Results 31 to 40 of about 1,154,898 (248)

Psychological defense mechanisms in patients with syphilis at different stages of the disease [PDF]

open access: yesСаратовский научно-медицинский журнал, 2015
Purpose: the study of psychological defense mechanisms in patients with syphilis at different stages of the disease. Material and methods. We used questionnaire Plutchik-Kellerman-Comte "life style Index".
Filonova A.V., Schneider D.A., Utz S.R.
doaj  

Defense mechanisms of empathetic players in the spatial ultimatum game

open access: yes, 2012
Experiments on the ultimatum game have revealed that humans are remarkably fond of fair play. When asked to share an amount of money, unfair offers are rare and their acceptance rate small.
Attila Szolnoki   +4 more
core   +1 more source

Caenorhabditis elegans and probiotics interactions from a prolongevity perspective [PDF]

open access: yes, 2019
Probiotics exert beneficial effects on host health through different mechanisms of action, such as production of antimicrobial substances, competition with pathogens, enhancement of host mucosal barrier integrity and immunomodulation.
Barbara Guantario   +5 more
core   +1 more source

It's Not That Great Anymore: The Central Role of Defense Mechanisms in Grandiose and Vulnerable Narcissism

open access: yesFrontiers in Psychiatry, 2021
Objectives: The concept of narcissism contains a yet unresolved paradox: Its grandiose facet depicts the psychopathological core but is often associated with life-satisfaction and overall functioning, whereas its vulnerable facet is associated with ...
Leonie Kampe   +4 more
doaj   +1 more source

Worldwide Research on Plant Defense against Biotic Stresses as Improvement for Sustainable Agriculture [PDF]

open access: yes, 2018
Agriculture is the basis for food production on a global scale. Sustainable agriculture tries to improve or maintain the quality of food without compromising the environment.
Giménez Caminero, Estela   +2 more
core   +3 more sources

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

Defense Mechanisms in E. a. Poe's Selected Short Stories the Black Cat & the Tell-Tale Heart [PDF]

open access: yes, 2018
Defense mechanism is strategies the ego uses to defend itself against the anxiety provoked by conflicts. The aim of the research is to describe the types of defense mechanism in two of Poe's selected short stories, The Black Cat & The Tell-Tale Heart ...
Tenrisanna, R. (Rasynal)
core  

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

AUDREY TURNER’S CONFLICTS AND DEFENSE MECHANISMS IN KINSELLA’S 'FINDING AUDREY'

open access: yesLeksema: Jurnal Bahasa dan Sastra, 2018
A story becomes interesting because of the existence of the characters’ conflicts. This research objectives were to investigate the conflicts and defense mechanisms in Audrey Turner, the main character of Finding Audrey novel written by Sophie Kinsella ...
M. Aprianto Budie Nugroho   +1 more
doaj   +1 more source

Pricing and Investments in Internet Security: A Cyber-Insurance Perspective [PDF]

open access: yes, 2011
Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms ...
Golubchik, Leana, Pal, Ranjan
core  

Home - About - Disclaimer - Privacy