Results 51 to 60 of about 1,036,478 (306)
Time after time – circadian clocks through the lens of oscillator theory
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo +2 more
wiley +1 more source
Social vulnerability assessment in the health and disease context: Review
Background Social vulnerability is a multidimensional concept based on multivariate factors in domains of physical, social, economic, environmental, etc., and the subsets that constitute it.
Arya Mukkil Ashokan +5 more
doaj +1 more source
The notion of vulnerability has been used in various fields of knowledge. One of its uses is in interdisciplinary research on environmental vulnerability, in which is understood in a simplified way as the overlap of social vulnerability and environmental
Natália Tavares Azevedo
doaj +1 more source
Study of Integrated Social Vulnerability Index SoVIint of Hilly Region of Uttarakhand, India
The hilly regions of India have suffered many disasters, both natural and anthropogenic. In the hilly state like Uttarakhand, the hazards like flash flood, forest fires, and landslide affect the community at the large scale.
Kumar Dilip, Kumar Bhattacharjya Rajib
doaj +1 more source
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman +2 more
wiley +1 more source
Social vulnerability to flood disasters in the nine provinces of the Yellow River Basin
【Objective】The Yellow River Basin is prone to urban flood disasters. Social vulnerability assessment is thus crucial for optimizing disaster prevention and mitigation strategies and promoting harmonious coexistence of ‘people, city, and water’.
NIU Wenxuan, DONG Jiayi, XU Panpan
doaj +1 more source
Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data
Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and
Edkrantz M. +4 more
core +1 more source
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley +1 more source
Mechanisms of IgE‐mediated food allergy and the role of allergen‐specific B cells
Food allergy arises when allergen‐specific B cells preferentially produce immunoglobulin E (IgE) antibodies against harmless foods. This article explains the mechanisms driving IgE‐mediated reactions, highlights the central role of these B cells, and discusses how natural tolerance (NT) and oral immunotherapy (OIT) can reshape allergic immune responses.
Juan‐Felipe López +2 more
wiley +1 more source
Vulnerability Assessment: The Role of Coastal Informal Settlement Growth to Social Vulnerability in Genuk Sub-District, Semarang City [PDF]
Tidal, land subsidence and flooding in Semarang City brought many consequences to the city's economic and social conditions. In the economic sector, the largest contributor to GDP derives from industries that are located in the coastal area.
Astuti, Khristiana Dwi +3 more
core +1 more source

