Results 81 to 90 of about 1,730,729 (295)

Bioenergy Cropping Reduces the Spatiotemporal Scaling of Soil Bacterial Biodiversity

open access: yesAdvanced Science, EarlyView.
Consistent with patterns observed in plant and animal communities, soil bacterial communities exhibit significant species–time–area and phylogenetic–time–area relationships independent of nested structure. Bioenergy cropping significantly reduces the spatiotemporal scaling rates, particularly in sandy loam soils.
Zhencheng Ye   +19 more
wiley   +1 more source

Gender-based Violence and ‘Feminicide’ in Queer Italian Movements: Questioning Gender, Sexuality, and the (Hetero)normative Order

open access: yesOñati Socio-Legal Series, 2014
This article describes the development of the Italian feminist political lexicon on gender-based violence within the security frame in the last years. After the description of the historical main issues developed by feminism during the Seventies about ...
Caterina Peroni
doaj  

A NeuroD1 AAV‐Based Gene Therapy for Functional Brain Repair in Alzheimer's Disease‐Like Non‐Human Primate Model

open access: yesAdvanced Science, EarlyView.
This study tests NeuroD1 AAV‐based gene therapy in a non‐human primate Alzheimer's disease model. The therapy prevents neuronal damage, inhibits hippocampal atrophy, and reduces neuroinflammation. It also repairs vascular and blood‐brain barrier damage, restores cerebrospinal fluid biomarkers, enhances hippocampal glucose metabolism, and improves ...
Zhouquan Jiang   +21 more
wiley   +1 more source

Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu   +4 more
wiley   +1 more source

Cybersecurity in The Health Sector in The Reality of Artificial Intelligence, And Information Security Conceptually

open access: yesJournal of AI
Healthcare service delivery, especially in terms of safeguarding personal data, requires ensuring the confidentiality of information. In this regard, establishing cybersecurity systems that ensure information security is highly necessary.
Muhammet Damar   +2 more
doaj   +1 more source

A Game-Theoretical Approach to Multimedia Social Networks Security

open access: yesThe Scientific World Journal, 2014
The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship ...
Enqiang Liu   +3 more
doaj   +1 more source

A Verified Capability-Based Model for Information Flow Security With Dynamic Policies

open access: yesIEEE Access, 2018
Formal verification of information flow security with dynamic policies of security-critical systems is a grand challenge. This paper presents the first effort to formally specify and verify a capability-based system model with dynamic information flow ...
Jianwen Sun, Xiang Long, Yongwang Zhao
doaj   +1 more source

Optimal Grazing Exclusion Duration to Enhance Soil Carbon Sequestration in Degraded Grasslands

open access: yesAdvanced Science, EarlyView.
Across China, grazing exclusion reaches the national mean soil organic carbon recovery benchmark sooner in high‐MAP regions (> 500 mm), but recovery is much slower where MAP < 300 mm. Scaling this strategy to 70% of China's degraded grasslands would sequester about 1.52 Pg of soil carbon over 10 years—roughly 17% of annual global fossil‐fuel emissions.
Bin Zhang   +9 more
wiley   +1 more source

EUROPEAN UNION POLICIES ON CYBER SECURITY [PDF]

open access: yesAnnals: Series on Military Sciences, 2018
The benefits that the virtual environment and their adjacent technologies brought to mankind have been overshadowed by specific insecurity, manifested by new forms of threat – the cyber attacks.
Gheorghe BOARU
doaj  

Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems [PDF]

open access: yes, 2016
There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation ...
Johnson, Christopher W.
core  

Home - About - Disclaimer - Privacy