Search alternatives:
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 381 - 400 results of 3,741 for search '(( (resources OR resources) utilization function ) OR ( source utilization function ))*', query time: 0.25s Refine Results
  1. 381
  2. 382
  3. 383
  4. 384
  5. 385

    Phosphorus Utilization Efficiency Among Corn Era Hybrids Released over Seventy-Five Years by Kwame Ampong, Chad J. Penn, James Camberato, Daniel Quinn, Mark Williams

    Published 2025-06-01
    “…While the PU<i>t</i>E did not necessarily change as a function of the breeding period, there were differences between hybrids. …”
    Get full text
    Article
  6. 386
  7. 387
  8. 388
  9. 389

    A novel lightweight hybrid cryptographic framework for secure smart card operations by Kranthi Kumar Singamaneni

    Published 2025-05-01
    “…Based on the experimental outcomes, the proposed hybrid crypto standard is well-suited for lightweight and resource constrained environments such as smart card and IoT applications, posing better performance, low energy utilization, and robust post-quantum security.…”
    Get full text
    Article
  10. 390
  11. 391

    Addressing genome scale design tradeoffs in Pseudomonas putida for bioconversion of an aromatic carbon source by Deepanwita Banerjee, Javier Menasalvas, Yan Chen, Jennifer W. Gin, Edward E. K. Baidoo, Christopher J. Petzold, Thomas Eng, Aindrila Mukhopadhyay

    Published 2025-01-01
    “…However, sustainable feedstocks pose a challenge due to incomplete high-resolution metabolic data for non-canonical carbon sources required to curate GSMM and identify implementable designs. …”
    Get full text
    Article
  12. 392

    Service Restoration in Distribution Networks by Optimal Scheduling of Repair Crew and Mobile Power Sources by Qasem Asadi, Hamid Falaghi, Ali Ashoornezhad, Maryam Ramezani

    Published 2024-03-01
    “…Power distribution utilities need to have an effective and suitable service restoration (SR) plan to reconnect customers quickly after power outages. …”
    Get full text
    Article
  13. 393

    A Review: Using Ionic Liquids for Lignin Extraction from Lignocellulose and High-Value Utilization by Xinyu Li, Jiming Yang, Wei He, Shuangfei Zhao, Zheng Fang, Kai Guo, Yuguang Li

    Published 2025-06-01
    “…Additionally, it briefly discusses the applications of ionic liquids in the high-value utilization of lignin, including lignin depolymerization, modification, the preparation of lignin-based functional materials, and biofuels. …”
    Get full text
    Article
  14. 394
  15. 395

    A Comprehensive Review on Organic Waste Compost as an Effective Phosphorus Source for Sustainable Agriculture by Lady Johanna Boh´orquez-Sandoval, Jos´e Francisco Garc´ıa-Molano, Jos´e Antonio Pascual-Valero, Margarita Ros-Mu˜noz

    Published 2024-08-01
    “…For this reason, this review focused on analyzing various research studies where Organic Waste is utilized to release available phosphorus and thus improve agricultural production. …”
    Get full text
    Article
  16. 396

    A review on polycyclic aromatic hydrocarbons: Source, environmental impact, effect on human health and by Hussein I. Abdel-Shafy, Mona S.M. Mansour

    Published 2016-03-01
    “…Metabolism of PAHs occurs via the cytochrome P450-mediated mixed function oxidase system with oxidation or hydroxylation as the first step. …”
    Get full text
    Article
  17. 397
  18. 398

    Anomaly Usage Behavior Detection Based on Multi-Source Water and Electricity Consumption Information by Wenqing Zhou, Chaoqiang Chen, Qin Yan, Bin Li, Kang Liu, Yingjun Zheng, Hongming Yang, Hui Xiao, Sheng Su

    Published 2025-01-01
    “…Hence, this paper proposes a method to detect abnormal residential water and electricity usage by incorporating multi-source information. Specifically, the correlation between water and electricity usage of residential customers is analyzed based on real metering data and the use of the Copula distribution function, followed by the integration of two innovative data mining techniques to form an anomaly detection framework. …”
    Get full text
    Article
  19. 399
  20. 400