Results 71 to 80 of about 11,640,166 (343)
ABSTRACT We present two pediatric cases of pediatric low‐grade gliomas (PLGG) with BRAF V600E mutations diagnosed and monitored using cerebrospinal fluid (CSF) liquid biopsy analyzed via digital droplet PCR (ddPCR), without tissue biopsy. Both patients were treated with dabrafenib and trametinib and monitored through clinical assessments, magnetic ...
Hannah Sultan +5 more
wiley +1 more source
ABSTRACT Ongoing evidence indicates increased risk of sarcopenic obesity among children and young people (CYP) with acute lymphoblastic leukemia (ALL), often beginning early in treatment, persisting into survivorship. This review evaluates current literature on body composition in CYP with ALL during and after treatment.
Lina A. Zahed +5 more
wiley +1 more source
Exposing WikiPathways as Linked Open Data [PDF]
Biology has become a data intensive science. Discovery of new biological facts increasingly relies on the ability to find and match appropriate biological data. For instance for functional annotation of genes of interest or for identification of pathways
Andra Waagmeester +2 more
core +2 more sources
Parent‐to‐Child Information Disclosure in Pediatric Oncology
ABSTRACT Background Despite professional consensus regarding the importance of open communication with pediatric cancer patients about their disease, actual practice patterns of disclosure are understudied. Extant literature suggests a significant proportion of children are not told about their diagnosis/prognosis, which is purported to negatively ...
Rachel A. Kentor +12 more
wiley +1 more source
ABSTRACT Background Cyclophosphamide (CY) is associated with potentially fatal cardiotoxicity, yet no electrocardiographic indices have been established for early detection of CY‐induced cardiomyopathy. This study aimed to determine whether corrected QT interval (QTc) prolongation can predict early onset of CY‐related cardiac dysfunction in pediatric ...
Junpei Kawamura +5 more
wiley +1 more source
Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data
Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and
Edkrantz M. +4 more
core +1 more source
ABSTRACT Objectives To identify predictors of chronic ITP (cITP) and to develop a model based on several machine learning (ML) methods to estimate the individual risk of chronicity at the timepoint of diagnosis. Methods We analyzed a longitudinal cohort of 944 children enrolled in the Intercontinental Cooperative immune thrombocytopenia (ITP) Study ...
Severin Kasser +6 more
wiley +1 more source
ABSTRACT Surveillance imaging aims to detect tumour relapse before symptoms develop, but it's unclear whether earlier detection of relapse leads to better outcomes in children and young people (CYP) with medulloblastoma and ependymoma. This systematic review aims to identify relevant literature to determine the efficacy of surveillance magnetic ...
Lucy Shepherd +3 more
wiley +1 more source
Underscoring archival authenticity with blockchain technology
Archives have well-established practices which have been developed over years of working with analogue records. Now they face huge challenges due to the inexorable development of digital technologies.
Mark Bell +7 more
doaj +1 more source
Today the world’s largest economies and corporations trade in data and its products to generate value in new disruptive markets. Within these markets vast streams of data are often inaccessible or untapped and controlled by powerful monopolies. Counter to this exclusive use of data is a promising world-wide “open-data” movement, promoting freely ...
openaire +2 more sources

