Results 31 to 40 of about 470,699 (271)
Study region: The Upper Niger and Bani River basins in West Africa. Study focus: The growing demand for food, water, and energy led Mali and Guinea to develop ambitious hydropower and irrigation plans, including the construction of a new dam and the ...
Stefan Liersch +10 more
doaj +1 more source
Ghera: A Repository of Android App Vulnerability Benchmarks
Security of mobile apps affects the security of their users. This has fueled the development of techniques to automatically detect vulnerabilities in mobile apps and help developers secure their apps; specifically, in the context of Android platform due ...
Arzt Steven +4 more
core +1 more source
ABSTRACT We sought to identify potential early risk biomarkers for lung disease in children post‐allogeneic HCT. Patients with pulmonary function tests 3 months post‐transplant and plasma samples between days 7 and 14 post‐HCT were included. Six of 27 subjects enrolled had reduced forced expiratory volume 1 (FEV1) z scores.
Isabella S. Small +3 more
wiley +1 more source
Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus +6 more
wiley +1 more source
STRATEGIC ANALYSIS OF UKRAINE’S SECURITY ENVIRONMENT
The article reports on the results of a strategic analysis of Ukraine's security environment based on a SWOT analysis. The focus is on the security environment as of the eve of the large-scale war launched by the Russian Federation against Ukraine in ...
Olga Reznikova
doaj +1 more source
Security of internet protocol cameras - A case example [PDF]
The interaction of consumer devices and the internet, especially in relation to security, has always been tenuous. Where it is in the best interests of companies to produce products that are cheap and accessible, these traits often go against that of ...
Campbell, William
core +2 more sources
The ocean carbon sink – impacts, vulnerabilities and challenges [PDF]
Carbon dioxide (CO2) is, next to water vapour, considered to be the most important natural greenhouse gas on Earth. Rapidly rising atmospheric CO2 concentrations caused by human actions such as fossil fuel burning, land-use change or cement production ...
Anderson, Leif +7 more
core +3 more sources
ABSTRACT Ongoing evidence indicates increased risk of sarcopenic obesity among children and young people (CYP) with acute lymphoblastic leukemia (ALL), often beginning early in treatment, persisting into survivorship. This review evaluates current literature on body composition in CYP with ALL during and after treatment.
Lina A. Zahed +5 more
wiley +1 more source
Securing library information system: Vulnerabilities and threats [PDF]
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Husin, Mohd Zabidin +3 more
core
The electrophysiologic substrates of atrial flutter and fibrillation (AFF) have been studied in patients with paroxysmal arrhythmias. Atrial repetitive responses to extrastimuli are a nonspecific response, even though they can precipitate AFF. AFF inducibility is rather sensitive, but not very specific, in separating patients from controls. There is no
openaire +2 more sources

