Results 61 to 70 of about 5,288,295 (302)

Facilitators and barriers to implementing successful exclusion among children with shiga toxin-producing Escherichia coli: a qualitative analysis of public health case management records

open access: yesBMC Public Health
Background Shiga toxin-producing Escherichia coli (STEC) infections are a significant public health concern as they can cause serious illness and outbreaks.
Amoolya Vusirikala   +12 more
doaj   +1 more source

Pharmacological inhibition of the PERK pathway modulates hepatocellular carcinoma growth and immune signaling

open access: yesFEBS Open Bio, EarlyView.
Pharmacological inhibition of PERK in a DEN‐induced mouse model of liver cancer does not reduce tumor burden but alters cellular stress signaling. Despite blocking PERK activity, downstream stress responses, including CHOP expression, remain active, suggesting compensatory mechanisms within the unfolded protein response that may influence tumor ...
Ada Lerma‐Clavero   +5 more
wiley   +1 more source

Lightweight deep learning model for crime pattern recognition based on transformer with simulated annealing sparsity and CNN

open access: yesScientific Reports
This study addresses the pressing need for high efficiency and low resource consumption in crime pattern recognition within public safety governance by proposing a lightweight deep learning model known as the lightweight crime recognition network (LCRNet)
HongYuan Lu   +3 more
doaj   +1 more source

Arctic security in international security

open access: yes, 2020
Peace and war in the Arctic security is driven by international systemic forces of great power conflict. Since the Seven Years’ War (1756-1763) the geostrategic role of and thinking about the North Atlantic Arctic has been stable. The Napoleonic Wars, Crimean War, World War I and II and the Cold War affected the Arctic for geostrategic reasons. Current
openaire   +2 more sources

Security and computer forensics in web engineering education [PDF]

open access: yes, 2010
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually.
Glisson, L.M., Glisson, W., Welland, R.
core  

One size does not fit all: An in vitro evaluation of the effects of bezafibrate and medroxyprogesterone acetate on human SH‐SY5Y and U‐87 MG cancer cells

open access: yesFEBS Open Bio, EarlyView.
Drugs previously repurposed to target blood cancers reduced neuroblastoma and glioblastoma cell growth and viability. However, their levels of anticancer activity were different and their clinical application may be problematic due to side effects at effective doses.
Abhishek Kharawatkar   +4 more
wiley   +1 more source

Criminal Trajectory Reconstruction Method Based on a Mobile Reference System

open access: yesComputational Urban Science
Criminal trajectory reconstruction is a crucial area of study in the investigative and evidentiary processes of public security departments. This paper proposes a method for reconstructing criminal trajectories based on a mobile reference system ...
Zhengyan Ding   +4 more
doaj   +1 more source

Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham   +7 more
wiley   +1 more source

Blood culture positive sepsis in England, 2017–2018: epidemiological assessment of the commissioning for quality and innovation (CQUIN) sepsis indicator

open access: yesBMC Infectious Diseases
Background Sepsis remains a significant clinical and public health concern, necessitating timely identification and targeted management for improved patient outcomes.
Ranya Mulchandani   +11 more
doaj   +1 more source

Airports at Risk: The Impact of Information Sources on Security Decisions [PDF]

open access: yes, 2012
Security decisions in high risk organizations such as airports involve obtaining ongoing and frequent information about potential threats. Utilizing questionnaire survey data from a sample of airport employees in European Airports across the continent ...
A Angenendt   +22 more
core   +1 more source

Home - About - Disclaimer - Privacy