نتایج جستجو برای: nonstructural and functional vulnerability
تعداد نتایج: 16906624 فیلتر نتایج به سال:
Identifying spatial patterns in vulnerability involves a comprehensive look at vulnerable points. And provides analytical power to the authorities. Therefore, it is necessary to recognize patterns of vulnerability so as to minimize the amount of damage to them in the event of a crisis. The city of Tehran, as the political and administrative center of the country, is faced with a variety of risk...
RNA interference (RNAi) has been shown to inhibit viral replication in some animals and plants. Whether the RNAi is functional in shrimp remains to be demonstrated. In vitro transcribed dsRNAs of YHV helicase, polymerase, protease, gp116, and gp64 were transfected into shrimp primary cell culture and found to inhibit YHV replication. dsRNA targeted to nonstructural genes (protease, polymerase, ...
Context: Modern automated source code analysis techniques can be very successful in detecting a priori defined defect patterns and security vulnerabilities. Yet, they cannot detect flaws that manifest due to erroneous translation of the software’s functional requirements into the source code. The automated detection of logical errors that are attributed to a faulty implementation of application...
The issue of protection of groundwater against pollution is of crucial significance. Groundwater vulnerability maps provide useful information to protect groundwater resources and evaluate the potential for water quality improvement with changes in agricultural practices and land use applications. In Yazd province, especially in Abarkooh, the majority of agricultural and drinking water is provi...
We propose a new approach to the design of relational database schemes. The main features of the approach are: (4 A combination of the traditional decomposition and synthesis approaches, thus allowing the use of both functional and multivalued dependencies. (b) Separation of structural dependencies relevant for the design process from integrity constraints, i.e., constraints that do not bear an...
Introduction: Vulnerability of people and places is a complex phenomenon has been created as a result of human and environment interaction during the ages. The concept of vulnerability addresses the probability of being destructed or damaged of a society, structure, service or a geographical area due to a specific danger. Nowadays there is frequent demand for settling industrial infrastructures...
Biogenesis and replication of the porcine reproductive and respiratory syndrome virus (PRRSV) include the crucial step of replicative polyprotein processing by self-encoded proteases. Whole genome bioinformatics analysis suggests that nonstructural protein 4 (nsp4) is a 3C-like serine protease (3CLSP), responsible for most of the nonstructural protein processing. The gene encoding this protease...
When tropical systems lose species, they are often assumed to be buffered against declines in functional diversity by the ability of the species-rich biota to display high functional redundancy: i.e., a high number of species performing similar functions. We tested this hypothesis using a ninefold richness gradient in global fish faunas on tropical reefs encompassing 6,316 species distributed a...
Neurodegenerative diseases target large-scale neural networks. Four competing mechanistic hypotheses have been proposed to explain network-based disease patterning: nodal stress, transneuronal spread, trophic failure, and shared vulnerability. Here, we used task-free fMRI to derive the healthy intrinsic connectivity patterns seeded by brain regions vulnerable to any of five distinct neurodegene...
Objective: The aim of measuring vulnerability of children to poverty is to estimate the probability 01 being poor according to the household’s head socioeconomic characteristics. The estimates of the vulnerability to poverty can be used as a guideline to the policymakers to allocate the public subsidies to the poor children and their families. Methodology: Children are at a higher risk of ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید