Showing 20,921 - 20,940 results of 22,124 for search 'stOrk~', query time: 2.06s Refine Results
  1. 20921

    Lest we remember? Recollection of the Boer War and Great War in Ireland by Ciarán WALLACE

    Published 2012-12-01
    “…Using submerged memories in the built environment the article reflects on the space between remembering and forgetting; that national attic where histories are stored – just in case they are ever needed.…”
    Get full text
    Article
  2. 20922

    Diversification and recurrent adaptation of the synaptonemal complex in Drosophila. by Rana Zakerzade, Ching-Ho Chang, Kamalakar Chatla, Ananya Krishnapura, Samuel P Appiah, Jacki Zhang, Robert L Unckless, Justin P Blumenstiel, Doris Bachtrog, Kevin H-C Wei

    Published 2025-01-01
    “…Here, we exhaustively examine the evolutionary history of the SC in Drosophila taking a comparative phylogenomic approach with high species density to circumvent obscured homology due to rapid sequence evolution. Contrasting starkly against other genes involved in meiotic chromosome pairing, SC genes show significantly elevated rates of coding evolution due to a combination of relaxed constraint and recurrent, widespread positive selection. …”
    Get full text
    Article
  3. 20923
  4. 20924

    Seed quality evaluation in the collection of Cyamopsis tetragonoloba after long-term storage under uncontrolled conditions by N. V. Rakovskaya, O. N. Zabegayeva, E. A. Dzyubenko

    Published 2020-01-01
    “…After more than 40 years of storage, the guar accessions did not entirely lost their viability under laboratory and field conditions. …”
    Get full text
    Article
  5. 20925

    Molecular genetic bases of seed resistance to oxidative stress during storage by N. A. Shvachko, E. K. Khlestkina

    Published 2020-08-01
    “…About 90 % of the world’s crop genetic diversity is stored as seeds in genebanks. During storage seeds suffer physiological stress consequences, one of which is the accumulation of free radicals, primarily reactive oxygen species (ROS). …”
    Get full text
    Article
  6. 20926

    Establishment of a Comprehensive Platform for Sustained Delivery of Yoga Therapy for Sickle Cell Anemia in Rural and Remote Tribal Pocket in India by Thota Neeraja, Ramesh Nanjundaiah Mavathur, Himanshu Anirudhbhai Shukla, Manmath Gharote

    Published 2024-12-01
    “…The center also captures and stores medical health records, updated on regular basis, which is of great value to the government in deciding and designing policies.…”
    Get full text
    Article
  7. 20927

    Critical Conditions and Energy Transfer Characteristics of the Failure Process of Coal-Rock Combination Systems in Deep Mines by Haitao Sun, Linchao Dai, Yanbao Liu, Hongwei Jin

    Published 2021-01-01
    “…When the coal–rock combination structure failed, the rock strain reached its maximum value and the strain rebound phenomenon occurred. The stored elastic strain energy released by the rock into the combination system accounted for 26% to 53% of the accumulated energy in the rock itself, and the released elastic energy and the new surface area of the crushed coal sample followed a logarithmic relationship. …”
    Get full text
    Article
  8. 20928

    Machine Learning Models for Spring Discharge Forecasting by Francesco Granata, Michele Saroli, Giovanni de Marinis, Rudy Gargano

    Published 2018-01-01
    “…Considering that most of the world’s unfrozen freshwater reserves are stored in aquifers, the capability of prediction of spring discharges is a crucial issue. …”
    Get full text
    Article
  9. 20929

    Effect of rennet on buffalo cheese microbiota, taste and flavor by Angela M. I. Montone, Angelo Citro, Germana Colarusso, Francesca Garofalo, Rubina Paradiso, Giorgia Borriello, Domenico Vecchio, Federico Capuano

    Published 2023-11-01
    “…Buffalo milk was used to produce cheeses through a single cheesemaking session, where the only difference was the rennet used: commercial calf or artisanal lamb. Cheeses were stored and analyzed monthly at T0, T30, T60, and T90. …”
    Get full text
    Article
  10. 20930

