Results 51 to 60 of about 372,499 (281)

Combining resilience and resistance with threat‐based approaches for prioritizing management actions in sagebrush ecosystems

open access: yesConservation Science and Practice, 2023
The sagebrush biome is a dryland region in the western United States experiencing rapid transformations to novel ecological states. Threat‐based approaches for managing anthropogenic and ecosystem threats have recently become prominent, but successfully ...
Jeanne C. Chambers   +7 more
doaj   +1 more source

Methods for prioritization: Toward quantitative approach to prioritize zoonoses in South East Asia [PDF]

open access: yes, 2011
Resources for research, surveillance, control and others public health activities are limited and it is difficult to compare the importance of diseases, which vary in terms of occurrence, impacts, etc. So, in this context of scarce resources and multiple
Bordier, Marion   +3 more
core  

Cis‐regulatory and long noncoding RNA alterations in breast cancer – current insights, biomarker utility, and the critical need for functional validation

open access: yesMolecular Oncology, EarlyView.
The noncoding region of the genome plays a key role in regulating gene expression, and mutations within these regions are capable of altering it. Researchers have identified multiple functional noncoding mutations associated with increased cancer risk in the genome of breast cancer patients.
Arnau Cuy Saqués   +3 more
wiley   +1 more source

Automated Global Feature Analyzer - A Driver for Tier-Scalable Reconnaissance [PDF]

open access: yes, 2008
For the purposes of space flight, reconnaissance field geologists have trained to become astronauts. However, the initial forays to Mars and other planetary bodies have been done by purely robotic craft.
Baker, Victor R.   +8 more
core   +1 more source

Prioritizing Science Education [PDF]

open access: yesScience, 2010
This special issue of Science explores “Grand Challenges in Science Education,” a critical set of the problems and exciting opportunities now facing science education on a global level. The 20 Challenges, addressed by a team of education experts, range from “Enable students to build on their own enduring, science ...
openaire   +4 more sources

Perspectives in educating molecular pathologists on liquid biopsy: Toward integrative, equitable, and decentralized precision oncology

open access: yesMolecular Oncology, EarlyView.
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié   +13 more
wiley   +1 more source

Evaluation and Prioritization of Tourism Villages Using Multi Criteria Decision-Making Techniques (Case Study: Karaj) [PDF]

open access: yesMuṭāli̒āt-i Mudīriyyat-i Gardishgarī, 2018
Determining the tourist destination villages and paying special attention to these villages is one of the policies of the country's tourism authorities. The purpose of this research is to evaluate and prioritize the tourist destination villages of Karaj ...
Rasol Heidari Soreshjani   +2 more
doaj   +1 more source

Prioritization of Road Network Construction in Bacan Island of North Maluku Province [PDF]

open access: yes, 2013
Bacan Island, located in South Halmahera, North Maluku Province, is a potential region with a variety of important sectors, such as plantations, fisheries, mining, tourism, industry and trade.
Bowoputro, H. (Hendi)   +2 more
core  

Learning Task Priorities from Demonstrations

open access: yes, 2018
Bimanual operations in humanoids offer the possibility to carry out more than one manipulation task at the same time, which in turn introduces the problem of task prioritization.
Caldwell, Darwin G.   +3 more
core   +1 more source

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Home - About - Disclaimer - Privacy