Results 31 to 40 of about 90 (86)
Systematic conservation prioritization with the prioritizr R package
Abstract Plans for expanding protected area systems (prioritizations) need to fulfill conservation objectives. They also need to account for other factors, such as economic feasibility and anthropogenic land‐use requirements. Although prioritizations are often generated with decision support tools, most tools have limitations that hinder their use for ...
Jeffrey O. Hanson +7 more
wiley +1 more source
Expression‐based machine learning models for predicting plant tissue identity
Abstract Premise The selection of Arabidopsis as a model organism played a pivotal role in advancing genomic science. The competing frameworks to select an agricultural‐ or ecological‐based model species were rejected, in favor of building knowledge in a species that would facilitate genome‐enabled research.
Sourabh Palande +40 more
wiley +1 more source
Preventing extinction in an age of species migration and planetary change
Abstract International and national conservation policies almost exclusively focus on conserving species in their historic native ranges, thus excluding species that have been introduced by people and some of those that have extended their ranges on their own accord.
Erick J. Lundgren +5 more
wiley +1 more source
Abstract Assessing the extinction risk of species based on the International Union for Conservation of Nature (IUCN) Red List (RL) is key to guiding conservation policies and reducing biodiversity loss. This process is resource demanding, however, and requires continuous updating, which becomes increasingly difficult as new species are added to the RL.
Pablo Miguel Lucas +8 more
wiley +1 more source
<p>ENGLISH ABSTRACT: The bacteria foraging algorithm (BFA) is a new computation technique inspired by the social foraging behaviour of Escherichia coli (E. coli) bacteria. Since the introduction of the BFA by Kevin M.
S.H. Tang, H. Nouri, O. Motlagh
doaj
Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer +5 more
wiley +1 more source
Samen sterk door persoonsgerichte en digitale zorg. [PDF]
Boudewijns E, Gidding-Slok A, Burgers J.
europepmc +1 more source
Vraag het aan Google: Is de bedrijfsgeneeskunde ook klaar voor de verschuiving? [PDF]
Niekoop V.
europepmc +1 more source
Från titeln att bedöma -Livets Algoritm - kan man tänka sig att Fernando Flores' bok är en strikt vetenskaplig sådan. Detta första intryck förstärkes ytterligare när man läser underrubriken: "Moderna teorier om biologins metod och väsen." Men trots att boken faktiskt bygger på vetenskapliga grunder, är det huvudsakligen fråga om ett filo-sofiskt verk ...
openaire +1 more source
NDD2020 gaat door: een veelbelovende vooruitblik. [PDF]
Serné E.
europepmc +1 more source

