Results 51 to 60 of about 22,136 (208)
ABSTRACT Transforming global food systems is crucial for mitigating environmental degradation, reducing the global disease burden and protecting sentient individuals from harm. Despite overwhelming evidence linking animal‐sourced foods to ecological damage, resource depletion and public health challenges, gaps remain in promoting sustainable ...
Camila Augusto Perussello +2 more
wiley +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
The Superconducting Toroid for the New International AXion Observatory (IAXO)
IAXO, the new International AXion Observatory, will feature the most ambitious detector for solar axions to date. Axions are hypothetical particles which were postulated to solve one of the puzzles arising in the standard model of particle physics ...
Dudarev, A. +4 more
core +1 more source
In this article, I analyze my interviews with Mark (pseudonym), a social scientist who committed major academic fraud in over 50 top‐tier journal articles in the first decade of this century. I explain how stigma played a central role in how Mark and I shaped our interaction. I focus on how Mark, a former Professor and Dean with a distinguished career,
Thaddeus Müller
wiley +1 more source
How situations are defined is a social process. This paper examines how users on YouTube make sense of the alleged sexual assault perpetrated by shock rocker Marilyn Manson in the 2007 “Heart Shaped‐Glasses (When the Heart Guides the Hand)” music video.
Stacey Hannem, Christopher J. Schneider
wiley +1 more source
The Changes in Mitochondrial Morphology and Physiology Accompanying Apoptosis in Galleria mellonella (Lepidoptera) Immunocompetent Cells during Conidiobolus coronatus (Entomophthorales) Infection. [PDF]
Kaczmarek A, Wrońska AK, Boguś MI.
europepmc +1 more source
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta +73 more
core +1 more source
In the aftermath of the 2020 U.S. election, the boundary between activism and extremism blurred, with election officials reporting violent threats and false accusations of election fraud. From a symbolic interactionist perspective, these attacks provide a unique lens for examining the consequences of being falsely labeled a criminal.
Steven Windisch
wiley +1 more source
Intracellular cytokine detection based on flow cytometry in hemocytes from Galleria mellonella larvae: A new protocol. [PDF]
Wrońska AK +5 more
europepmc +1 more source
Accounting for Friendlessness: Stigma and the Quest for an Honorable Self
How do people who identify as friendless make sense of their condition in a moment when friendship is extolled for the support and satisfaction it offers? This article draws on interviews with 21 adults in an Atlantic Canadian city. We argue that our interviewees were rarely at ease with their friendlessness and were at pains to recover an honorable ...
Laura Eramian, Peter Mallory
wiley +1 more source

