Results 121 to 130 of about 8,666 (240)

Quantifying the relative contribution of free virus and cell-to-cell transmission routes to the propagation of hepatitis C virus infections in vitro using an agent-based model [PDF]

open access: yesarXiv, 2021
Experiments have shown that hepatitis C virus (HCV) infections in vitro disseminate both distally via the release and diffusion of cell-free virus through the medium, and locally via direct, cell-to-cell transmission. To determine the relative contribution of each mode of infection to HCV dissemination, we developed an agent-based model (ABM) that ...
arxiv  

Protecting Anti-virus Programs From Viral Attacks [PDF]

open access: yesarXiv, 2013
During a fight between viruses and anti-viruses it is not always predictable that the anti-virus is going to win. There are many malicious viruses which target to attack and paralyze the anti-viruses. It is necessary for an anti-virus to detect and destroy the malware before its own files are detected and destroyed by the malware.
arxiv  

Planning for the unexpected: Ebola virus, Zika virus, what's next? [PDF]

open access: yes, 2016
Since 2000 we have witnessed global pandemics and public health emergencies of international concern. This review details which viruses are likely to caused further outbreaks and looks at the strategies and tools available to UK medical professionals to ...
Welfare, W.   +3 more
core   +2 more sources

neutrophils are on the payroll [PDF]

open access: yes, 2015
Viral hemorrhagic fever caused by hantaviruses is an emerging infectious disease for which suitable treatments are not available. In order to improve this situation a better understanding of hantaviral pathogenesis is urgently required.
Krüger, Detlev H.   +2 more
core   +1 more source

How do Viruses Attack Anti-Virus Programs [PDF]

open access: yesUmakant Mishra, "How do Viruses Attack Anti-virus Programs", TRIZsite Journal, June 2012, http://trizsite.tk/trizsite/articles/default.asp?month=Jun&year=2012, 2013
As the anti-viruses run in a trusted kernel level any loophole in the anti-virus program can enable attackers to take full control over the computer system and steal data or do serious damages. Hence the anti-virus engines must be developed with proper security in mind.
arxiv  

DNA Confinement drives uncoating of the HIV Virus [PDF]

open access: yes, 2014
We present a model for the uncoating of the HIV virus driven by forces exerted on the protein shell of HIV generated by DNA confinement.
arxiv   +1 more source

Exploring the Genetic Diversity and Molecular Evolution of Seoul and Hantaan Orthohantaviruses

open access: yesViruses
Seoul (SEOV) and Hantaan (HTNV) orthohantaviruses are significant zoonotic pathogens responsible for hemorrhagic fever with renal syndrome. Here, we investigated the molecular evolution of SEOV and HTNV through phylogenetic and bioinformatic analyses ...
Atanas V. Demirev   +9 more
doaj   +1 more source

Epidemics in Multipartite Networks: Emergent Dynamics [PDF]

open access: yesarXiv, 2013
Single virus epidemics over complete networks are widely explored in the literature as the fraction of infected nodes is, under appropriate microscopic modeling of the virus infection, a Markov process. With non-complete networks, this macroscopic variable is no longer Markov.
arxiv  

Characterisation of New Rat Cytomegalovirus Isolates from Rice-Field Rats (Rattus Argentiventer) [PDF]

open access: yes, 1999
A serological survey for virus infections in rice field rats, Rattus argeniventer was conducted in five different geographic locations of Malaysia to identify viruses that have potential use in biological control of rat populations. The results indicated
Lai , Kit Yee
core  

Home - About - Disclaimer - Privacy