نتایج جستجو برای: cellular defence system

تعداد نتایج: 2600804  

Journal: :World Journal Of Advanced Research and Reviews 2021

Immunity is the state of protection against foreign pathogens or substances(antigens). Host defence mechanisms consist innate immunity (natural immunity), which mediates initial infections, and adaptive (specific/acquired develops more slowly provides specialized effective infections. The immune system evolved to protect multicellular organisms pathogens. body protected by a variety effector ce...

Journal: :Nature Reviews Microbiology 2019

ژورنال: مجله دندانپزشکی 1998
تهیدست, زهرا ,

Since 1800, it is known that fungican invade human tissues and from 1900, there is a great deal of information about incidence and epidemiology and geographic distribution and fungal infections.Because of increased incidence of fungal infections on recent years and importance of these organisms in producing of systemic and muco- cutaneous diseases, many investigations are performed about these ...

2018
Tom R. Kupfer Daniel M.T. Fessler

Currently, disgust is regarded as the main adaptation for defence against pathogens and parasites in humans. Disgust’s motivational and behavioural features, including withdrawal, nausea, appetite suppression, and the urge to vomit, defend effectively against ingesting or touching sources of pathogens. However, ectoparasites do not attack their hosts via ingestion, but rather actively attach th...

Journal: :Energies 2023

This study addresses energy security from the perspective of comprehensive national defence, especially interaction between military and civilian aspects defence. Civilian infrastructure is seldom configured or developed with defence in focus. Therefore, aim facilitating a system-level discussion, this takes two steps. The first step to develop indicators for assessing setting. second qualitati...

2006

It is increasingly being appreciated that innate immune mechanisms play a key role for the tuning of adaptive immunity in the gut and maintenance of mucosal homeostasis. Innate responses use preformed and rapidly synthesised effectors and sensors that lead to spontaneous activation or modulation of cellular functions, aiming at elimination of microbial challenges and return of the local tissue ...

Journal: :Marine pollution bulletin 2007
Thomais Vlahogianni Manos Dassenakis Michael J Scoullos Athanasios Valavanidis

Mussels are used as sentinel organisms and bioindicators to evaluate the toxic effects of chemical pollutants in marine organisms, especially heavy metals, representing an important tool for biomonitoring environmental pollution in coastal areas. Antioxidant defence enzymes play an important role in cellular antioxidant defence systems and protect from oxidative damage by reactive oxygen specie...

2015
Olga Gadyatskaya

Recently security researchers have started to look into automated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is automating the selection of security controls to treat the detected threats. However, the existing socio-technical models are too abstract to represent all security controls recommended by practitioners...

2013
Rumyana Simeonova Vessela Vitcheva Magdalena Kondeva-Burdina Ilina Krasteva Vassil Manov Mitka Mitcheva

The hepatoprotective potential of saponarin, isolated from Gypsophila trichotoma, was evaluated in vitro/in vivo using a hepatotoxicity model of paracetamol-induced liver injury. In freshly isolated rat hepatocytes, paracetamol (100 μ mol) led to a significant decrease in cell viability, increased LDH leakage, decreased levels of cellular GSH, and elevated MDA quantity. Saponarin (60-0.006 μ g/...

2012
Igor Kotenko

The important problem in network security which solution is urgently needed is the investigation of counteraction between malefactors and defence systems in computer networks, including the Internet, and the creation of effective cyber-defence systems. It is important to underline that experienced malefactors realize sophisticated strategies of cyber-attacks. These strategies can include:  Inf...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید