How microplastics hurt the species that keep our coasts healthy

Walk across a mudflat at low tide and you might notice small, neat mounds of sediment scattered across the surface.
Source
Phys.org
Opens original article in a new tab
AI Bias Analysis
4 models · Takes ~15 seconds

Walk across a mudflat at low tide and you might notice small, neat mounds of sediment scattered across the surface.
Source
Phys.org
Opens original article in a new tab

When lightning strikes a paddock, it does more than scorch grass and scare the cows. The electrical discharge breaks apart nitrogen molecules in the atmosphere, converting them into a form that falls to Earth in rain and becomes available to plants. It is a natural process, primordial and efficient, which has been fixing nitrogen into soils long before humans began to farm them.

What happens inside the lungs before COVID-19 symptoms appear? Research in mink offers a rare window into the early stages of the disease. These insights matter for both animal and human health. Researchers and veterinary pathologists from Wageningen Bioveterinary Research (WBVR, part of Wageningen University & Research), together with Royal GD and Utrecht University, followed the course of SARS-CoV-2 infection in mink.

Conflicts of interest and unclear responsibilities are hampering efforts to recover lost and illegally discarded fishing gear in the Baltic Sea. Despite EU and regional measures, progress on tackling "ghost gear" pollution has stalled, according to a new study published in Maritime Studies. The authors, including RIFS researcher Ben Boteler, call for stronger cross-sectoral coordination and clearer mandates.

Researchers at Ben-Gurion University of the Negev have developed a new approach to secure optical communication that hides information in the physical structure of light, making it difficult for unauthorized parties to intercept or decode. The study addresses a growing challenge: advances in quantum computing are expected to weaken many of today's encryption methods. While most security solutions rely on complex mathematical algorithms, this research adds protection earlier in the process—during