Publications by authors named "A R Moreno"

The European subtype of tick-borne encephalitis virus (TBEV-Eur; species , family ) was the only tick-borne flavivirus present in central Europe known to cause neurologic disease in humans and several animal species. Here, we report a tick-borne flavivirus isolated from Alpine chamois () with encephalitis and attached ticks, present over a wide area in the Alps. Cases were detected in 2017 in Salzburg, Austria, and 2023 in Lombardy and Piedmont, Italy.

View Article and Find Full Text PDF

Female mammalian cells have two X chromosomes, one of maternal origin and one of paternal origin. During development, one X chromosome randomly becomes inactivated. This renders either the maternal X (X) chromosome or the paternal X (X) chromosome inactive, causing X mosaicism that varies between female individuals, with some showing considerable or complete skew of the X chromosome that remains active.

View Article and Find Full Text PDF

Purpose: Osteoradionecrosis of the jaw (ORNJ) is a severe iatrogenic disease characterized by bone death after radiation therapy (RT) to the head and neck. With over 9 published definitions and at least 16 classification systems, the true incidence and severity of ORNJ are obscured by lack of a standard for disease definition and severity assessment, leading to inaccurate estimation of incidence, reporting ambiguity, and likely under-diagnosis worldwide. This study aimed to achieve consensus on an explicit definition and phenotype of ORNJ and related precursor states through data standardization to facilitate effective diagnosis, monitoring, and multidisciplinary management of ORNJ.

View Article and Find Full Text PDF

We report the synthesis of a series of detergents with a lactobionamide polar head group and a tail containing four to seven perfluorinated carbon atoms. Critical micellar concentrations (CMCs) were determined using isothermal titration calorimetry (ITC) and surface tension (SFT) measurements, showing a progressive decrease from 27 mM to about 0.2 mM across the series.

View Article and Find Full Text PDF

Conducting penetration testing (pentesting) in cybersecurity is a crucial turning point for identifying vulnerabilities within the framework of Information Technology (IT), where real malicious offensive behavior is simulated to identify potential weaknesses and strengthen preventive controls. Given the complexity of the tests, time constraints, and the specialized level of expertise required for pentesting, analysis and exploitation tools are commonly used. Although useful, these tools often introduce uncertainty in findings, resulting in high rates of false positives.

View Article and Find Full Text PDF