Showing 32,461 - 32,480 results of 41,775 for search '"All That"', query time: 0.17s Refine Results
  1. 32461

    Exploring the influence of light conditions on the antifungal, antioxidant, and cytotoxic potential of N. persica A1387 by Bahareh Nowruzi, Radin Norouzi, Romina Norouzi

    Published 2025-03-01
    “…GC-MS analysis identified 3-methylbutanal and 2-methylbutanal as the most abundant volatile compounds across all treatments. In conclusion, white light is optimal for growth and biomass production, while blue light enhances antioxidant activity, demonstrating their potential for optimizing bioactive compound production.…”
    Get full text
    Article
  2. 32462

    Acridine-2,4-Dinitrophenyl Hydrazone Conjugated Silver Nanoparticles as an Efficient Sensor for Quantification of Mercury in Tap Water by Imdad Ali, Ibanga Okon Isaac, Mahmood Ahmed, Farid Ahmed, Farhat Ikram, Muhammad Ateeq, Rima D. Alharthy, Muhammad Imran Malik, Abdul Hameed, Muhammad Raza Shah

    Published 2022-01-01
    “…Furthermore, sensing behavior of nanosensor for metal ions was evaluated by mixing different metals such as Mn2+, Ni2+, Ba2+, Mg2+, Cr3+, Pb2+, Pd2+, Al3+, Sn2+, Fe2+, Co2+, Cu2+, Fe3+, Cd2+, and Hg2+with ACR-AgNPs. Among all the added metal ions, only Hg2+resulted in significant quenching in the absorption intensity of ACR-AgNPs. …”
    Get full text
    Article
  3. 32463

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  4. 32464

    Increasing Productivity and Recovering Nutritional, Organoleptic, and Nutraceutical Qualities of Major Vegetable Crops for Better Dietetics by Raju Lal Bhardwaj, Latika Vyas, Mahendra Prakash Verma, Suresh Chand Meena, Anirudha Chattopadhyay, Neeraj Kumar Meena, Dan Singh Jakhar, Sita Ram Kumawat

    Published 2025-01-01
    “…Experimental findings likewise indicate that an assortment of organic sources with a microbial consortium significantly recovers the abundance of beneficial microbes and earthworms in the rhizosphere, which leads to an improvement in nutritional, organoleptic, and nutraceutical quality, with higher antioxidant contents in all three vegetables grown in arid climate conditions.…”
    Get full text
    Article
  5. 32465

    Betatrophin Acts as a Diagnostic Biomarker in Type 2 Diabetes Mellitus and Is Negatively Associated with HDL-Cholesterol by Min Yi, Rong-ping Chen, Rui Yang, Xian-feng Guo, Jia-chun Zhang, Hong Chen

    Published 2015-01-01
    “…Correlation analysis showed that betatrophin was negatively associated with high-density lipoprotein cholesterol (HDL-C) levels in all subjects. ROC curve analysis identified betatrophin as a potent diagnostic biomarker for T2DM. …”
    Get full text
    Article
  6. 32466

    Revisiting Weimar Film Reviewers’ Sentiments: Integrating Lexicon-Based Sentiment Analysis with Large Language Models by Isadora Campregher Paiva, Josephine Diecke

    Published 2024-07-01
    “…We believe this hybrid approach could prove useful for application in large corpora, for which close reading of all reviews would be humanly impossible.…”
    Get full text
    Article
  7. 32467

    A Systematic Comparison Identifies an ATP-Based Viability Assay as Most Suitable Read-Out for Drug Screening in Glioma Stem-Like Cells by A. Kleijn, J. J. Kloezeman, R. K. Balvers, M. van der Kaaij, C. M. F. Dirven, S. Leenstra, M. L. M. Lamfers

    Published 2016-01-01
    “…The NADH- and ATP-based viability assays revealed comparable readout for all treatments; however, the latter had smaller standard deviations and direct readout. …”
    Get full text
    Article
  8. 32468

    Evaluation of Silkworm Lines against Variations in Temperature and RH for Various Parameters of Commercial Cocoon Production by Mubashar Hussain, Shakil Ahmad Khan, Muhammad Naeem, Tahir Aqil, Rizwan Khursheed, Ata ul Mohsin

    Published 2011-01-01
    “…The silkworm lines performed significantly better when the larvae were reared at 25±1 °C with 70–80% RH while almost all the silkworm lines showed poor performance at higher temperature exposures for 3 hrs. …”
    Get full text
    Article
  9. 32469

    Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop by Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, Heba M. Khater

    Published 2025-01-01
    “…To secure the exchange of threat intelligence information, a safe blockchain network is used, which comprises Byzantine Fault Tolerance for high data integrity and Zero-Knowledge Proofs for access control. All relevant information is cleaned and standardized prior to analysis. …”
    Get full text
    Article
  10. 32470

    Integrating Multilayer Perceptron and Support Vector Regression for Enhanced State of Health Estimation in Lithium-Ion Batteries by Sadiqa Jafari, Jisoo Kim, Wonil Choi, Yung-Cheol Byun

