Results 81 to 90 of about 1,730,729 (295)
Bioenergy Cropping Reduces the Spatiotemporal Scaling of Soil Bacterial Biodiversity
Consistent with patterns observed in plant and animal communities, soil bacterial communities exhibit significant species–time–area and phylogenetic–time–area relationships independent of nested structure. Bioenergy cropping significantly reduces the spatiotemporal scaling rates, particularly in sandy loam soils.
Zhencheng Ye +19 more
wiley +1 more source
This article describes the development of the Italian feminist political lexicon on gender-based violence within the security frame in the last years. After the description of the historical main issues developed by feminism during the Seventies about ...
Caterina Peroni
doaj
This study tests NeuroD1 AAV‐based gene therapy in a non‐human primate Alzheimer's disease model. The therapy prevents neuronal damage, inhibits hippocampal atrophy, and reduces neuroinflammation. It also repairs vascular and blood‐brain barrier damage, restores cerebrospinal fluid biomarkers, enhances hippocampal glucose metabolism, and improves ...
Zhouquan Jiang +21 more
wiley +1 more source
Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu +4 more
wiley +1 more source
Healthcare service delivery, especially in terms of safeguarding personal data, requires ensuring the confidentiality of information. In this regard, establishing cybersecurity systems that ensure information security is highly necessary.
Muhammet Damar +2 more
doaj +1 more source
A Game-Theoretical Approach to Multimedia Social Networks Security
The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship ...
Enqiang Liu +3 more
doaj +1 more source
A Verified Capability-Based Model for Information Flow Security With Dynamic Policies
Formal verification of information flow security with dynamic policies of security-critical systems is a grand challenge. This paper presents the first effort to formally specify and verify a capability-based system model with dynamic information flow ...
Jianwen Sun, Xiang Long, Yongwang Zhao
doaj +1 more source
Optimal Grazing Exclusion Duration to Enhance Soil Carbon Sequestration in Degraded Grasslands
Across China, grazing exclusion reaches the national mean soil organic carbon recovery benchmark sooner in high‐MAP regions (> 500 mm), but recovery is much slower where MAP < 300 mm. Scaling this strategy to 70% of China's degraded grasslands would sequester about 1.52 Pg of soil carbon over 10 years—roughly 17% of annual global fossil‐fuel emissions.
Bin Zhang +9 more
wiley +1 more source
EUROPEAN UNION POLICIES ON CYBER SECURITY [PDF]
The benefits that the virtual environment and their adjacent technologies brought to mankind have been overshadowed by specific insecurity, manifested by new forms of threat – the cyber attacks.
Gheorghe BOARU
doaj
Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems [PDF]
There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation ...
Johnson, Christopher W.
core

