Results 51 to 60 of about 6,477,960 (317)
ABSTRACT Background The Improving Population Outcomes for Renal Tumours of childhood (IMPORT) is a prospective clinical observational study capturing detailed demographic and outcome data on children and young people diagnosed with renal tumours in the United Kingdom and the Republic of Ireland.
Naomi Ssenyonga +56 more
wiley +1 more source
Key Management Building Blocks for Wireless Sensor Networks [PDF]
Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly.
Doumen, J.M., Law, Y.W., Palaniswami, M.
core +2 more sources
Key issues on partial least squares (PLS) in operations management research: A guide to submissions [PDF]
Purpose: This work aims to systematise the use of PLS as an analysis tool via a usage guide or recommendation for researchers to help them eliminate errors when using this tool.
Alfalla Luque, Rafaela +1 more
core +4 more sources
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard +8 more
wiley +1 more source
Ternary polynomial based key management scheme for wireless sensor network
A ternary polynomial based key management (KMTP) scheme was proposed,which is effective in cluster based wireless sensor networks.Firstly,the base station will give each node one unique identi ier to ensure the validity of the node.Then,algorithm of the ...
Zhi-tao GUAN, Yue XU, Jun WU
doaj
An Identity Based Key Management Scheme in Wireless Sensor Networks [PDF]
Pairwise key establishment is one of the fundamental security services in sensor networks which enables sensor nodes in a sensor network to communicate securely with each other using cryptographic techniques.
Das, Ashok Kumar, Giri, Debasis
core
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis +13 more
wiley +1 more source
Realization of smart home key management mechanism based on ECC
At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this ...
Wenbin CHENG, Jia LIU
doaj
A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments
IoT systems differ from traditional Internet systems in that they are different in scale, footprint, power requirements, cost and security concerns that are often overlooked.
Soodamani Ramalingam +3 more
doaj +1 more source
Lifestyle Behaviors and Cardiotoxic Treatment Risks in Adult Childhood Cancer Survivors
ABSTRACT Background Higher doses of anthracyclines and heart‐relevant radiotherapy increase cardiovascular disease (CVD) risk. This study assessed CVD and CVD risk factors among adult childhood cancer survivors (CCSs) across cardiotoxic treatment risk groups and examined associations between lifestyle behaviors and treatment risks.
Ruijie Li +6 more
wiley +1 more source

