Articles with "safe implementation" as a keyword



Photo by nelly13 from unsplash

St.Gallen consensus on safe implementation of transanal total mesorectal excision

Sign Up to like & get
recommendations!
Published in 2017 at "Surgical Endoscopy"

DOI: 10.1007/s00464-017-5990-2

Abstract: BackgroundThe management of rectal cancer has evolved over the years, including the recent rise of Transanal Total Mesorectal Excision (TaTME). TaTME addresses the limitations created by the bony confines of the pelvis, bulky tumours, and… read more here.

Keywords: total mesorectal; consensus; mesorectal excision; transanal total ... See more keywords
Photo from wikipedia

A practical guide for the safe implementation of early phase drug development and immunotherapy program in gynecologic oncology practice.

Sign Up to like & get
recommendations!
Published in 2018 at "Gynecologic oncology"

DOI: 10.1016/j.ygyno.2018.08.037

Abstract: The success of targeted and immune therapies in other malignancies has led to an exponential increase in the number of active and pending clinical trials using these therapeutic approaches in patients with gynecologic cancers. These… read more here.

Keywords: guide safe; gynecologic oncology; practical guide; oncology ... See more keywords
Photo from wikipedia

Safe implementation of standard concentration infusions in paediatric intensive care

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Pharmacy and Pharmacology"

DOI: 10.1111/jphp.12580

Abstract: To evaluate safety, following introduction of standard concentrations of morphine infusions in paediatric critical care. read more here.

Keywords: implementation standard; infusions paediatric; concentration infusions; standard concentration ... See more keywords
Photo by kellysikkema from unsplash

SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA

Sign Up to like & get
recommendations!
Published in 2022 at "Micromachines"

DOI: 10.3390/mi13111872

Abstract: Cryptographic algorithms (RSA, DSA, and ECC) use modular exponentiation as part of the principal operation. However, Non-profiled Side Channel Attacks such as Simple Power Analysis and Differential Power Analysis compromise cryptographic algorithms that use such… read more here.

Keywords: algorithm; number; sca safe; implementation modified ... See more keywords