Results 121 to 130 of about 2,394,785 (300)

Deep Sequencing of FLT3‐ITD Enables Response Evaluation and Post‐Treatment Monitoring in Childhood AML: An Exploratory Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background An internal tandem duplication in the gene encoding Fms‐like tyrosine kinase 3 (FLT3‐ITD) is associated with high relapse risk and poor prognosis in acute myeloid leukemia (AML) and plays a crucial role in treatment decisions. Measurable residual disease (MRD) analysis of FLT3‐ITD during and after treatment has shown prognostic ...
Sofie Johansson Alm   +11 more
wiley   +1 more source

Claudin‐6 Protein Expression in Atypical Teratoid/Rhabdoid Tumors Is Strongly Enriched in the Molecular Subgroup AT/RT‐TYR

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Claudin‐6 has emerged as a promising immunotherapeutic target, yet protein‐level data in atypical teratoid/rhabdoid tumors (AT/RTs) have been inconsistent. We analyzed 36 well‐characterized AT/RT samples and found membranous claudin‐6 protein expression in 58% of cases, with striking enrichment in the molecular subgroup AT/RT‐TYR (100%) and ...
Victoria E. Fincke   +4 more
wiley   +1 more source

Time Toxicity in Wilms Tumor: Quantifying the Burden of Healthcare Interaction in the First Year After Diagnosis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Wilms tumor (WT) treatment imposes a significant time burden on patients and their families. Time toxicity is a patient‐centered metric that quantifies the burden of healthcare interaction. We sought to define time toxicity in the first year after diagnosis of WT and hypothesized that it would increase as tumor stage and treatment ...
Caleb Q. Ashbrook   +6 more
wiley   +1 more source

Method of informative-analytical support of information security management based on the system approach

open access: yesUkrainian Information Security Research Journal, 2014
Informative-analytical support of information security management based on the system approach is used to unite the heterogeneous security means and the forces of different security specialists in order to fulfil the strategic tasks of Ukraine’s national information security.
openaire   +1 more source

Scientometric analysis and information-analytical systems аccess [PDF]

open access: yes, 2016
Продуктивність наукової, педагогічної установи визначається рівнем інформаційно-аналітичних та наукометричних показників, що формуються на основі результатів наукових, педагогічних досліджень співробітників установи, рівнем інформаційно-комунікаційних ...
Марченко, О.О.
core  

Emapalumab for Immune Effector Cell‐Associated Hemophagocytic Lymphohistiocytosis‐Like Syndrome Following CD19‐Directed CAR‐T in Two Patients With B‐ALL: Clinical and Biomarker Correlates

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Immune effector cell‐associated hemophagocytic lymphohistiocytosis‐like syndrome (IEC‐HS) is a life‐threatening hyperinflammatory toxicity distinct from cytokine release syndrome (CRS) and neurotoxicity following chimeric antigen receptor T‐cell (CAR‐T) therapy. In a single‐institution retrospective cohort of pediatric and young adult patients
Thomas J. Galletta   +6 more
wiley   +1 more source

Epcast: Controlled Dissemination in Human-based Wireless Networks by means of Epidemic Spreading Models

open access: yes, 2007
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabilistic message replication and redundancy to ensure reliable communication ...
,   +4 more
core  

Home - About - Disclaimer - Privacy