-
821
Melatonin: A Novel Indolamine in Oral Health and Disease
Published 2012-01-01“…Recent studies, by Claustrat et al. (2005), detected few extrapineal sources of melatonin like retina, gastrointestinal tract, and salivary glands. …”
Get full text
Article -
822
Cost-Effective Photoacoustic Imaging Using High-Power Light-Emitting Diodes Driven by an Avalanche Oscillator
Published 2025-03-01“…While lasers have traditionally been the light source for PAI, their high cost and complexity drive interest towards alternative sources like light-emitting diodes (LEDs). …”
Get full text
Article -
823
Two rare cases of severe community-acquired bloodstream infections: a clinical case report
Published 2024-12-01“…Detailed medical history inquiries, assessment of underlying immune status, detection of the source of infection, and initial precise identification and treatment of the infectious agents can improve the prognosis of CABSI.Case descriptionIn this paper, two incidences of severe CABSI with insidious onset and rapid progression are described. …”
Get full text
Article -
824
Feature Extraction and Classification of Power Quality Disturbances Using Optimized Tunable-Q Wavelet Transform and Incremental Support Vector Machine
Published 2024-01-01“…The widespread integration of renewable energy sources (RESs) into power systems using power electronics-based interface devices has led to a substantial rise in power quality (PQ) issues. …”
Get full text
Article -
825
Energy filtering enables macromolecular MicroED data at sub-atomic resolution
Published 2025-03-01“…While direct electron detection essentially eliminates the read-out noise during MicroED data collection, other sources of noise remain and limit the measurement of faint high-resolution reflections. …”
Get full text
Article -
826
pytom-match-pick: A tophat-transform constraint for automated classification in template matching
Published 2025-06-01“…However, TM faces challenges of weak signal of the macromolecules and interfering features with a high signal-to-noise ratio, which are often addressed by time-consuming, subjective manual curation of results. To improve the detection performance we introduce pytom-match-pick, a GPU-accelerated, open-source command line interface for enhanced TM in cryo-ET. …”
Get full text
Article -
827
-
828
Gene-Environment Interactions in Stress Response Contribute Additively to a Genotype-Environment Interaction.
Published 2016-07-01“…To shed light on this problem, we genetically dissected an environment-specific poor growth phenotype in a cross of two budding yeast strains. This phenotype is detectable when certain segregants are grown on ethanol at 37°C ('E37'), a condition that differs from the standard culturing environment in both its carbon source (ethanol as opposed to glucose) and temperature (37°C as opposed to 30°C). …”
Get full text
Article -
829
Unraveling the complexities: morpho-physiological and proteomic responses of pearl millet (Pennisetum glaucum) to dual drought and salt stress
Published 2025-04-01“…Catalytic and binding activities were the predominant molecular functions detected across treatments suggesting their central role in stress response. …”
Get full text
Article -
830
ParticleHolography.jl: Holographic particle measurement in Julia
Published 2025-02-01“…This comprehensive software provides an end-to-end processing pipeline encompassing a wide range of functionalities: preprocessing, including background removal and camera calibration; three-dimensional reconstruction through diffraction calculations; particle analysis, including detection and tracking; and result visualization. …”
Get full text
Article -
831
mbctools: A User-Friendly Metabarcoding and Cross-Platform Pipeline for Analyzing Multiple Amplicon Sequencing Data across a Large Diversity of Organisms
Published 2024-12-01“…It provides functions for various tasks such as dereplication, clustering, chimera detection, and taxonomic assignment. …”
Get full text
Article -
832
A Benzimidazole-Based Fluorescent Probe for the Selective Recognition of Cobalt (II) Ions
Published 2025-08-01“…However, excessive cobalt intake can cause health issues. Detecting cobalt ions, especially Co<sup>2+</sup>, in food is crucial due to potential contamination from various sources. …”
Get full text
Article -
833
Milk phenomics: leveraging biological bonds with blood and infrared technologies for evaluating animal nutritional and health status
Published 2024-12-01“…Indeed, monitoring the nutritional and health status becomes paramount, aiming for an early detection of (sub)clinical health impairments. Given the mammary gland’s centrality in high-yielding dairy breeds, it’s unsurprising that the milk matrix provides insights about udder itself but also systemic metabolic function. …”
Get full text
Article -
834
Harnessing evanescent photoacoustic waves for multi-domain imaging
Published 2025-06-01“…Leveraging these features, we develop a proof-of-concept for supercritical angle photoacoustic microscopy (SA-PAM), which utilizes evanescent PA waves to enable new PAM functionalities, such as surface topography reconstruction and edge detection. …”
Get full text
Article -
835
Bearing Small Sample Fault Diagnosis based on Data Generation and Transfer Learning
Published 2020-11-01“…Aiming at the problem of limited fault diagnosis performance caused by a single source of historical operating data for wind turbine bearings and a small amount of data, a small sample fault diagnosis method of bearings based on data generation and transfer learning is proposed. …”
Get full text
Article -
836
Potential for non‐destructive astrochemistry using the ExoMars PanCam
Published 2008-06-01“…This non‐destructive triage allows prioritized deployment of organic detection experiments requiring sample destruction and/or expenditure of non‐replaceable resources. …”
Get full text
Article -
837
-
838
A data driven approach using local measurements to locate turbine governors causing forced oscillations
Published 2025-07-01“…When forced oscillations are detected, they are located by finding the transfer functions that describe the behaviour of the corresponding plant the worst. …”
Get full text
Article -
839
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
840
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, &quot;cloud&quot; has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article