Results 71 to 80 of about 470,699 (271)

Mechanisms of parasite‐mediated disruption of brain vessels

open access: yesFEBS Letters, EarlyView.
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira   +3 more
wiley   +1 more source

Data Source Sensitivity in Solar Radiation Typical Meteorological Year (TMY) for Five Different Regions of Brazil

open access: yesTellus: Series A, Dynamic Meteorology and Oceanography
In this article, we examine how sensitive the methodology for calculating a “Typical Meteorological Year” (TMY) is to changes in the source of the meteorological data series and the weighting factors used. Three different sources of meteorological data –
Anna Tippett   +5 more
doaj   +1 more source

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

Vulnerability to water shortages in the 21st Century’s arid and semi-arid American West

open access: yesL'Ordinaire des Amériques, 2015
Scientific studies agree to stress the growing risk of water shortages in the arid and semi-arid American West. Over the next fifty years, at least part of the local population will likely face water shortages which will call into question the ...
Nicolas Barbier
doaj   +1 more source

The critical vulnerabilities of civilian nuclear operations [PDF]

open access: yes, 2005
The exploitation for peaceful purposes of nuclear knowledge and nuclear technology is inevitably connected to the exploitation of the same phenomena for military purposes.
Smith, Ron C.
core   +1 more source

A Survey of Techniques for Improving Security of GPUs

open access: yes, 2018
Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest `link' in the security `chain'.
Abhinaya, S. B.   +3 more
core   +1 more source

Conserved structural motifs in PAS, LOV, and CRY proteins regulate circadian rhythms and are therapeutic targets

open access: yesFEBS Letters, EarlyView.
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman   +2 more
wiley   +1 more source

Complementary medicine among individuals experiencing homelessness in Switzerland: a quantitative and qualitative descriptive study

open access: yesBMC Complementary Medicine and Therapies
Background People experiencing homelessness (PEH) are disproportionately affected by health issues yet remain underserved by the health care system. Emerging findings suggest that complementary medicine (CM) approaches might help address the low access ...
Véronique S. Grazioli   +12 more
doaj   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Vulnerability Assessment of Ubiquitous Cities Using the Analytic Hierarchy Process

open access: yesFuture Internet, 2020
Urbanization is a challenge faced by most countries worldwide and leads to several problems. Due to rapid communication capabilities, conforming the megacities into Ubiquitous cities (U-cities) seems to be a potential solution to mitigate the problems ...
Muhammad Atiq Ur Rehman Tariq   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy