نتایج جستجو برای: nonstructural and functional vulnerability

تعداد نتایج: 16906624  

Identifying spatial patterns in vulnerability involves a comprehensive look at vulnerable points. And provides analytical power to the authorities. Therefore, it is necessary to recognize patterns of vulnerability so as to minimize the amount of damage to them in the event of a crisis. The city of Tehran, as the political and administrative center of the country, is faced with a variety of risk...

Journal: :Biochemical and biophysical research communications 2005
Witoon Tirasophon Yaowaluck Roshorm Sakol Panyim

RNA interference (RNAi) has been shown to inhibit viral replication in some animals and plants. Whether the RNAi is functional in shrimp remains to be demonstrated. In vitro transcribed dsRNAs of YHV helicase, polymerase, protease, gp116, and gp64 were transfected into shrimp primary cell culture and found to inhibit YHV replication. dsRNA targeted to nonstructural genes (protease, polymerase, ...

2016
George Stergiopoulos Panagiotis Katsaros Dimitris Gritzalis Theodore K. Apostolopoulos

Context: Modern automated source code analysis techniques can be very successful in detecting a priori defined defect patterns and security vulnerabilities. Yet, they cannot detect flaws that manifest due to erroneous translation of the software’s functional requirements into the source code. The automated detection of logical errors that are attributed to a faulty implementation of application...

The issue of protection of groundwater against pollution is of crucial significance. Groundwater vulnerability maps provide useful information to protect groundwater resources and evaluate the potential for water quality improvement with changes in agricultural practices and land use applications. In Yazd province, especially in Abarkooh, the majority of agricultural and drinking water is provi...

1984
Catriel Beeri Michael Kifer

We propose a new approach to the design of relational database schemes. The main features of the approach are: (4 A combination of the traditional decomposition and synthesis approaches, thus allowing the use of both functional and multivalued dependencies. (b) Separation of structural dependencies relevant for the design process from integrity constraints, i.e., constraints that do not bear an...

Introduction: Vulnerability of people and places is a complex phenomenon has been created as a result of human and environment interaction during the ages. The concept of vulnerability addresses the probability of being destructed or damaged of a society, structure, service or a geographical area due to a specific danger. Nowadays there is frequent demand for settling industrial infrastructures...

Journal: :Journal of molecular biology 2009
Xinsheng Tian Guangwen Lu Feng Gao Hao Peng Youjun Feng Guangpeng Ma Mark Bartlam Kegong Tian Jinghua Yan Rolf Hilgenfeld George F Gao

Biogenesis and replication of the porcine reproductive and respiratory syndrome virus (PRRSV) include the crucial step of replicative polyprotein processing by self-encoded proteases. Whole genome bioinformatics analysis suggests that nonstructural protein 4 (nsp4) is a 3C-like serine protease (3CLSP), responsible for most of the nonstructural protein processing. The gene encoding this protease...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2014
David Mouillot Sébastien Villéger Valeriano Parravicini Michel Kulbicki Jesus Ernesto Arias-González Mariana Bender Pascale Chabanet Sergio R Floeter Alan Friedlander Laurent Vigliola David R Bellwood

When tropical systems lose species, they are often assumed to be buffered against declines in functional diversity by the ability of the species-rich biota to display high functional redundancy: i.e., a high number of species performing similar functions. We tested this hypothesis using a ninefold richness gradient in global fish faunas on tropical reefs encompassing 6,316 species distributed a...

Journal: :Neuron 2012
Juan Zhou Efstathios D. Gennatas Joel H. Kramer Bruce L. Miller William W. Seeley

Neurodegenerative diseases target large-scale neural networks. Four competing mechanistic hypotheses have been proposed to explain network-based disease patterning: nodal stress, transneuronal spread, trophic failure, and shared vulnerability. Here, we used task-free fMRI to derive the healthy intrinsic connectivity patterns seeded by brain regions vulnerable to any of five distinct neurodegene...

راغفر, حسین, صانعی, لیلا,

Objective: The aim of measuring vulnerability of children to poverty is to estimate the probability 01 being poor according to the household’s head socioeconomic characteristics. The estimates of the vulnerability to poverty can be used as a guideline to the policymakers to allocate the public subsidies to the poor children and their families. Methodology: Children are at a higher risk of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید