graph is an over-approximation of the behaviour of the original ...
Amighi, Afshin +2 more
core +1 more source
ABSTRACT Secondary hyperparathyroidism (SHPT) is a common complication in patients receiving maintenance dialysis, driven by calcium and phosphate metabolism disturbances. Calcimimetics are central to the management of SHPT by enhancing calcium‐sensing receptor sensitivity and reducing parathyroid hormone secretion.
Fumihiko Koiwa +3 more
wiley +1 more source
Power Flow Control and Current Ripple Minimization of HVDC Converter System by Using Zero-Sequence Voltage Injection Control [PDF]
This paper introduces the Zero_Sequence Voltage_Injection(ZSVI) based Model Predictive_Control (MPC) to minimize the ripples in dc current & voltage and concurrently regulate the power_flow & dc_current. This paper takes the benefits to calculate
B, R. I. (Rekha), R, P. S. (Prof)
core
Cluster-based feedback control of turbulent post-stall separated flows
We propose a novel model-free self-learning cluster-based control strategy for general nonlinear feedback flow control technique, benchmarked for high-fidelity simulations of post-stall separated flows over an airfoil. The present approach partitions the
Brunton, Steven L. +5 more
core +1 more source
Code trolley: hardware-assisted control flow obfuscation [PDF]
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak +2 more
core
ABSTRACT Introduction Adult‐onset Still's disease (AOSD) complicated by macrophage activation syndrome (MAS) carries substantial mortality. The role of therapeutic plasma exchange (TPE) remains uncertain. Methods We retrospectively analyzed patients with AOSD‐MAS treated with TPE at a single‐center.
Masataka Ueda +15 more
wiley +1 more source
An experimental investigation was carried out to understand the effects of LEP (leading-edge protuberance) blades on the structural characteristics of VAWTs. A series of experiments were performed on VAWTs with straight and LEP blades for a wide range of
Karthikvel Elangovan, S. Nadaraja Pillai
doaj +1 more source
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi +5 more
wiley +1 more source
Flow Control Applications [PDF]
Flow control has a long history with many successes across a plethora of applications. This report addresses the characteristics of the approaches that are actually used, why they are used, the many approaches that are not used, and why.
Bushnell, Dennis M., Wygnanski, Israel
core +1 more source

