Learn More
In mountainous regions, climate warming is expected to shift species' ranges to higher altitudes. Evidence for such shifts is still mostly from revisitations of historical sites. We present recent (2001 to 2008) changes in vascular plant species richness observed in a standardized monitoring network across Europe's major mountain ranges. Species have moved(More)
INTRODUCTION AND OBJECTIVES Coronary flow reserve (CFR) is impaired not only in ischemic heart disease, but also in cardiac diseases that may or may not course with heart failure. The aim of the present study was to determine if the severity of heart failure can influence CFR impairment. METHODS Forty patients with non-ischemic heart disease and heart(More)
Online education is used for a variety of purposes in higher education. Two such purposes are improving one's performance over time and understanding one's professional development in the context of online teaching and learning. Relying on data from online staff development courses delivered in five Spanish universities, this article explores online faculty(More)
Although the recent Zika virus (ZIKV) epidemic in the Americas and its link to birth defects have attracted a great deal of attention, much remains unknown about ZIKV disease epidemiology and ZIKV evolution, in part owing to a lack of genomic data. Here we address this gap in knowledge by using multiple sequencing approaches to generate 110 ZIKV genomes(More)
Pulmonary shunt calculated by the Berggren method is commonly used as an indicator of pulmonary function. Although there is usually a good correlation between the shunt and the A-aDO2, other physiologic parameters involved in the shunt equation may significantly alter pulmonary function. The purpose of this study is to show the contribution of the PVO2 and(More)
An encryption scheme is a procedure that enables two parties to securely communicate over a public channel, in such a way that if a malicious party intercepts the information exchanged, it cannot extract the original message. In public key cryptography, the keys needed to encrypt and decrypt are different, the encryption key being public, thus available to(More)
  • 1