Results 151 to 160 of about 154,305 (279)
ABSTRACT Food waste reveals inefficiencies in resource use and contributes significantly to environmental pollution. In the United States, food waste accounts for the majority of total waste, with more than 50 million tons generated annually. In military units that operate large‐scale institutional food‐service facilities and generate significant food ...
YongSun Kim, Hyun Shik Yoon
wiley +1 more source
The study reveals that inadequate zinc intake disrupts gut microbiota's ability to degrade isoleucine, leading to the accumulation of metabolite KMV. KMV inhibits antibody class‐switching in mucosal B cells by suppressing the p‐ATM‐CTIP‐Hmces pathway, impairing IgA/IgG production.
Wenbo Jiang +8 more
wiley +1 more source
The study presents a large‐scale single‐cell transcriptomic atlas profiling over 612,010 peripheral immune cells from 97 individuals to decode the heterogeneity of influenza infection. These findings indicate a fundamental immune dichotomy determining clinical trajectories: a protective, monocyte‐centric antiviral state in mild disease versus a ...
Yi Wang +13 more
wiley +1 more source
Automated Point Cloud Registration Approach Optimized for a Stop-and-Go Scanning System. [PDF]
Park S, Ju S, Nguyen MH, Yoon S, Heo J.
europepmc +1 more source
Adolescent social isolation disrupts hippocampal function and exacerbates emotional symptoms, with sex‐specific patterns, as shown by human studies. In mice, social isolation decreased hippocampal synaptic density and calcium signaling, upregulated complement proteins, and activated complement‐mediated microglial synaptic phagocytosis.
Yuwan Qi +13 more
wiley +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
HTMC: hierarchical tolerance mask correspondence for human body point cloud registration. [PDF]
Yu F, Chen Z, Liu L, Ren L, Jiang M.
europepmc +1 more source
The situational Samaritan: How group reputation threat shapes reparatory behavior
Abstract Consumers often act to correct the wrongdoings of people close to them, such as family members or friends. The current research demonstrates that consumers may also engage in a variety of reparatory behaviors—from a simple apology to gift‐giving and tipping—to counter the misdeeds of in‐group strangers when their behavior threatens the ...
Julia Von Schuckmann +3 more
wiley +1 more source
Benchmarking complete-to-partial point cloud registration techniques for laparoscopic surgery. [PDF]
Neri A, Penza V, Haouchine N, Mattos LS.
europepmc +1 more source
RRGA-Net: Robust Point Cloud Registration Based on Graph Convolutional Attention. [PDF]
Qian J, Tang D.
europepmc +1 more source