    Determination of Urinary Neutrophil Gelatinase-Associated Lipocalin (uNGAL) Reference Intervals in Healthy Adult and Pediatric Individuals Using a Particle-Enhanced Turbidimetric I... by Tabari M. Baker, Christopher A. Bird, Dennis L. Broyles, Ursula Klause

    Published 2025-01-01
    “…Specimens were temporarily stored at room temperature or 2–8 °C, then transferred into urinalysis tubes before being frozen and shipped for testing. uNGAL testing was performed using the ProNephro AKI (NGAL) immunoassay on a Roche cobas c501 analyzer. …”
    Get full text
    Article
  11. 20931

    Memahami Perjalanan "Kampung Cyber" Melalui Lensa Actor Network Theory by Alfandya Alfandya, Fathul Wahid

    Published 2021-11-01
    “…One of the main challenges in ICT4D project is gaining the trust of the community and ensuring its sustainability. This paper presents stories from ICT4D project implementation through the lens of Actor Network Theory (ANT). …”
    Get full text
    Article
  12. 20932
  13. 20933

    The Effect of Sandblast and Plasma Surface Treatment of Titanium Abutment on Tensile Bond Strength with Ultra-translucent Zirconia Crown: A Comparative Study by Amani Abduljabar Altaie, Emad Farhan Alkhalidi

    Published 2024-12-01
    “…Forty zirconia crowns fabricated with CAD/CAM system and all crowns cemented to titanium abutment with Allcem resin cement dual cure, then stored in (5000) cycles of thermocycling between (5c-55c) degree, after that all samples evaluated it is tensile bond strength with universal testing machine. …”
    Get full text
    Article
  14. 20934

    Digging for clues: Stick tools used for honey digging in a second community of ‘forest fragment chimpanzees’ outside the Budongo and Bugoma Forests, Uganda by Matthew R. McLennan, Georgia A. Lorenti, Simon Mugenyi, Jonan Muganzi, Jacqueline Rohen

    Published 2020-07-01
    “…Some chimpanzee populations use sticks to dig out subterranean nests of stingless bees (Meliponini) to access the underground honey stores, a tool-assisted foraging behaviour referred to here as ‘honey digging’. …”
    Get full text
    Article
  15. 20935

    Specifying Satellite Drag Through Coupled Thermosphere‐Ionosphere Data Assimilation of Radio Occultation Electron Density Profiles by Nicholas Dietrich, Tomoko Matsuo, Chih‐Ting Hsu

    Published 2022-08-01
    “…Empirical thermospheric models are often used to estimate neutral densities but they struggle to forecast neutral densities during geomagnetic storms when they are highly variable. Physics‐based models are thus increasingly turned to for their ability to describe the dynamical evolution of neutral densities. …”
    Get full text
    Article
  16. 20936

    The longevity of two types of cereal carriers for rodenticide baits under adverse environmental conditions by Blažić Tanja, Živković Mirko, Stojnić Bojan, Jokić Goran

    Published 2024-01-01
    “…The protection of quality and safety of stored products requires adequate and regular measures of protection from harmful rodents. …”
    Get full text
    Article
  17. 20937

    Knowledge, Attitude, Practice, and Adherence to Antiretroviral Therapy among People Living with HIV in Nepal by Sweta Shrestha, Subodh Chataut, Badri Kc, Khagendra Acharya, Sait Kumar Pradhan, Sunil Shrestha

    Published 2023-01-01
    “…Half of the participants (50.3%) revealed that they had surreptitiously stored their ART medication, diverging from the recommended storage guidelines. …”
    Get full text
    Article
  18. 20938

    Effect of HTST Thermal Treatments on End-Use Quality Characteristics of Goat Milk by B. D. Rohitha Prasantha, K. M. S. Wimalasiri

    Published 2019-01-01
    “…Goat milk samples were pasteurized at high-temperature (72°C, 75°C, and 81°C) and in short-time (15 s and 25 s) combinations. Physical, chemical and microbial qualities of the pasteurized milk samples were evaluated 0, 2, 3, and 4 weeks of storage at 4°C. …”
    Get full text
    Article
  19. 20939
  20. 20940

    Overview of blockchain assets theft attacks and defense technology by Beiyuan YU, Shanyao REN, Jianwei LIU

    Published 2023-02-01
    “…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
    Get full text
    Article