• No results found

Altered neutrophil immunophenotypes in childhood B‑cell precursor acute lymphoblastic leukemia

N/A
N/A
Protected

Academic year: 2020

Share "Altered neutrophil immunophenotypes in childhood B‑cell precursor acute lymphoblastic leukemia"

Copied!
13
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1: Illustrating examples of normal (A–G) and childhood BCP‑ALL (H–V) BM mature/maturing neutrophil phenotypes for CD10 (C, J and R), CD33 (D, L and S), CD13 (E, M and T), CD15 plus CD65 (F, N and U) and CD123 (G, O and V)
Figure 2: Frequency of BCP‑ALL cases showing altered patterns of expression for individual (A) or multiple (B) markers on maturing/mature neutrophils.
Table 1: Distribution of non‑blast cell subsets in the BM of children with BCP‑ALL at diagnosis according to the presence vs
Figure 3: Frequency of childhood BCP‑ALL cases with immunophenotypically altered maturing/mature neutrophils
+3

References

Related documents

He brought this damage action against the general contractor for breach of duty under the contract, the Montana Scaffolding Act's and Montana's Safe Place

(The correlation between EIU PPP rates and World Bank PPP rates is 0.99.) 5 The reason for using PPP rates is to “wash out” the extent of price divergence between countries

So, the first question, actually, what we had said was we would maintain within our cash flow at the price planning assumptions, so the guidance we’ve given today is consistent with

With $33.0 million higher investments in new equipment inventories to support customer demand, and about $47 million higher accounts receivable from strong customer activity at

Output: Net-centric Info Governance - Air and Space Component; Info Management Plan (IMP) - Air and Space Component; Net-Centric Information Management Strategy - Air and

Radiographic, clinical, and functional outcomes of treatment with adalimumab (a human anti-tumor necrosis factor monoclonal antibody) in patients with active rheumatoid

91 People rely on norms, strategies and heuristics that they have picked up elsewhere when confronted with unfamiliar circumstances, but given sufficient time and

The C2 security audit is the primary source of audit information for an overwhelming number of host-based intrusion-detection prototypes and tools because it is currently the