Results 51 to 60 of about 104,626 (245)
Comparative Analysis of Open-Source Tools for Conducting Static Code Analysis
The increasing complexity of web applications and systems, driven by ongoing digitalization, has made software security testing a necessary and critical activity in the software development lifecycle.
Kajetan Kuszczyński, Michał Walkowski
doaj +1 more source
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra +3 more
wiley +1 more source
Ranking occupations by their proximity to workers’ profiles
Information friction makes it difficult for job seekers to find new employment opportunities. We propose a method for providing individual-specific occupation recommendations by ranking occupations based on their proximity to the worker’s profile.
Mirjam Bächli +7 more
doaj +1 more source
Organoids in pediatric cancer research
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley +1 more source
AIMS: The literature from Canada, the UK and the USA reports health inequities among people experiencing homelessness; however little is known about this population’s health in Switzerland.
Luana Schaad +12 more
doaj +1 more source
Cybersecurity Vulnerabilities in Off-Site Construction
Industry 4.0 is seeking to advance traditional construction practices towards more efficient and internet of things (IoT)-based construction practices, such as offsite construction.
Kudakwashe Nyamuchiwa +2 more
doaj +1 more source
Physical vulnerability to dynamic flooding: Vulnerability curves and vulnerability indices
Vulnerability analysis is crucial to assess natural hazard risk. Methods for vulnerability assessment include indices as well as vulnerability curves. Vulnerability curves make use of empirical data to show the relationship between the process intensity and the resulting degree of loss on each affected building whereas vulnerability indices are based ...
Maria Papathoma-Köhle +7 more
openaire +1 more source
Time after time – circadian clocks through the lens of oscillator theory
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo +2 more
wiley +1 more source
Vulnerabilities of Internal Returnee Migrants in the Context of the COVID-19 Pandemic in India
The study surveyed 227 returned labor migrants in four districts of western Odisha to comprehensively analyze the socio-economic vulnerabilities faced by internal returnee labor migrants caused by the COVID-19 pandemic in India. The results show that the
Arun Kumar Acharya, Sanjib Patel
doaj +1 more source
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman +2 more
wiley +1 more source

