Results 51 to 60 of about 11,075,264 (337)
ABSTRACT Background Pediatric patients with extracranial solid tumors (ST) receiving chemotherapy are at an increased risk for Pneumocystis jirovecii pneumonia (PJP). However, evidence guiding prophylaxis practices in this population is limited. A PJP‐related fatality at our institution highlighted inconsistent prescribing approaches and concerns about
Kriti Kumar +8 more
wiley +1 more source
Efficient Arbitrarily Divisible E-Cash Applicable to Secure Massive Transactions
A conventional divisible E-cash (DEC) system allows each user to withdraw a coin of value 2n, then spend it in several times by dividing it into small ones of value 2l, for some l ∈ {0, 1, ⋯, n}. Observing that the price of many commodities
Jianhua Liu
doaj +1 more source
The Standard Model and Beyond [PDF]
Content 1. Why we do Believe in the Standard Model 2. Why we do not Believe in the Standard Model 2.1Conceptual Problems 2.2Hints from Experiment --2.2.1 Unification of Couplings --2.2.2 Dark Matter --2.2.3 Baryogenesis --2.2.4 Neutrino ...
Albuquerque +61 more
core +4 more sources
Sickle Cell Disease Is an Inherent Risk for Asthma in a Sibling Comparison Study
ABSTRACT Introduction Sickle cell disease (SCD) and asthma share a complex relationship. Although estimates vary, asthma prevalence in children with SCD is believed to be comparable to or higher than the general population. Determining whether SCD confers an increased risk for asthma remains challenging due to overlapping symptoms and the ...
Suhei C. Zuleta De Bernardis +9 more
wiley +1 more source
Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices
Attribute-based encryption (ABE) mechanism on lattices can against quantum attack and guarantees fine-grained access control of encrypted data, and it has been widely used in cloud computing and privacy protection.
Yuan Liu +3 more
doaj +1 more source
Cryptanalysis and Improvement of a Proxy Signcryption Scheme in the Standard Computational Model
Proxy signcryption is essential security primitive for emerging secure communication such as e-business, mobile agents, online voting, contract signing, and online auction.
Abdul Waheed +7 more
doaj +1 more source
Vacuum Stability of Standard Model^{++} [PDF]
The latest results of the ATLAS and CMS experiments point to a preferred narrow Higgs mass range (m_h \simeq 124 - 126 GeV) in which the effective potential of the Standard Model (SM) develops a vacuum instability at a scale 10^{9} -10^{11} GeV, with the
Anchordoqui, Luis A. +6 more
core +2 more sources
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein +3 more
wiley +1 more source
Beyond the Standard Model [PDF]
Spontaneous symmetry breaking has led physicists to possible solutions that extend the Standard Model theory to include gravity and dark matter candidates.
openaire +4 more sources
In the article are offered the structure of SIFI regulation system, its principles, and described the standard model in accordance with which is necessary to develop the regulation system of systemically important credit organizations in Russia.
M. A. Zhurba
doaj

