Results 71 to 80 of about 5,550,853 (286)

Global variation in anastomosis and end colostomy formation following left‐sided colorectal resection

open access: yesBJS Open, 2019
Background End colostomy rates following colorectal resection vary across institutions in high‐income settings, being influenced by patient, disease, surgeon and system factors.
GlobalSurg Collaborative   +10 more
doaj   +1 more source

Practical cross-layer testing of HARQ-induced delay variation on IP/RTP QoS and VoLTE QoE

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
As the PHY/MAC-layer IR-HARQ and RLC-layer ARQ error recovery procedures, adopted in LTE, may impose additional delay when their code-block retransmissions occur, the arising question is whether these significantly contribute to IP and consequently RTP ...
Adriana Lipovac   +3 more
doaj   +1 more source

Formal Analysis of V2X Revocation Protocols [PDF]

open access: yes, 2017
16 pages, 4 ...
Whitefield, Jorden   +6 more
openaire   +4 more sources

Clinical Characteristics and Prognostic Risk Factors for Pediatric B‐Cell Lymphoblastic Lymphoma: A Multicenter Retrospective Cohort Study for China Net Childhood Lymphoma

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background B‐cell lymphoblastic lymphoma (B‐LBL) represents a rare variety of non‐Hodgkin lymphoma, with limited research on its biology, progression, and management. Methods A retrospective analysis was performed on the clinical characteristics of 256 patients aged ≤18 years who received treatment under the China Net Childhood Lymphoma (CNCL)‐
Zhijuan Liu   +20 more
wiley   +1 more source

A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology

open access: yesIEEE Access, 2019
The security analysis of Security Protocol Implementations(SPI) is an important part of cybersecurity. However, with the strength of property protection and the widely used applications of code obfuscation technology, the previous security analysis ...
Xudong He   +4 more
doaj   +1 more source

Exercise Interventions in Children, Adolescents and Young Adults With Paediatric Bone Tumours—A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Bone tumours present significant challenges for affected patients, as multimodal therapy often leads to prolonged physical limitations. This is particularly critical during childhood and adolescence, as it can negatively impact physiological development and psychosocial resilience.
Jennifer Queisser   +5 more
wiley   +1 more source

A Comparative Study of Cerebral Oxygenation During Exercise in Hemodialysis and Peritoneal Dialysis Patients

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Cognitive impairment and exercise intolerance are common in dialysis patients. Cerebral perfusion and oxygenation play a major role in both cognitive function and exercise execution; HD session per se aggravates cerebral ischemia in this population. This study aimed to compare cerebral oxygenation and perfusion at rest and in mild
Marieta P. Theodorakopoulou   +10 more
wiley   +1 more source

Eliminating Network Protocol Vulnerabilities Through Abstraction and Systems Language Design

open access: yes, 2013
Incorrect implementations of network protocol message specifications affect the stability, security, and cost of network system development. Most implementation defects fall into one of three categories of well defined message constraints.
Casey, C. Jasson   +3 more
core   +1 more source

Intraoperative Collection of Ascitic Fluid With Intra‐ or Postoperative Reinfusion in Ovarian Cancer: Safety and Feasibility of a Roller Pumping Method

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Patients with ovarian cancer often present with massive ascites, leading to significant protein loss during surgical procedures. Although cell‐free concentrated ascites reinfusion therapy (CART) is used in palliative settings to mitigate protein loss, its application in intraoperative settings remains unexplored.
Yutaka Yoneoka   +7 more
wiley   +1 more source

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy