Results 71 to 80 of about 489,634 (291)
Mitochondrial remodeling shapes neural and glial lineage progression by matching metabolic supply with demand. Elevated OXPHOS supports differentiation and myelin formation, while myelin compaction lowers mitochondrial dependence, revealing mitochondria as key drivers of developmental energy adaptation.
Sahitya Ranjan Biswas +3 more
wiley +1 more source
This study aimed to develop the Five Cognitive Biases in Risk-Taking Scale (5 CBR-S) to measure five cognitive biases associated with risk-taking: overconfidence, illusion of control, belief in the law of small numbers, escalation of commitment, and ...
Sébastien Lhardy +2 more
doaj +1 more source
Introduction, Purpose. One of the major tasks in the system of the country economic safety support is the monitoring the economy status provided by the Russian Federation Strategy of Economic Safety Support until 2030.
S. A. Pobyvaev +4 more
doaj +1 more source
An Empirical Study on Android-related Vulnerabilities
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and keys. Basically, they embed most of our private information in our pocket.
Bavota, Gabriele +2 more
core +1 more source
Dimethyl fumarate (DMF) reduces growth of HPV‐positive cervical cancer spheroids and induces ferroptosis in cervical cancer cells via blocking SLC7A11/Glutathione (GSH) axis. Combination of subcytotoxic doses of DMF and cisplatin (CDDP) further suppresses spheroid growth and drives cell death in 2D culture models.
Carolina Punziano +6 more
wiley +1 more source
The critical vulnerabilities of civilian nuclear operations [PDF]
The exploitation for peaceful purposes of nuclear knowledge and nuclear technology is inevitably connected to the exploitation of the same phenomena for military purposes.
Smith, Ron C.
core +1 more source
Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra +6 more
wiley +1 more source
In this article, we examine how sensitive the methodology for calculating a “Typical Meteorological Year” (TMY) is to changes in the source of the meteorological data series and the weighting factors used. Three different sources of meteorological data –
Anna Tippett +5 more
doaj +1 more source
Towards Vulnerability Discovery Using Staged Program Analysis
Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write.
J Dean +6 more
core +1 more source
Cryptocurrencies: Who is vulnerable and what are the vulnerabilities?
AbstractAustralians are embracing new forms of digital finance products and services, which includes purchasing cryptocurrencies and non‐fungible tokens (NFTs). There has been an increase in investment scams associated with cryptocurrencies. In this article, we sought to understand from cryptocurrency and NFT investors, who is vulnerable and what ...
Levon Blue, Congcong Xing, Thu Pham
openaire +3 more sources

