Results 141 to 150 of about 319,858 (317)

Genetic population structure of the critically endangered stellate sturgeon (Acipenser stellatus) in the Black Sea basin: Implications for conservation

open access: yesAquatic Conservation: Marine and Freshwater Ecosystems, Volume 32, Issue 12, Page 1926-1939, December 2022., 2022
Abstract Stellate sturgeon (Acipenser stellatus) is a species of great conservation concern throughout its range. Over the past century, it has experienced a dramatic decline in abundance and distribution in the Black Sea basin. Information regarding the genetic structure of the species is very limited in the region, despite its crucial importance for ...
Daniela Nicoleta Holostenco   +16 more
wiley   +1 more source

Identification of Transdiagnostic Childhood Externalizing Pathology Within an Electronic Medical Records Database and Application to the Analysis of Rare Copy Number Variation

open access: yesAmerican Journal of Medical Genetics Part B: Neuropsychiatric Genetics, EarlyView.
ABSTRACT Externalizing traits and behaviors are broadly defined by impairments in self‐regulation and impulse control that typically begin in childhood and adolescence. Externalizing behaviors, traits, and symptoms span a range of traditional psychiatric diagnostic categories.
India A. Reddy   +5 more
wiley   +1 more source

Dyad pedagogy in practical anatomy: A description of the implementation and student perceptions of an adaptive approach to cadaveric teaching

open access: yesAnatomical Sciences Education, Volume 16, Issue 1, Page 99-115, January/February 2023., 2023
Abstract Prior to the challenges imposed by the Covid‐19 pandemic, anatomy practical sessions at Trinity College Dublin involved eight to 10 students per donor station, rotating between digital learning, anatomical models/osteology, and dissection activities for three hours weekly.
Dearbhla P. Cullinane, Denis S. Barry
wiley   +1 more source

DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment [PDF]

open access: yesBig Data Analytics for Internet of Things, 2020, 2017
The future of the Internet is predicted to be on the cloud, resulting in more complex and more intensive computing, but possibly also a more insecure digital world. The presence of a large amount of resources organized densely is a key factor in attracting DDoS attacks.
arxiv  

Public Key Cryptography for 5G Private Identification

open access: yes, 2020
The next generation of mobile networks is called 5G. 5G introduces several improvements from the previous generation known as Long Term Evolution (LTE). Some of these improvements are related to subscriber privacy. A new protection scheme for the permanent subscriber identifier has been included.
openaire   +1 more source

Decoding the algorithmic operations of Australia's National Disability Insurance Scheme

open access: yesAustralian Journal of Social Issues, EarlyView.
Abstract In recent years, Australia has embarked on a digital transformation of its social services, with the primary goal of creating user‐centric services that are more attentive to the needs of citizens. This article examines operational and technological changes within Australia's National Disability Insurance Scheme (NDIS) as a result of this ...
Georgia van Toorn, Terry Carney
wiley   +1 more source

On the lithium abundance of the visual binary components ξ Boo A (G8V) and ξ Boo B (K5V)

open access: yesAstronomische Nachrichten, Volume 343, Issue 9-10, November-December 2022., 2022
Abstract A spectroscopic investigation of the lithium resonance doublet in ξ Boo A and ξ Boo B in terms of both abundance and isotopic ratio is presented. We obtained new R = 130,000 spectra with a signal‐to‐noise ratio (S/N) per pixel of up to 3200 using the 11.8 m LBT and PEPSI.
Klaus G. Strassmeier, Matthias Steffen
wiley   +1 more source

“You're on your own, kid”: A critical analysis of Australian universities' international student mental health strategies

open access: yesAustralian Journal of Social Issues, EarlyView.
Abstract Mental ill‐health is a serious and growing problem among university students in Australia. Within this cohort, international students are particularly vulnerable. International students in Australia have fewer social rights than domestic students and are at elevated risk of social isolation, exploitation in employment, precarious housing ...
Michelle Peterie   +5 more
wiley   +1 more source

Association of maternal autoimmune disease and early childhood infections with offspring autism spectrum disorder: A population‐based cohort study

open access: yesAutism Research, Volume 15, Issue 12, Page 2371-2380, December 2022., 2022
Abstract The aim of this study was to examine potential synergistic effects between maternal autoimmune disease and early childhood infections and their association with autism spectrum disorder (ASD) in offspring. Both exposures have been associated with increased risk of ASD in previous studies, but potential synergistic effects remain underexplored.
Timothy C. Nielsen   +8 more
wiley   +1 more source

Cryptocurrencies: Who is vulnerable and what are the vulnerabilities?

open access: yesAustralian Journal of Social Issues, EarlyView.
Abstract Australians are embracing new forms of digital finance products and services, which includes purchasing cryptocurrencies and non‐fungible tokens (NFTs). There has been an increase in investment scams associated with cryptocurrencies. In this article, we sought to understand from cryptocurrency and NFT investors, who is vulnerable and what ...
Levon Blue, Congcong Xing, Thu Pham
wiley   +1 more source

Home - About - Disclaimer - Privacy