Showing 36,821 - 36,840 results of 37,577 for search 'Neath~', query time: 1.77s Refine Results
  1. 36821

    Heterologous Expression of a Potential ‘<i>Paulownia fortunei</i>’ MYB Factor Gene, <i>PfMYB90</i>, Improves Salt and Cold Tolerance in <i>Arabidopsis</i> by Hongling Wang, Shizheng Shi, Guijie Luo, Ruifang Huang, Dezong Sui, Yunpeng Gao, Lei Wang

    Published 2024-12-01
    “…The research in this area has not received sufficient attention and depth, which also indicates an important potential direction for future research. …”
    Get full text
    Article
  2. 36822
  3. 36823

    Impact of COVID-19 on the Air Quality over China and India Using Long-term (2009–2020) Multi-satellite Data by Manish Soni, Sunita Verma, Hiren Jethava, Swagata Payra, Lok Lamsal, Priyanshu Gupta, Janhavi Singh

    Published 2020-11-01
    “…Therefore, it is important to further strengthen environmental policies to tackle air quality, human health, and climate change in this part of the world.…”
    Get full text
    Article
  4. 36824

    Evaluate the integrative effects of irrigation water level, furrow irrigation methods, and nitrogen fertilizer rate on tomato yield in semi-arid southern Ethiopia by Edmealem Temesgen Ebstu, Mekuanent Muluneh

    Published 2025-01-01
    “…Additionally, the study examines crop agronomy components such as plant height, number of branches, and root depth in semi-arid Southern Ethiopia. The research employs a factorial and split-plot design. …”
    Get full text
    Article
  5. 36825

    Clinical Epidemiological Characteristics and Risk Factors for Severe Bronchiolitis Caused by Respiratory Syncytial Virus in Vietnamese Children by Sang Ngoc Nguyen, Thuy Ngoc Thi Nguyen, Lam Tung Vu, Thap Duc Nguyen

    Published 2021-01-01
    “…The disease is caused by respiratory syncytial virus (RSV) infection, which can cause breathing difficulties and respiratory failure. Therefore, it is necessary to discover the risk factors of severe bronchiolitis to diagnose and treat promptly. …”
    Get full text
    Article
  6. 36826

    Challenges and opportunities in implementing and enforcing India's loose cigarette sales ban: A qualitative stakeholder analysis. by Mayank Sakhuja, Daniela B Friedman, Mark M Macauda, James R Hebert, Mangesh S Pednekar, Prakash C Gupta, James F Thrasher

    Published 2024-01-01
    “…Participants included representatives from various government departments such as police, municipal corporations, FDA, health, and civil society organizations / NGOs such as Vital Strategies, World Health Organization, International Union against Tuberculosis and Lung Disease, and local NGOs. …”
    Get full text
    Article
  7. 36827

    Falls and balance impairment; what and how has this been measured in adults with joint hypermobility? A scoping review by Yiduo Wang, Paul H. Strutton, Caroline M. Alexander

    Published 2025-01-01
    “…The underlying mechanisms driving poor balance have not been explored in depth.…”
    Get full text
    Article
  8. 36828

    Colonial legacy and traps in the social-ecological systems of forest management by C.D.A. Depari

    Published 2024-10-01
    “…The concept of the rigidity trap pertains to a reforestation strategy that utilized laborers and territories for ecological conservation, restricted local communities from utilizing forests, and diminished biodiversity by favoring the introduction of non-native Acacia decurrens.CONCLUSION: To address traps, this study recommends the need to use a panarchy approach that facilitates a comprehensive understanding of social-ecological systems and to transfer governance to local people which must be based on an in-depth understanding of the local history, knowledge, and cultures.…”
    Get full text
    Article
  9. 36829

    Failure Mechanisms and the Control of a Longwall Face with a Large Mining Height within a Shallow-Buried Coal Seam by Haijun Wang, Yingjie Liu, Yuesong Tang, Hao Gong, Guoliang Xu

    Published 2021-01-01
    “…Experiments using physical models representing different mining heights have been carried out and showed that the horizontal displacement increases from 6 to 12 mm and load-bearing capacity decreases from 20 to 7.9 kN when the coal wall increases in height from 3 to 9 m. Furthermore, failure depth and failure height show an increasing trend. …”
    Get full text
    Article
  10. 36830

    High-intensity focused ultrasound: an innovative approach for micro-manipulation of demineralized dentine by Sheetal Maria Rajan, Barsha Shrestha, Amr Fawzy

    Published 2025-01-01
    “…Confocal microscopy of Rhodamine-B stained ACSD (n = 5/group) quantified the depth of dentine microscale removal post-HIFU exposure in a time-dependent manner. …”
    Get full text
    Article
  11. 36831

    New Media Marketing Strategy Optimization in the Catering Industry Based on Deep Machine Learning Algorithms by Zikang Peng

