Results 71 to 80 of about 10,010 (275)

‘They Need to Hear You Say It’: Healthcare Professionals’ Perspectives on Barriers and Enablers to End‐of‐Life Discussions With Adolescents and Young Adults With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT End‐of‐life conversations with adolescents and young adults (AYAs) with cancer rarely occur without the guidance of healthcare professionals. As a part of the ‘Difficult Discussions’ study, focused on palliative care and advance care planning discussions with AYAs with cancer, we investigated the factors that healthcare professionals identify ...
Justine Lee   +9 more
wiley   +1 more source

Feasibility and Safety of High‐Dose Proton Re‐Irradiation in Recurrent Pediatric Central Nervous System Tumors: A Single‐Institution Retrospective Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Pediatric central nervous system (CNS) tumors often recur despite multimodality therapy. Although re‐irradiation (re‐RT) has historically been limited by concerns for severe late toxicities, modern techniques have renewed interest in this approach. Proton therapy provides dosimetric advantages that may enable curative re‐treatment with
Jin‐Ho Song   +15 more
wiley   +1 more source

Liveness of Randomised Parameterised Systems under Arbitrary Schedulers (Technical Report)

open access: yes, 2016
We consider the problem of verifying liveness for systems with a finite, but unbounded, number of processes, commonly known as parameterised systems. Typical examples of such systems include distributed protocols (e.g. for the dining philosopher problem).
Lin, Anthony W., Ruemmer, Philipp
core   +2 more sources

Liveness Detection Authentication

open access: yesInternational Journal for Research in Applied Science and Engineering Technology
Abstract: The continuously increasing number of attacks on authentication systems occur due to the dependency on weak security mechanisms and approaches, so live biometric systems should beutilized. Especially since they are an approved base of trustworthy authentication. Password based authentication systems offer numerous benefits and they are common
Mr. Anil Kumar   +5 more
openaire   +1 more source

Blinatumomab Utilization in Pediatric B‐Cell Acute Lymphoblastic Leukemia: Experience From the Mountain West

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Blinatumomab is a bispecific T‐cell engager approved for the treatment of pediatric B‐cell acute lymphoblastic leukemia (B‐ALL). Outpatient home infusion reduces hospitalization burden and optimizes resource utilization, but is logistically challenging.
Angela Parra del Riego   +10 more
wiley   +1 more source

Implementation of Face Recognition, Attendance Detection, and Geolocation using TensorFlow Lite and Google ML Kit in a Mobile Attendance Application

open access: yesSistemasi: Jurnal Sistem Informasi
Attendance applications are increasingly needed across various sectors, including education, government, and offices. However, challenges such as identity fraud and location manipulation remain unresolved.
Fajar Abdillah Ahmad, Nunik Pratiwi
doaj   +1 more source

Assessing Cognitive Functioning in Children With Brain Tumors: Interaction of Neighborhood Social Determinants of Health and Neurological Risk

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich   +5 more
wiley   +1 more source

Efficacy and Safety Analysis of Roxarestat in Regulating Renal Anemia in Patients on Maintenance Hemodialysis

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Objective To compare the efficacy and safety of roxarestat versus recombinant human erythropoietin (rhEPO) in the management of renal anemia in patients undergoing maintenance hemodialysis. Methods This was a prospective, open‐label, randomized controlled trial.
Lingling Chen, Junjie Zhu, Qiaonan Ge
wiley   +1 more source

Using Flow Specifications of Parameterized Cache Coherence Protocols for Verifying Deadlock Freedom

open access: yes, 2014
We consider the problem of verifying deadlock freedom for symmetric cache coherence protocols. In particular, we focus on a specific form of deadlock which is useful for the cache coherence protocol domain and consistent with the internal definition of ...
A. Bouajjani   +27 more
core   +1 more source

Liveness Detection with Opencv

open access: yesInternational Journal of Innovative Technology and Exploring Engineering, 2019
Biometric system is widely used to recognize the authorized person based on either behavioural characteristics or physical. But this can be spoofed using various traits. Spoofing attack is nothing but attacking or harming biometric recognition system using security features to use system without permission of authorized user.
openaire   +1 more source

Home - About - Disclaimer - Privacy