Results 81 to 90 of about 1,848,811 (333)
Reflecting on rapport: strategies for online interviews about sensitive or distressing topics with vulnerable children [PDF]
Rachel Leslie +3 more
openalex +1 more source
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker +16 more
wiley +1 more source
The Unified Approach For Organizational Network Vulnerability Assessment
The present business network infrastructure is quickly varying with latest servers, services, connections, and ports added often, at times day by day, and with a uncontrollably inflow of laptops, storage media and wireless networks.
Jagli, Mrs. Dhanamma +1 more
core +1 more source
Survivin and Aurora Kinase A control cell fate decisions during mitosis
Aurora A interacts with survivin during mitosis and regulates its centromeric role. Loss of Aurora A activity mislocalises survivin, the CPC and BubR1, leading to disruption of the spindle checkpoint and triggering premature mitotic exit, which we refer to as ‘mitotic slippage’.
Hana Abdelkabir +2 more
wiley +1 more source
Seismic vulnerability assessment of the old city centre of Seixal, Portugal [PDF]
The seismic vulnerability assessment of old traditional masonry building stocks, in a seismic risk mitigation perspective, is truly essential not only for buildings with recognized historical and patrimonial value, but also, in relation to regular ...
Costa, A. +4 more
core +1 more source
Effect of chemotherapy on passenger mutations in metastatic colorectal cancer
Changes in passenger mutation load and predicted immunotherapy response after chemotherapy treatment. Tumor cells rich with passenger mutations have increased sensitivity to chemotherapy. Correlation of passenger mutations with neoantigen load suggests highly mutated clones promote a more effective response to immunotherapy, and therefore, first‐line ...
Marium T. Siddiqui +6 more
wiley +1 more source
Pare bay is one of the areas of significance which is utilized for port services, stevedoring, oil distribution, regional industrial development, aquaculture, cultivation and settlement systems.
Ulung Jantama Wisha +5 more
doaj +1 more source
My quilt is an intimate object that explores sexuality, feminism, beauty, and the vulnerability of women. I explored these topics through hand-stitching sensual images onto squares of fabric, which I then sewed into a quilt.
Slowik, Sara
core +1 more source
Impact assessment for vulnerabilities in open-source software libraries
Software applications integrate more and more open-source software (OSS) to benefit from code reuse. As a drawback, each vulnerability discovered in bundled OSS potentially affects the application.
Plate, Henrik +2 more
core +1 more source
Assessing Financial Vulnerability in the Nonprofit Sector [PDF]
Effective nonprofit governance relies upon understanding an organization's financial condition and vulnerabilities. However, financial vulnerability of nonprofit organizations is a relatively new area of study.
Elizabeth K. Keating +3 more
core +1 more source

