Results 31 to 40 of about 1,804,817 (300)

Efficacy and Safety Analysis of Roxarestat in Regulating Renal Anemia in Patients on Maintenance Hemodialysis

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Objective To compare the efficacy and safety of roxarestat versus recombinant human erythropoietin (rhEPO) in the management of renal anemia in patients undergoing maintenance hemodialysis. Methods This was a prospective, open‐label, randomized controlled trial.
Lingling Chen, Junjie Zhu, Qiaonan Ge
wiley   +1 more source

Sucrose addition directionally enhances bacterial community convergence and network stability of the shrimp culture system

open access: yesnpj Biofilms and Microbiomes, 2022
Sucrose is an effective carbon source for creating more reliable and environmentally friendly conditions for shrimp growth by regulating bacteria in biofloc-based culture systems.
Haipeng Guo   +7 more
doaj   +1 more source

Securing library information system: Vulnerabilities and threats [PDF]

open access: yes, 2010
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Husin, Mohd Zabidin   +3 more
core  

Reciprocal control of viral infection and phosphoinositide dynamics

open access: yesFEBS Letters, EarlyView.
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley   +1 more source

Selective replication and vertical transmission of Ebola virus in experimentally infected Angolan free-tailed bats

open access: yesNature Communications
The natural reservoir of Ebola virus (EBOV), agent of a zoonosis burdening several African countries, remains unidentified, albeit evidence points towards bats.
S. A. Riesle-Sbarbaro   +17 more
doaj   +1 more source

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Myocarditis associated with COVID-19 vaccination

open access: yesnpj Vaccines
Following the start of the COVID-19 vaccination campaign, the adverse events of myocarditis and pericarditis were linked mainly to mRNA COVID-19 vaccines by the regulatory authorities worldwide. COVID-19 vaccines have been administered to several million
Alessandra Buoninfante   +3 more
doaj   +1 more source

Instructed threat enhances threat perception in faces.

open access: yesEmotion, 2021
Anxiety can boost the detection of potential threats in many ways. There is evidence that one and the same facial expression can be perceived differently depending on whether it is seen in a neutral or in a threatening situation. The present study investigated how aversive anticipation influences the accuracy of facial emotion recognition and the ...
Fatih C. Kavcıoğlu   +3 more
openaire   +3 more sources

Testing threats in repeated games [PDF]

open access: yes, 2005
Under most game-theoretic solution concepts, equilibrium beliefs are justified by off-equilibrium events. I propose an equilibrium concept for infinitely repeated games, called "Nash Equilibrium with Tests" (NEWT), according to which players can only ...
Spiegler, R
core  

Threats Management Throughout the Software Service Life-Cycle

open access: yes, 2014
Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime.
Gjære, Erlend Andreas   +1 more
core   +2 more sources

Home - About - Disclaimer - Privacy