    Published 2022-01-01
    “…With the in-depth development of new-generation network technologies such as the Internet, big data, and cloud intelligence, people can obtain massive amounts of information on mobile phones or mobile platforms. …”
    Get full text
    Article
  12. 36832

    The Dynamic Damage Mechanisms and Failure Modes of Coal-Rock Masses under the Action of High Order P-Waves by Feng Li, Mingxin Bi, Jing Tian, Shuhao Fang

    Published 2018-01-01
    “…In the process of deep mining, the coal-rock masses were subjected to different types’ disturbance of dynamic loading, and they propagated to the depth of coal and rock in the forms of stress waves. …”
    Get full text
    Article
  13. 36833

    Effects of rosemary extract and its residue on production, immune performance, and gut microbiota in geese by Yuzhi Huang, Lanmeng Xu, Hang He, Lijuan Peng, Qinfeng Liao, Kun Wan, Simeng Qin, Lijing Cao, Jie Zhang

    Published 2025-01-01
    “…Compared with RE treatment, those in the RR treatment had significantly higher duodenal and jejunum relative lengths, aspartate aminotransferase, uric acid, total cholesterol, and low-density lipoprotein levels, and decreased chest depth, chest angle, neck length, semi-eviscerated and eviscerated weights, crude protein digestibility, and levels of globulin, triglyceride, and lysozyme (p &lt; 0.05). …”
    Get full text
    Article
  14. 36834

    Modeling vegetation density with remote sensing, normalized difference vegetation index and biodiversity plants in watershed area by R.Z. Ekaputri, T. Hidayat, H.K. Surtikanti, W. Surakusumah

    Published 2024-10-01
    “…Within the Bengkulu watershed area, a total of 49 tree species from 22 families were identified, with diversity indices falling within the moderate category.CONCLUSION: An in-depth knowledge of the ecological factors and plant preservation initiatives in the Bengkulu watershed can greatly aid in sustainable environmental management and help policymakers develop more effective policies for ensuring environmental sustainability. …”
    Get full text
    Article
  15. 36835

    Distribution Pattern of Cadmium in the Profile of Shallow Fissure Soil and Its Influencing Factors in Karst Areas with High Geological Background by FAN Pingping, CHEN Jia, ZHANG Feng, NIU Yong, FANG Nufang, WU Zeyan, CAI Huayin

    Published 2024-12-01
    “…The average Cd concentration was 2.99 mg/kg, the concentration was high at 0—20 cm and gradually decreased with increasing soil depth, and Cd was predominantly in the reducible form. (3) Total Cd concentration was mainly influenced by soil pH, CEC, clay, silt, and water-stable aggregates, with CEC being the primary controlling factor for the vertical distribution of Cd. (4) The distribution of Cd speciation was controlled by different factors, depending on the form of Cd, with the weak acid-extractable form primarily influenced by organic matter, the reducible form mainly influenced by CEC, the oxidizable form mainly influenced by CEC, clay, and silt, and the residual form mainly influenced by silt content. (5) There was a significant difference in Cd concentration between the soils of funnel-shaped and trapezoidal fissure profiles and the rectangular fissure profile. …”
    Get full text
    Article
  16. 36836

    Overview of blockchain assets theft attacks and defense technology by Beiyuan YU, Shanyao REN, Jianwei LIU

    Published 2023-02-01
    “…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
    Get full text
    Article
  17. 36837

    A Survey on Adversarial Attacks for Malware Analysis by Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Pradip Kunwar, Bhavani Thuraisingham

    Published 2025-01-01
    “…The work presents an in-depth threat model specific to adversarial malware evasion attacks, describing the unique attack surfaces of malware detectors and outlining adversarial goals tailored to the malware domain. …”
    Get full text
    Article
  18. 36838

    Design and Test of Combined Air Suction Cotton Breed Seeder by Yudao Li, Zhanhua Song, Fade Li, Yinfa Yan, Fuyang Tian, Xuezhen Sun

    Published 2020-01-01
    “…It can sow two rows at a time, and the line spacing, plant spacing, and sowing depth can be continuously adjusted to achieve precise sowing. …”
    Get full text
    Article
  19. 36839

    Adsorption characteristics of metronidazole on CoZr-LDH and its GO nanocomposite: Experimental and theoretical study by Edris Jamshidi, Fateme Fathabadi, Faranak Manteghi, Rahime Eshaghimalekshah

    Published 2025-02-01
    “…This approach, known for simulating numerous particle trajectories and statistical averaging, allowed for an in-depth examination of adsorption mechanisms under various conditions. …”
    Get full text
    Article
  20. 36840

    Preliminary Evaluation of Some Engineering Geological Properties of Soils in the New Yenagoa Town, Bayelsa State, Central Niger Delta by PO Youdeowei, HO Nwankwoala

    Published 2013-07-01
    “…The subsurface investigation was undertaken by drilling of ten near the shore drill holes using rotary type drill machine. …”
    Get full text
    Article