Results 41 to 50 of about 4,404,286 (307)
Recent developments in child protection policy and practice in Scotland and the UK [PDF]
This paper describes the developments in child protection policy and practice following the deaths of Kennedy McFarlane and Victoria Climbie. It outlines child protection statistics in Scotland and the findings of the Child Protection Review.
Kendrick, Andrew
core
ABSTRACT Treatment‐associated hepatotoxicity (TAH) is a common complication of pediatric acute lymphoblastic leukemia (ALL) treatment, but genetic risk factors remain poorly understood. We evaluated the SOD2 rs4880 variant in 544 children with ALL at Texas Children's Hospital. After adjusting for demographic and clinical covariates, the rs4880 C allele
Emily J. Mason +14 more
wiley +1 more source
Use of Signs of Handwriting for Information Security Systems
Special studies related to the development of rules for making decisions ion on the psychological characteristics of the offender in his manuscript handwriting with the goal of ensuring information security are made.
N. E. Gunko
doaj
Genetic testing: ethical aspects
The aim of this article is to provide an analysis of the main issues related to the application of predictive medicine by analysing the most significant ethical implications.
Bin Paola +7 more
doaj +1 more source
Legal protection of information [PDF]
"May 1990." "c1988. -- Published in Weaver, vol. 7, no. 1, Fall 1989."Includes bibliographical references (p.
core
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi +5 more
wiley +1 more source
MATHEMATICS ALGORITHMS OF THE INFORMATION PROTECTION
There were discussed mathematics algorithms of the information protection with purpose to use the main methods of the cryptography algorithm in the medicine.
I. M. Shupiatskyi
doaj +1 more source
The Modern-Era Retrospective analysis for Research and Applications, Version 2 (MERRA-2) is widely used as an advanced model dataset for the understanding of global climate change.
Yang Ou +10 more
doaj +1 more source
Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe +3 more
wiley +1 more source
The Protection of Personally Identifiable Information
Personally identifiable information (PII) can be defined as any piece of information that can, directly or indirectly and unrelated to the public interest, be used to identify a natural person.
DeLiang Liu
doaj +1 more source

