Search alternatives:
resource » source (Expand Search)
Showing 1,581 - 1,600 results of 1,810 for search '((( resource OR sourcessss) detection function ) OR ( sources detection function ))', query time: 0.29s Refine Results
  1. 1581
  2. 1582

    Finding RB/Rpi-blb1/Rpi-sto1-like sequences in conventionally bred potato varieties by O. Y. Antonova, N. S. Klimenko, Z. Z. Evdokimova, L. I. Kostina, T. A. Gavrilenko

    Published 2018-09-01
    “…At the same time there is a high probability of finding geno types with the Rpi-sto1 gene (functional homologues of  Rpi-blb1) among conventionally bred varieties because for about 40 years S. stoloniferum has been used in breeding as a source of the Rysto and Ry-fsto genes of the extreme resistance to the most important viral pathogen PVY. …”
    Get full text
    Article
  3. 1583

    Whole-genome sequencing and genomic analysis of four Akkermansia strains newly isolated from human feces by Wenjing Lu, Biqing Zha, Jie Lyu, Chenxi LingHu, Jing Chen, Sisi Deng, Xiangling Zhang, Liang Li, Guoqing Wang

    Published 2024-12-01
    “…Two annotated regions of secondary metabolite biosynthesis genes, both belonging to Terpene, were detected using the antiSMASH online tool.ConclusionThese findings indicate that the four Akkermansia isolates, which belong to a phylogroup distinct from the model strain DSM 22959, exhibit lower genetic risk and may serve as potential probiotic resources for future research.…”
    Get full text
    Article
  4. 1584

    Improving older people’s experiences and safety at transitions of care: the PACT mixed-methods study including RCT by Jenni Murray, Ruth Baxter, Jane O’Hara, Laura Sheard, Catherine Hewitt, Natasha Hardicre, Charles Vincent, Eirini Oikonomou, Gerry Richardson, Rosie Shannon, Kalpita Baird, Stephen Brealey, Robbie Foy, Laura Mandefield, Sarah Hampton, Ed Breckin, Lubena Mirza, Alfredo Palacios, Sally Moore, Jayne Marran, Jacqui Elliot, Jane Schofield, Alison Cracknell, Beth Woods, Sarah Cockayne, Thomas Mills, Yvonne Birks, Olivia Joseph, Rebecca Lawton

    Published 2025-04-01
    “…Secondary outcomes included: unplanned 60- and 90-day hospital re-admissions; quality of transition; health-related quality of life (EuroQol-5 Dimensions, five-level version); and self-reported healthcare resource use. Data sources National Health Service Secondary Use Services data and Hospital Episodes data for work package 2 and routinely recorded National Health Service acute trust hospital data on re-admissions for work packages 5 and 6. …”
    Get full text
    Article
  5. 1585

    Soil microbial networks’ complexity as a primary driver of multifunctionality in photovoltaic power plants in the northwest region of China by Liuqing Zhao, Sumeng Xu, Sumeng Xu, Jinmei Zhao, Shujuan Chen, Xiaolong Liu, Xiuyuan Zheng, Xiuhui Wang, Zhao Zhu, Fei Gao, Bingzhe Fu, Shuxia Li

    Published 2025-04-01
    “…IntroductionExploiting photovoltaic power generation as a novel source of clean energy has become increasingly common in recent times. …”
    Get full text
    Article
  6. 1586

    LH Gene Cloning, Sequence Feature Analysis and Prokaryotic Expression in Conger myriaster by Yan CHEN, Bao SHI, Chenggang WANG, Wanjun BO, Kewen YAN, Meijun TAO, Xinyu ZHAO, Xiaodong MA

    Published 2025-06-01
    “…Conger myriaster is an economic valuable fishery resources in the seas surrounding China, Korea, and Japan. …”
    Get full text
    Article
  7. 1587

    A survey on the applications of transfer learning to enhance the performance of large language models in healthcare systems by Anmol Rahujo, Daniya Atif, Syed Azeem Inam, Abdullah Ayub Khan, Sajid Ullah

    Published 2025-06-01
    “…This research analyzes different transfer learning methods, including inductive, transductive, and unsupervised techniques, while demonstrating their effectiveness in detecting COVID-19 from chest X-rays and multi-source disease evaluation. …”
    Get full text
    Article
  8. 1588

    Assessment of the capacity of health facilities in preventing and managing non-communicable diseases in selected regions of Somaliland by Opeolu O. Ojo, Omar O Hersi, Ayodele A Falobi, Nura Ali, Lawrence Tan, Yusuf A. Ali

    Published 2025-05-01
    “…Where available, they were either not functional or there is a lack of expertise for effective utilization. …”
    Get full text
    Article
  9. 1589

    Multimodal versus non-contrast computed tomography for assessment of acute ischaemic stroke: the PRACTISE RCT by Keith W Muir, Salwa El Tawil, Alex McConnachie, Alicia Murray, Ian Ford, Grant Mair, Joanna Wardlaw

    Published 2025-06-01
    “…Treatment decision and delivery times, early neurological recovery and day 90 functional outcomes did not differ significantly between groups. …”
    Get full text
    Article
  10. 1590

    LIFE CYCLE ASSESSMENT IN HEALTHCARE SYSTEM OPTIMIZATION. INTRODUCTION by V. Sarancha, K. Vitale, S. Oreskovic, V. Sulyma

    Published 2015-03-01
    “…Various factors and parameters that may influence effectiveness of different sectors in healthcare system are detected. Performance optimization of detected parameters could lead to better system functioning, higher patient safety, economic sustainability and reduce resources consumption.…”
    Get full text
    Article
  11. 1591
  12. 1592
  13. 1593
  14. 1594
  15. 1595

    Genome-wide identification and expression analyses of CYP450 genes in Chrysanthemum indicum by Yuyuan Chen, Tongjun Zhou, Jian Zhong, Yuxian Xu, Peng Zhang, Xiaoyu Yue, Hua Zhang, Ming Sun, Xuehao Fu

    Published 2025-05-01
    “…Conclusions The genome-wide analyses of cytochrome P450 superfamily offers essential genomic resources for functional studies of CiCYP450 genes, and is significant for the molecular breeding of Chrysanthemum.…”
    Get full text
    Article
  16. 1596
  17. 1597
  18. 1598
  19. 1599
  20. 1600

    Survey on Backdoor Attacks on Deep Learning: Current Trends, Categorization, Applications, Research Challenges, and Future Prospects by Muhammad Abdullah Hanif, Nandish Chattopadhyay, Bassem Ouni, Muhammad Shafique

    Published 2025-01-01
    “…Such attacks are usually referred to as Trojan or backdoor attacks and are very stealthy and hard to detect. In this paper, we highlight the complete attack surface that can be exploited to inject hidden malicious functionality (backdoors) in machine learning models. …”
    Get full text
    Article