Results 31 to 40 of about 345,903 (245)
ABSTRACT Chemotherapy‐induced peripheral neuropathy remains a major complication in pediatric cancer, with disrupted somatosensory and nociceptive processing being a key aspect. This review synthesizes empirical studies on alterations in somatosensory and nociceptive processing in children and adolescents with cancer.
Julia Schweiger +4 more
wiley +1 more source
ABSTRACT Introduction Adolescent siblings of children with cancer are at elevated risk for psychosocial problems. Unfortunately, various barriers such as limited family time and resources, conflicting schedules, and psychosocial staffing constraints at cancer centers hinder sibling access to support.
Christina M. Amaro +10 more
wiley +1 more source
Due to the emergence of online society, a representative user authentication method that is password authentication has been a key topic. However, in this authentication method, various attack techniques have emerged to steal passwords input from the ...
Kyungroul Lee, Kangbin Yim
doaj +1 more source
ABSTRACT Purpose Chemoimmunotherapy with irinotecan, temozolomide, and dinutuximab (I/T/DIN) has emerged as first‐line therapy for relapsed/refractory (r/r) high‐risk neuroblastoma (HRNB) in North America. Topotecan and cyclophosphamide (T/C) are often used in combination with dinutuximab in the setting of lack of response, progression, or incomplete ...
Benjamin J. Lerman +17 more
wiley +1 more source
GoibhniUWE: A Lightweight and Modular Container-Based Cyber Range
Cyberattacks are rapidly evolving both in terms of techniques and frequency, from low-level attacks through to sophisticated Advanced Persistent Threats (APTs).
Alan Mills, Jonathan White, Phil Legg
doaj +1 more source
The object of research in the article are the tools and capabilities of the C# programming language for the implementation of cybersecurity analysis software in local computer networks and computer-integrated systems.
Vladyslav Pashynskykh +4 more
doaj +1 more source
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra +3 more
wiley +1 more source
Bluetooth vulnerability analysis
Attacks on personal data everyday become popular among hackers. Bluetooth is a kind of wireless network for file sharing between two devices, characterized by low cost, power, complexity and reliability, is a vulnerability to security protocols as well as user privacy. The purpose of the article is to analyze the shortcomings of Bluetooth security.
openaire +3 more sources
Organoids in pediatric cancer research
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley +1 more source
Countries with high debt exposure are vulnerable to economic and financial shocks that could lead to sovereign defaults. This paper develops a methodology to identify countries that are at risk of debt default based on four elements of debt vulnerability.
Doemeland, Doerte +4 more
openaire +1 more source