    Published 2025-01-01
    “…Using sophisticated machine learning algorithms, we suggest an all-encompassing methodology for predicting the SOH. …”
    Get full text
    Article
  11. 32471

    Comparative study of polymeric nanoparticles and traditional agents in dental implant decontamination by Håvard J Haugen, Jaime Bueno, Badra Hussain, Raquel Osorio, Mariano Sanz

    Published 2025-01-01
    “…Residual contaminants, including carbon and oxygen, persisted on all treated surfaces, indicating enhanced cleaning strategies were needed. …”
    Get full text
    Article
  12. 32472

    Evaluation of Small Intestinal Permeability in Patients with Overlap Syndrome (Autoimmune Hepatitis/Primary Biliary Cholangitis) by D. R. Akberova, A. Kh. Odintcova, D. I. Abdulganieva

    Published 2023-06-01
    “…An increase in small bowel permeability was found in patients with overlapping syndrome. All patients had increased intestinal permeability (regardless of the presence of extrahepatic manifestations).…”
    Get full text
    Article
  13. 32473

    Visual Outcomes and Patient Satisfaction of Two Continuous Range of Vision Intraocular Lenses by Micheletti JM, Hall B, Smiley HG, Langston WJ

    Published 2025-01-01
    “…Non-inferiority of visual acuities were confirmed for all testing distances, with and without distance correction in place. …”
    Get full text
    Article
  14. 32474

    Noncanonical IFN Signaling, Steroids, and STATs: A Probable Role of V-ATPase by Howard M. Johnson, Ezra Noon-Song, Chulbul M. Ahmed

    Published 2019-01-01
    “…Focusing on IFN signaling, we showed that ligand, IFN receptor, the JAKs, and the STATs all undergo endocytosis and ATP-dependent nuclear translocation to promoters of genes specifically activated by IFNs. …”
    Get full text
    Article
  15. 32475

    A Cross-Sectional Study to Assess Diabetes as a Risk Factor for Root Caries Amongst the Elderly Population in Udupi District, Karnataka State, India by Kush Kalra, Ramprasad Vasthare, Shivashankar K. N., Nishu Singla, Deepak Kumar Singhal, Ritesh Singla

    Published 2024-01-01
    “…Binary logistic regression univariate analysis was done for all the predictor variables, and those with significant associations were further analyzed by multivariate analysis with the enter method in a single-step model. …”
    Get full text
    Article
  16. 32476
  17. 32477

    Corrosion Sensor Development for Condition-Based Maintenance of Aircraft by Gino Rinaldi, Trisha Huber, Heather McIntosh, Les Lebrun, Heping Ding, John Weber

    Published 2012-01-01
    “…For aircraft operators, this becomes an important safety matter as corrosion found in a given aircraft must be assumed to be present in all of that type of aircraft. This safety protocol and its associated unscheduled maintenance requirement drive up the operational costs of the fleet and limit the availability of the aircraft. …”
    Get full text
    Article
  18. 32478

    Current directions for improving the administrative, legal and organisational principles of the activities of higher education institutions of the MIA of Ukraine which provide poli... by K. L. Buhaichuk, O. A. Morhunov

    Published 2023-07-01
    “…It has been determined that the state of war caused by Russia’s aggression against Ukraine imposes new requirements on the quality of staffing of all security and defence sector entities, in particular, the National Police of Ukraine. …”
    Get full text
    Article
  19. 32479

    Effects of Lipoic Acid Supplementation on Activities of Cyclooxygenases and Levels of Prostaglandins E2 and F2α Metabolites, in the Offspring of Rats with Streptozotocin-Induced Di... by Hisham Y. Al-Matubsi, Ghaleb A. Oriquat, Mahmoud Abu-Samak, Othman A. Al Hanbali, Maher D. Salim

    Published 2016-01-01
    “…The level of total glutathione was measured in the maternal liver and plasma and in all fetuses. Results. Supplementation of diabetic rats with LA was found to significantly (p<0.05) reduce resorption rates in diabetic rats and led to a significant (p<0.05) increase in liver, plasma, and fetuses total glutathione from LA-TD rats as compared to those from V-TD. …”
    Get full text
    Article
  20. 32480

    Multi-modal comparison of molecular programs driving nurse cell death and clearance in Drosophila melanogaster oogenesis. by Shruthi Bandyadka, Diane P V Lebo, Albert A Mondragon, Sandy B Serizier, Julian Kwan, Jeanne S Peterson, Alexandra Y Chasse, Victoria K Jenkins, Anoush Calikyan, Anthony J Ortega, Joshua D Campbell, Andrew Emili, Kimberly McCall

    Published 2025-01-01
    “…In preparation for oviposition, the germline-derived nurse cells bequeath to the developing oocyte all their cytoplasmic contents and undergo programmed cell death. …”
    Get full text
    Article