Purpose: Depression affects around 280 million people worldwide, and about 30% of patients have treatment-resistant depression. Ketamine has significant scientific evidence supporting its use as an antidepressant, making it a promising approach for treatment-resistant cases. Combining ketamine with psychotherapy may enhance therapeutic response and support longer-lasting cognitive and behavioral change. This pi...
Heart disease is the leading cause of mortality in developed countries, and novel regenerative procedures are warranted. Direct cardiac conversion (DCC) of adult fibroblasts can create induced cardiomyocytes (iCMs) for gene and cell-based heart therapy, and in addition to holding great promise, still lacks effectiveness as metabolic and age-associated barriers remain elusive. Here, by employing MGT (Mef2c, Gata...
This research paper explores the evolution of Industrial In- ternet of Things (IIoT) platforms and their pivotal role in the digitiza- tion of Industry 4.0, as well as their contribution to the transition to- wards Industry 5.0. The characteristics, challenges and opportunities of these platforms will be addressed, highlighting their impact on the digital transformation of industrial operations. Two case studie...
In male professional soccer, changing coaches frequently occurs during a sports season. Although this decision may disrupt players’ and teams’ development, organizational progress, and financial stability, the administrations still decide to change coaches due to several sportive factors. This study aims to describe a local Portuguese professional soccer team's reality regarding specific factors influencing the...
Aim: To evaluate students' self- perceived pedagogical outcomes when using a digital scenario- based tool compared to traditional scenarios printed on paper. Design: This study used a within- subjects experiment. Method: A digital platform for scenario development was developed, focusing on patients' regaining independence and returning home after an acute event. Students participated in two simulation activiti...
Most cancer-related deaths are due to metastases. Systemic factors, such as lipid-enriched environments [as low-density lipoprotein (LDL)-cholesterol], favor breast cancer, including triple-negative breast cancer (TNBC) metastasis formation. Mitochondria metabolism impacts TNBC invasive behavior but its involvement in a lipid-enriched setting is undisclosed. Here we show that LDL increases lipid droplets, induc...
The recently discovered human lncRNA NORAD is induced after DNA damage in a p53-dependent manner. It plays a critical role in the maintenance of genomic stability through interaction with Pumilio proteins, limiting the repression of their target mRNAs. Therefore, NORAD inactivation causes chromosomal instability and aneuploidy, which contributes to the accumulation of genetic abnormalities and tumorigenesis. NO...
The plastic architecture of the mitochondrial network and its dynamic structure play crucial roles ensuring that varying energetic demands are rapidly met. Given the brain's high energy demand, mitochondria play a particularly critical role in neuronal and axonal energy homeostasis. With ageing physiological properties of the organism deteriorate, and are associated with loss of cellular homeostasis, accumulati...
Most cancer-related deaths are due to metastases. Systemic factors, such as lipid-enriched environments [as low-density lipoprotein (LDL)-cholesterol], favor breast cancer, including triple-negative breast cancer (TNBC) metastasis formation. Mitochondria metabolism impacts TNBC invasive behavior but its involvement in a lipid-enriched setting is undisclosed. Here we show that LDL increases lipid droplets, induc...
The rapid evolution of Information Technology (IT) and the growing use of connected devices have driven the need for enhanced cybersecurity measures. This scientific article examines the interaction between IT and cybersecurity, highlighting the challenge s faced in the current era due to the emergence of cyber threats and the need to protect data and systems. It emphasizes best practices in cybersecurity, incl...