Showing 941 - 960 results of 3,741 for search '(( (resources OR resources) utilization function ) OR ( (source OR sources) utilization function ))', query time: 0.25s Refine Results
  1. 941
  2. 942
  3. 943
  4. 944

    Structural and functional characterization of a novel GmKASII-A allele associated with saturated fatty acid composition in EMS-induced mutant PE1544 by Kihwan Kim, Jiyoung Park, Nabachwa Norah, Sooyeon Kim, Hyun Jo, Jong Tae Song, Jeong-Dong Lee

    Published 2025-07-01
    “…Results This study aimed to elucidate the protein structure and functional characterization of a novel allele of KASII-A derived from an EMS-induced mutant line and assess its potential as a genetic resource for developing soybean cultivars with elevated saturated fatty acid composition. …”
    Get full text
    Article
  5. 945

    GLN2 as a key biomarker and therapeutic target: evidence from a comprehensive pan-cancer study using molecular, functional, and bioinformatic analyses by Shuang Gao, Lei Zhang, Guoping Sun

    Published 2024-11-01
    “…However, its expression and function in different types of tumors are not well understood. …”
    Get full text
    Article
  6. 946
  7. 947
  8. 948
  9. 949
  10. 950

    Status Identification and Restoration Zoning of Ecological Space in Maowusu Sandy Land Based on Temporal and Spatial Characteristics of Land Use by Tiejun Zhang, Peng Xiao, Zhenqi Yang, Jianying Guo

    Published 2025-06-01
    “…Low-importance and low-sensitivity zones account for the smallest proportion, in which ecosystem protection, near-natural restoration, and moderate development and utilization should be carried out. This study aims to provide a scientific basis for reasonably protecting natural ecological resources and promoting the healthy and ordered development of natural ecosystems.…”
    Get full text
    Article
  11. 951
  12. 952

    Spatio-temporal dynamics of ecosystem service value functions in response to landscape fragmentation in Boma-Gambella trans-boundary landscape, Southwest Ethiopia and East South Su... by Azemir Berhanu Getahun, Amare Bantider Dagnew, Desalegn Yayeh Ayal

    Published 2025-07-01
    “…Utilizing integrated spatial modeling tools such as ArcGIS 10.7, FRAGSTAT 4.2, and benefit transfer approach, the research analyzes landscape fragmentation and the dynamics of ecosystem service value functions. …”
    Get full text
    Article
  13. 953
  14. 954

    Signal Processing in Passive Radar Systems Using 5G: A Simulation Study by Van Tuan Nguyen, V. M. Kutuzov, E. N. Vorobev

    Published 2024-12-01
    “…Analysis of 5G downlink signal and simulation of signal processing in passive radar with 5G illumination source in different scenarios.Materials and methods. …”
    Get full text
    Article
  15. 955
  16. 956

    Adaptive Cell Scheduling and Negotiation Techniques for 6TiSCH Networks Under Bursty Traffic by Je-Hyeong Lee, Sang-Hwa Chung

    Published 2025-02-01
    “…The first technique, dynamic cell cycle adjustment, dynamically adjusts the cell addition and deletion cycles based on the link quality and packet queue utilization to prevent packet queue overflow and efficiently use limited cell resources. …”
    Get full text
    Article
  17. 957
  18. 958

    Absorption spectra of Nitrazine Yellow indicator. Experimental data and quantum chemical evaluations by Inna Khristenko, Volodymyr Ivanov

    Published 2024-06-01
    “…Quantum chemical modeling of electronically excited states is performed within the framework of time-dependent density functional theory (TD-DFT). A variety of approaches and basis sets are explored, particularly focusing on the B3LYP and CAM-B3LYP functionals. …”
    Get full text
    Article
  19. 959
  20. 960

    Parallelization of Rainbow Tables Generation Using Message Passing Interface: A Study on NTLMv2, MD5, SHA-256 and SHA-512 Cryptographic Hash Functions by Mark Vainer, Arnas Kačeniauskas, Nikolaj Goranin

    Published 2025-07-01
    “…Rainbow table attacks utilize a time-memory trade-off to efficiently crack passwords by employing precomputed tables containing chains of passwords and hash values. …”
    Get full text
    Article