Results 81 to 90 of about 1,579,603 (252)

A Scalable Framework for Comprehensive Typing of Polymorphic Immune Genes from Long‐Read Data

open access: yesAdvanced Science, EarlyView.
SpecImmune introduces a unified computational framework optimized for long‐read sequencing to resolve over 400 highly polymorphic immune genes. This scalable approach achieves high‐resolution typing, enabling the discovery of cross‐family co‐evolutionary networks and population‐specific diversity.
Shuai Wang   +5 more
wiley   +1 more source

Rabbit and Wolf [PDF]

open access: yes, 2011
MP4 video‘Rabbit and Wolf’ was told by Rgyal mtshan in A mdo Tibetan. Rta rgyugs, a subdivision of Rka phug Administrative Village, is a farming village located in Khams ra Town, Gcan tsa County Town, Rma lho Tibetan Autonomous Prefecture, Qinghai ...
Rdo rje don 'grub
core  

Nuclear Mechanotransduction Across the Metastatic Cascade: Decoding Spatiotemporal Heterogeneity in Cancer Dissemination

open access: yesAdvanced Science, EarlyView.
Tumor metastasis results from complex interactions between cancer cells and mechanical microenvironments. We propose a “nucleus‐centered, cross‐stage mechanical signal decoding” model, highlighting how nuclear mechanosensors interpret forces at different stages.
Linqi Song   +4 more
wiley   +1 more source

How People Should Respond When Encountering a Large Carnivore: Opinions of Wildlife Professionals

open access: yesHuman-Wildlife Interactions, 2017
We conducted telephone surveys of wildlife professionals who work with large carnivores to ask their opinions about how people should respond to avoid being injured when confronted by a black bear (Ursus americana), grizzly bear (Ursus arctos), mountain ...
Dylan E. Brown, Michael R. Conover
doaj   +1 more source

Theoretical framework for constructing matching algorithms in biometric authentication systems

open access: yes, 2009
In this paper, we propose a theoretical framework to construct matching algorithms for any biometric authentication systems. Conventional matching algorithms are not necessarily secure against strong intentional impersonation attacks such as wolf attacks.
Imai, Hideki   +2 more
core   +2 more sources

Kenyan Farmers' Policy Priorities During Economic Crisis and Stability: Insights From a Best‐Worst Scaling Experiment

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT Amid rising food and fertilizer prices, understanding farmers' policy preferences is critical for effective crisis response. We use best‐worst scaling experiment to assess Kenyan mobile‐owning crop farmers' preferences for government support under high and normal price scenarios.
Mywish K. Maredia   +4 more
wiley   +1 more source

Wolf 1465: Not a Bright Dwarf Carbon Star

open access: yes, 2018
Wolf 1465 has been suggested as a candidate for a bright dwarf carbon star.
Dimitriadis, Georgios, Margon, Bruce
core   +1 more source

Farmers' Financial Literacy—Scale Development and Linkages to Accounting Practices and Financial Outcomes

open access: yesAgribusiness, EarlyView.
ABSTRACT This study investigates the financial literacy (FL) of Swedish farmers, its linkages to farmer characteristics, management accounting practices and farm outcomes by surveying Swedish Farm Accountancy Data Network farmers. Using item response theory, we expand the existing FL measurement specifically to the farming context, assess measurement ...
Uliana Gottlieb, Helena Hansson
wiley   +1 more source

Livestock and Domestic Dog Predations by Wolves in Michigan

open access: yesHuman-Wildlife Interactions, 2017
Wolves (Canis spp.) have recolonized the Great Lakes region and expanded into agricultural areas where there is increasing concern of conflict with livestock.
Justin L. Edge   +4 more
doaj   +1 more source

Interference Channels With Arbitrarily Correlated Sources

open access: yes, 2009
Communicating arbitrarily correlated sources over interference channels is considered in this paper. A sufficient condition is found for the lossless transmission of a pair of correlated sources over a discrete memoryless interference channel.
Chen, Biao, Liu, Wei
core   +1 more source

Home - About - Disclaimer - Privacy