Suggested Topics within your search.
Suggested Topics within your search.
-
1661
MANAGEMENT OF INNOVATIVE DEVELOPMENT OF ENTERPRISES IN THE CONTEXT OF A CHOICE OF ENERGY SECURITY STRATEGY
Published 2018-09-01“…The following results were obtained: defined the main selection criteria of energy security strategy of enterprise; the author’s interpretation of the concept "energy security strategy of enterprise" is proposed, which is based on the vector of innovative development of enterprise in the field of energy security, which is aimed at rational and efficient use of energy and natural energy resources for achievement of strategic innovation aimed goals of energy policy; a structure for the energy security monitoring of enterprise has been formed and the main tasks of the enterprise’s energy security subdivision have been defined. …”
Get full text
Article -
1662
Big data in visual field testing for glaucoma
Published 2024-09-01“…In this study, we review the use of big data for evaluating the reliability of VF tests, gaining insights into real-world clinical practices and outcomes, understanding new disease associations and risk factors, characterizing the patterns of VF loss, defining the structure–function relationship of glaucoma, enhancing early diagnosis or earlier detection of progression, informing clinical decisions, and improving clinical trials. …”
Get full text
Article -
1663
Antioxidant Activity and Potential Bioactive Peptides from Skin Protein Hydrolysate of Yellowfin Tuna (<I>Thunnus albacares</I>)
Published 2023-04-01“…FPH possesses a molecular weight of 10.15-48.50 kDa. Functional groups detected were amides A, B, I, II, and III. …”
Get full text
Article -
1664
Global research trends in Chinese medicine for the treatment of non-alcoholic fatty liver disease (NAFLD): A bibliometric study
Published 2025-03-01“…Additionally, expanding the data sources for further analysis is crucial. However, this study has limitations, including reliance on a limited selection of databases and keywords from Web of Science, which may not capture all relevant literature, and the potential bias in the bibliometric analysis.…”
Get full text
Article -
1665
Energy Trading in Local Energy Markets: A Comprehensive Review of Models, Solution Strategies, and Machine Learning Approaches
Published 2024-12-01“…This classification examines various algorithms for energy transactions considering the agent type, learning methods, policy, state space, action space, and action selection for state, action, and reward function outputs. …”
Get full text
Article -
1666
Identification of Ecological Security Pattern and Ecological Restoration Zoning Strategy in the Shandong Section of the Beijing-Hangzhou Grand Canal
Published 2025-02-01“…The area was divided into five core functional zones. (4) Conclusions: Establishing ecological function zones and considering landscape changes from high-frequency human activities in spatial planning can lead to a more reasonable division of ecological restoration areas. …”
Get full text
Article -
1667
DMYTRО DONTSOV’S TEXTS IN THE ASPECT OF CORPUS LINGUISTICS AND LEXICOGRAPHY
Published 2024-12-01“…Through the use of large-scale empirical data and advanced computer technologies to reach objective insights into language function, linguistic corpora have quickly become invaluable resources. …”
Get full text
Article -
1668
-
1669
Genome‐wide association study identifies QTL and candidate genes for grain size and weight in a Triticum turgidum collection
Published 2025-03-01“…Identifying loci controlling grain‐related traits will provide information on the genetic resources available to breeders to improve grain yield, as well as the opportunity to develop close gene markers to be used in marker‐assisted selection programs.…”
Get full text
Article -
1670
Optimization of Cross-Border e-Commerce Logistics Supervision System Based on Internet of Things Technology
Published 2021-01-01“…First of all, the framework adopts the national certification center to supervise the logistics service platform and logistics service platform to supervise the logistics participants of the secondary supervision system. Then, functions such as swarm intelligence contract, legal anonymous identity authentication, intelligent transaction matching, abnormal data analysis and detection, privacy protection, and traceability are realized under the framework of the supervision system. …”
Get full text
Article -
1671
MODULATION AS A MULTIMODAL TRANSLATION STRATEGY OF GRAPHIC NOVEL PERSEPOLIS BY M. SATRAPI
Published 2025-06-01“…It shows that these techniques function within the broader framework of the modulation strategy, facilitating the pragmatic adaptation of the original text. …”
Get full text
Article -
1672
Bacterial communities associated with ambrosia beetles: current knowledge and existing gaps
Published 2025-04-01Get full text
Article -
1673
From Nutrition to Energy: Evaluating the Role of Rye (<i>Secale cereale</i> L.) Grain in Sustainable Food Systems and Biofuel Applications
Published 2025-06-01“…It can serve as both a food source and a sustainable biofuel, offering a dual-purpose solution within the circular bioeconomy.…”
Get full text
Article -
1674
An Improved Transformation‐Associated Recombination Cloning Approach for Direct Capturing of Natural Product Biosynthetic Gene Clusters
Published 2024-12-01“…ABSTRACT The phylum Actinomycetota and genus Streptomyces in particular are the major source for discovery of natural products with diverse chemical structures and a variety of biological activities. …”
Get full text
Article -
1675
Urinary Exosomes
Published 2009-01-01“…Thus, UE have valuable potential as a source of biomarkers for early detection of various types of diseases, monitoring the disease evolution and/or response to therapy. …”
Get full text
Article -
1676
The implementation of the situational control concept of information security in automated training systems
Published 2016-11-01“…Conditions of practical application of automated learning systems change over time and transform the situation of such a decision, and this leads to the use of situational control methods.When situational control is implementing, task of the protection of information in automated learning system is solved by the subsystem control and protection of information by distributing the processes ensuring the security of information and resources of subsystem elements of the automated learning system to meet changing conditions of operation.When the event, associated with the emergence of threats to the information security related to one of the elements of a situation to a variety of destabilizing factors is checked in the system, the formation of the base of alternative control actions sets of situational management is formed, then the sets of the admissible solutions of the situational control options are formed.The best solution provides an extremum of the objective function of situational control of information security.Results. …”
Get full text
Article -
1677
Net2Brain: a toolbox to compare artificial vision models with human brain responses
Published 2025-05-01“…Finally, the toolbox integrates seamlessly with other established open source libraries, enhancing interoperability and promoting collaborative research. …”
Get full text
Article -
1678
Challenges in osteochondral repair—a critical review
Published 2024-09-01“…This critical review addresses the various challenges in OC tissue repair, including (i) anatomical complexities, (ii) biological approaches to restoring the OC interface, and material selection, (iii) cell sources for reconstruction, and (iv) recreating a coordinated microenvironment. …”
Get full text
Article -
1679
Conceptual Development of Urban Super-blocks Model in Urban Planning Based on Content Analysis Method
Published 2024-09-01“…The statistical community includes various sources including articles, books, and theses, which were used to select the sources using available and snowball sampling methods. …”
Get full text
Article -
1680
Research note: Application of convolutional neural networks for feather classification in chickens
Published 2025-11-01Get full text
Article