Search alternatives:
functions » function (Expand Search)
Showing 2,761 - 2,780 results of 2,992 for search '((( resource OR source) detection functions ) OR ( sources selection functions ))', query time: 0.31s Refine Results
  1. 2761

    Comparative analysis of gut symbionts in Tribolium castaneum (Coleoptera: Tenebrionidae) and their dietary substrate, sauce-flavored Daqu by Jun Lü, Shan Xu, Can Teng, Rujia Huang, Guiqin Xiong, Qin Cheng

    Published 2025-07-01
    “…., Weissella) were scarce in guts (0.6%) and vice versa. Fungal source tracking revealed SFD contributed 89–94% of gut fungi, vastly exceeding bacterial inputs (2.8–5%). …”
    Get full text
    Article
  2. 2762
  3. 2763

    Comprehensive Evaluation of Chestnut Quality Based on Principal Component and Cluster Analysis by Yanqi YU, Mingyuan YANG, Chunmao LÜ, Shaoci BAI, Qunfang ZHANG, Chenyang ZOU, Han JIANG

    Published 2025-01-01
    “…To develop an appropriate method for evaluating the quality of chestnut resources. The 21 quality indicators of 25 chestnut varieties were detected and analyzed. …”
    Get full text
    Article
  4. 2764
  5. 2765
  6. 2766
  7. 2767
  8. 2768

    Implementation of Halal Label as an Intangible Asset on Food and Beverage Business Sustainability by M. Mukhlis Amrullah, Gugus Irianto, Noval Adib

    Published 2024-09-01
    “…The results indicate that UB Coffee's management views the Halal Label as valuable and a source of pride, supporting UB Coffee's educational function as part of the educational institution UB and interpreting it as a shared value and commitment. …”
    Get full text
    Article
  9. 2769

    Chronic low back pain: Evaluation and management by A.R. Last, K. Hulbert

    Published 2010-06-01
    “…A surgical evaluation may be considered for select patients with functional disabilities or refractory pain despite multiple nonsurgical treatments.…”
    Get full text
    Article
  10. 2770

    Psycho-Theological Learning Model to Improve Mental Resilience in Muslim Adolescents by Muhammad Zamzam, Winsidi Winsidi

    Published 2024-12-01
    “…The research utilized a qualitative approach with a phenomenological design to explore the lived experiences of Muslim adolescents undergoing such learning. Data were sourced from purposively selected teachers and students actively engaged in faith-based character education programs. …”
    Get full text
    Article
  11. 2771

    FOOD SECURITY AND INCOME DIVERSIFICATION NEXUS: USDA APPROACH by Kazeem Oriyomi ABOABA, Akeem Adesina AKAMO, Damilare Michael FADIJI, Tohib Oyeyode OBALOLA

    Published 2020-01-01
    “…The result of the information function revealed that the scale is adaptable for this study. …”
    Get full text
    Article
  12. 2772

    Recombinant Tissue Plasminogen Activator Induces Neurological Side Effects Independent on Thrombolysis in Mechanical Animal Models of Focal Cerebral Infarction: A Systematic Review... by Mei-Xue Dong, Qing-Chuan Hu, Peng Shen, Jun-Xi Pan, You-Dong Wei, Yi-Yun Liu, Yi-Fei Ren, Zi-Hong Liang, Hai-Yang Wang, Li-Bo Zhao, Peng Xie

    Published 2016-01-01
    “…Subgroup analysis, meta-regression and sensitivity analysis were performed to explore sources of heterogeneity. Funnel plot, Trim and Fill method and Egger's test were obtained to detect publication bias.…”
    Get full text
    Article
  13. 2773
  14. 2774

    Hybridization in Metal Wire Additive Manufacturing: A Case Study of an Impeller by Shahu R. Karade, Siddhartha Siddhartha, Neel Kamal Gupta, Ganesan G, K. P. Karunakaran, Henning Zeidler

    Published 2025-01-01
    “…Additive manufacturing (AM) has evolved to enable the direct production of functional components through the hybridization of additive and subtractive processes. …”
    Get full text
    Article
  15. 2775
  16. 2776
  17. 2777

    ALTERNATIVE HISTORY GENRE IN THE FINE LITERATURE. THE ROLE OF EUROPEAN MYTH IN CRYPTOHISTORICAL WRITING by Antonina V. Anistratenko.

    Published 2022-12-01
    “…The article is devoted to the Alternative History (AH) genre in fiction and function of the “European Myth” in cryptohistorical writing. …”
    Get full text
    Article
  18. 2778
  19. 2779

    Leaf water uptake strategy of plants in the arid and semi-arid region of Ningxia by CHEN Lin, YANG Xinguo, SONG Naiping, YANG Mingxiu, XIAO Xupei, WANG Xing

    Published 2013-09-01
    “…Our objective was to investigate whether the plant leaf can uptake the rainfall that can not be absorbed by plant roots, and to understand leaf water uptake strategy, the relationship between leaf water uptake capability and plant ecological functional types in the arid and semi-arid region of Ningxia.The leaf water uptake content (LWUC), percentage increase in leaf water content (RW), chlorophyll content (ChlC), leaf water saturation deficit (WSD), specific leaf area (SLA) and leaf dry matter content (LDMC) of 50 plants were measured, and patterns of leaf traits were investigated to detect their difference among functional groups and relationships between each trait. …”
    Get full text
    Article
  20. 2780

    On Power-Off Temperature Attacks Potential Against Security Sensors by Maryam Esmaeilian, Vincent Beroulle, David Hély

    Published 2025-03-01
    “…Although numerous security sensors and attack detectors have been proposed in the literature to detect different sources of FIAs, it is crucial to ensure that these mechanisms themselves have not been tampered. …”
    Get full text
    Article