Results 111 to 120 of about 30,335 (280)

Genetic analysis of primary lung interdigitating dendritic cell sarcomas

open access: yesThe Journal of Pathology, EarlyView.
Abstract Interdigitating dendritic cell sarcomas (IDCSs) are rare tumors that commonly arise in the hematopoietic system and rarely outside. The genetic drivers of IDCS carcinogenesis are unknown; therefore, therapeutic options are limited. We investigated somatic gene mutations and copy‐number alterations (CNAs) in nine IDCSs arising in the lung by ...
Mikhail S Ermakov   +6 more
wiley   +1 more source

Capacity building needed to reap the benefits of access to biodiversity collections

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Global conservation efforts increasingly depend on digitised natural history collections, yet the benefits of this digital data are not equally shared. We analysed biodiversity specimens and citation data from Montserrat and the Cayman Islands to assess who collected these specimens, how they are used, and by whom.
Quentin Groom   +16 more
wiley   +1 more source

Education in a Changing Climate: A Systematic Review for Low and Middle‐Income Countries (LMICs)

open access: yesSustainable Development, EarlyView.
ABSTRACT Climate change is a major global challenge that affects many aspects of human life and hinders progress on the United Nations (UN) Sustainable Development Goals (SDGs). One area that has not received enough attention is its impact on children's education in low‐ and middle‐income countries (LMICs), which are especially vulnerable to ...
Afshan Ameer, Rami Ghannam
wiley   +1 more source

The Nexus Between Circular Economy and Sustainable Supply Chain Management: PRISMA Methodology

open access: yesSustainable Development, EarlyView.
ABSTRACT The intersection of sustainable supply chain management (SSCM) and circular economy (CE) has attracted increasing academic and practical attention, emphasizing the need for integrated sustainability approaches. This study employs the PRISMA protocol and conceptualizes the CE–SSCM relationship as a dynamic system in which internal capabilities,
Feriel Barkaoui, Khaled Ben abdallah
wiley   +1 more source

Comprehensive Review of Storage Optimization Techniques in Blockchain Systems

open access: yesApplied Sciences
Blockchain technology, known for its decentralization, traceability, immutability, and security, has attracted widespread attention in academia and has been extensively applied in numerous fields.
Yan Wang, Hao Wang, Yanghuang Cao
doaj   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Preserving evidence integrity in full file system extractions: Assessing hash inconsistencies and potential solutions

open access: yesJournal of Forensic Sciences, EarlyView.
Abstract Smartphone manufacturers' enhanced privacy and security measures, such as File‐Based Encryption (FBE), have disrupted traditional data extraction techniques, necessitating the adoption of Full File System Extraction (FFS). FFS requires booting a smartphone, decrypting its UserData partition, and accessing files individually, a process that ...
Sanghyun Yoo, Yunji Park, Doowon Jeong
wiley   +1 more source

Refining the Vertebrate Mitochondrial 12S rRNA Secondary Structure by Comparative Analysis

open access: yesIntegrative Zoology, EarlyView.
This flowchart outlines the comprehensive workflow of the study, integrating diverse bioinformatics tools (e.g., NCBI2GO, SSU‐align, bpRNA) and their sequential interactions. Key steps, such as data preprocessing, structural prediction, and evolutionary analysis, are depicted with their respective outputs (e.g., standardized records, consensus ...
Fengxia Li   +6 more
wiley   +1 more source

Cannabis dispensary exposure and smoked, vaped and edible cannabis use among young adults: Comparison of web‐scraped and government‐maintained registries

open access: yesAddiction, EarlyView.
Abstract Background and aims The impact of exposure to cannabis dispensaries on young adult cannabis use may depend on how exposures and outcomes are defined. We estimated associations of dispensary exposure with young adult cannabis use across: (a) a government‐maintained licensed dispensaries registry versus a web‐scraped list of licensed and ...
Alyssa F. Harlow   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy