Results 71 to 80 of about 1,730,729 (295)

Astrocyte Enrichment of 3D Cortical Constructs Enhances Brain Repair

open access: yesAdvanced Science, EarlyView.
This study highlights the role of astrocytes in supporting neural progenitor cell survival and differentiation after traumatic brain injury. Astrocytes enhanced neuronal differentiation, improved cell survival in co‐cultures, and promoted integration of microfluidics‐based implants with host tissue following implantation. Additionally, increased axonal
Elisa M. Cruz   +20 more
wiley   +1 more source

Piecing together the Labrador Inuit food security policy puzzle in Nunatsiavut, Labrador (Canada): a scoping review

open access: yesInternational Journal of Circumpolar Health, 2020
Inuit in Canada experience greater social and economic inequities than the general Canadian population. Food security exemplifies this inequity and is a distinct determinant of Inuit health.
Renee Bowers   +4 more
doaj   +1 more source

SPAN security policies and guidelines [PDF]

open access: yes
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure.
Green, James L., Sisson, Patricia L.
core   +1 more source

Hierarchical Summary Statistics Encoding Across Primary Visual and Posterior Parietal Cortices

open access: yesAdvanced Science, EarlyView.
This study shows that mouse V1 simultaneously encodes the ensemble mean and variance of motion, providing a robust summary‐statistic representation that persists despite single‐neuron variability. These signals propagate to PPC, where they are transformed into abstract category representations during decision making.
Young‐Beom Lee   +4 more
wiley   +1 more source

Complexity and Unwinding for Intransitive Noninterference [PDF]

open access: yes, 2013
The paper considers several definitions of information flow security for intransitive policies from the point of view of the complexity of verifying whether a finite-state system is secure. The results are as follows.
Eggert, Sebastian   +3 more
core  

Deciphering and Targeting the Schwannoma‐Neuron‐Macrophage Crosstalk for the Treatment of Schwannomatosis and Associated Pain

open access: yesAdvanced Science, EarlyView.
We established patient‐derived SWN cell lines and orthotopic PDX models that recapitulate patient pain phenotypes, alongside a novel intravital DRG imaging platform to track macrophage infiltration and neuronal pain responses. Using these models, we define HMGB1–CCL2–IL‐6 signaling crosstalk driving pain and identify EGF signaling as a key regulator of
Zhenzhen Yin   +17 more
wiley   +1 more source

What Factors Account for State-to-State Differences in Food Security? [PDF]

open access: yes
States differ in the extent to which their residents are food secure—meaning that they have consistent access to enough food for active, healthy living.
Bartfeld, Judi   +3 more
core   +1 more source

EU Policies in the Democratic Republic of Congo: Try and Fail? [PDF]

open access: yes, 2016
This paper argues that even though EU policies in the DRC integrated different components of human security – namely human rights protection, the restoration of law and order, and effective multilateralism – in practice these policies have
Arnould, Valerie, Vlassenroot, Koen
core  

An Increasing Misalignment Between Crop Distribution and Environmental Resources Under Climate Change in China

open access: yesAdvanced Science, EarlyView.
Climate change reshapes the spatial alignment between crop production and environmental resources. Using multi‐source data and a crop model, integrated climatic, water, and soil endowments for maize and wheat are quantified and compared with harvest distributions.
Zheng'e Su   +13 more
wiley   +1 more source

A Knowledge Graph-Based Consistency Detection Method for Network Security Policies

open access: yesApplied Sciences
Network security policy is regarded as a guideline for the use and management of the network environment, which usually formulates various requirements in the form of natural language.
Yaang Chen   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy