Results 81 to 90 of about 2,945,640 (398)
User guide : Groundwater Vulnerability (Scotland) GIS dataset. Version 2 [PDF]
This report describes a revised version (Version 2) of the groundwater vulnerability (Scotland) digital dataset produced by the British Geological Survey (BGS).
Doce, D.D. +3 more
core
Efficient Computations of a Security Index for False Data Attacks in Power Networks [PDF]
The resilience of Supervisory Control and Data Acquisition (SCADA) systems for electric power networks for certain cyber-attacks is considered. We analyze the vulnerability of the measurement system to false data attack on communicated measurements.
Hendrickx, Julien M. +4 more
core +1 more source
Family violence and COVID‐19: Increased vulnerability and reduced options for support
Family violence refers to threatening or other violent behaviour within families that may be physical, sexual, psychological, or economic, and can include child abuse and intimate partner violence (Peterman et al. 2020, van Gelder et al. 2020).
K. Usher +4 more
semanticscholar +1 more source
With the continuous development of society, the contradiction between human and nature becomes increasingly prominent, and ecological vulnerability assessment is an effective tool to alleviate the contradiction. In this study, AHP-PSR (Analytic Hierarchy
Xiaojing Hu +3 more
semanticscholar +1 more source
Gut microbiome and aging—A dynamic interplay of microbes, metabolites, and the immune system
Age‐dependent shifts in microbial communities engender shifts in microbial metabolite profiles. These in turn drive shifts in barrier surface permeability of the gut and brain and induce immune activation. When paired with preexisting age‐related chronic inflammation this increases the risk of neuroinflammation and neurodegenerative diseases.
Aaron Mehl, Eran Blacher
wiley +1 more source
Justifying an Adequate Response to the Vulnerable Other [PDF]
Is it possible to justify requiring that I respond adequately to the other’s vulnerability? I contend that insofar as I value my own personal identity it is consistent to respond adequately to the vulnerability of the other.
Chandra, Kavanagh
core
Diversity and complexity in neural organoids
Neural organoid research aims to expand genetic diversity on one side and increase tissue complexity on the other. Chimeroids integrate multiple donor genomes within single organoids. Self‐organising multi‐identity organoids, exogenous cell seeding, or enforced assembly of region‐specific organoids contribute to tissue complexity.
Ilaria Chiaradia, Madeline A. Lancaster
wiley +1 more source
Temporal dimensions of vulnerability to crime in economic sectors [PDF]
This paper presents the results of research into vulnerability to crime in two economic sectors in Belgium. Vulnerability to crime is an integration of diverse temporal factors. We address pre-crime and post-crime aspects of vulnerability, arising before
Klima, Noel
core
Multidimensional perfectionism and narcissism: Grandiose or vulnerable? [PDF]
Multidimensional perfectionism is related to grandiose narcissism, with other-oriented perfectionism showing the strongest, most consistent relationships. The relationships with vulnerable narcissism, however, are unclear.
Nealis, Logan J. +2 more
core +1 more source
Mitochondrial remodeling shapes neural and glial lineage progression by matching metabolic supply with demand. Elevated OXPHOS supports differentiation and myelin formation, while myelin compaction lowers mitochondrial dependence, revealing mitochondria as key drivers of developmental energy adaptation.
Sahitya Ranjan Biswas +3 more
wiley +1 more source

