Results 71 to 80 of about 5,759,507 (353)
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
This study addresses the pressing need for high efficiency and low resource consumption in crime pattern recognition within public safety governance by proposing a lightweight deep learning model known as the lightweight crime recognition network (LCRNet)
HongYuan Lu +3 more
doaj +1 more source
Arctic security in international security
Peace and war in the Arctic security is driven by international systemic forces of great power conflict. Since the Seven Years’ War (1756-1763) the geostrategic role of and thinking about the North Atlantic Arctic has been stable. The Napoleonic Wars, Crimean War, World War I and II and the Cold War affected the Arctic for geostrategic reasons. Current
openaire +2 more sources
Complexity and Unwinding for Intransitive Noninterference [PDF]
The paper considers several definitions of information flow security for intransitive policies from the point of view of the complexity of verifying whether a finite-state system is secure. The results are as follows.
Eggert, Sebastian +3 more
core
Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham +7 more
wiley +1 more source
Criminal Trajectory Reconstruction Method Based on a Mobile Reference System
Criminal trajectory reconstruction is a crucial area of study in the investigative and evidentiary processes of public security departments. This paper proposes a method for reconstructing criminal trajectories based on a mobile reference system ...
Zhengyan Ding +4 more
doaj +1 more source
Validation of a multiplex amplification system of 19 autosomal STRs and 27 Y-STRs
This article describes a newly devised autosomal short tandem repeat (STR) multiplex polymerase chain reaction (PCR) system for 19 autosomal loci (D12S391, D13S317, D16S539, D18S51, D19S433, D2S1338, D21S11, D3S1358, D5S818, D6S1043, D7S820, D8S1179 ...
Feng Liu +4 more
doaj +1 more source
A proposed case for the cloud software engineering in security [PDF]
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core
The Fascist Moment: Security, Exclusion, Extermination [PDF]
Security is cultivated and mobilized by enacting exclusionary practices, and exclusion is cultivated and realized on security grounds. This article explores the political dangers that lie in this connection, dangers which open the door to a fascist ...
Neocleous, M
core +3 more sources
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen +6 more
wiley +1 more source

