Results 81 to 90 of about 513,936 (276)

Evidence of Songbird Intoxication From Rozol Application at a Black-Tailed Prairie Dog Colony [PDF]

open access: yes, 2013
Concerns about avian poisonings from anticoagulant rodenticides have traditionally focused on secondary poisoning of raptors exposed by feeding on contaminated mammalian prey.
Hulse, Craig S.   +3 more
core   +1 more source

Data Poisoning Attacks in Contextual Bandits

open access: yes, 2018
We study offline data poisoning attacks in contextual bandits, a class of reinforcement learning problems with important applications in online recommendation and adaptive medical treatment, among others.
Jun, Kwang-Sung   +3 more
core   +1 more source

The Role of Ionic Liquids at the Biological Interfaces in Bioelectronics

open access: yesAdvanced Science, EarlyView.
Ionic liquids (ILs) are highlighted as key artificial ionic materials that bridge biological ion‐based signaling and electronic devices. By understanding their composition, structure, function relationships, and mechanisms, ILs can advance from high performance electrolyte to core materials enabling integrated, multifunctional bioelectronics for ...
Yeong‐sinn Ye   +5 more
wiley   +1 more source

A Proposal to Measure the Quasiparticle Poisoning Time of Majorana Bound States

open access: yes, 2013
We propose a method of measuring the fermion parity lifetime of Majorana fermion modes due to quasiparticle poisoning. We model quasiparticle poisoning by coupling the Majorana modes to electron reservoirs, explicitly breaking parity conservation in the ...
Colbert, Jacob R., Lee, Patrick A.
core   +1 more source

Evaluating the Utilities of Foundation Models in Single‐Cell Data Analysis

open access: yesAdvanced Science, EarlyView.
This study delivers the first systematic, task‐level evaluation of single‐cell foundation models across eight core analytical tasks. By benchmarking 10 leading models with the scEval framework, it reveals where foundation models truly add value, where task‐specific methods still dominate, and provides concrete, reproducible guidelines to steer the next
Tianyu Liu   +4 more
wiley   +1 more source

Targeted Thrombolysis via CCR2‐Engineered Macrophage‐Mimicking Microbubbles Safely Ablates Venous, Arterial, and Microvascular Thrombosis

open access: yesAdvanced Science
The clinical management of thrombosis, a primary cause of death worldwide, is hampered by the limitations of current thrombolytic agents, including short half‐life and high risk of off‐target bleeding.
Buying Li   +8 more
doaj   +1 more source

Association between hearing protection device use and noise-induced hearing loss among manufacturing workers in China: a cross-sectional study

open access: yesFrontiers in Public Health
ObjectiveNoise-induced hearing loss (NIHL) is a leading occupational illness globally. This study aimed to identify factors related to hearing protection device (HPD) use that were associated with NIHL and to quantify the relationship between the ...
Yuan Pan   +9 more
doaj   +1 more source

Accidental Potassium Bromate Poisoning Causing Acute Renal Failure [PDF]

open access: yes, 2009
Accidental poisoning is common in children. Potassium bromate is commonly used additive and raising agent in many edibles especially bread which is a staple food in Nigeria.
Adeleke, SI, Asani, MO
core  

Endogenous “Time Bomb” – Mislocalized Phospholipase A2 as a Critical Mediator of Ultra‐Rapid Mortality in Sepsis and Acute Lung Injury

open access: yesAdvanced Science, EarlyView.
Phospholipase A2 (PLA2), a dormant enzyme, becomes lethal when activated—collapsing lungs in minutes. Our dual therapy (DOPS + varespladib) boosts survival from 0% to >90% in sepsis/ALI. A breakthrough for acute lung injury treatment. ABSTRACT This study reveals that phospholipase A2 (PLA2), normally stable and nontoxic, can be activated specifically ...
Jianyu Wang   +7 more
wiley   +1 more source

TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents [PDF]

open access: yes, 2019
Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time.
Jha, Susmit   +3 more
core  

Home - About - Disclaimer - Privacy