Showing 11,981 - 12,000 results of 15,262 for search 'stOrk~', query time: 2.08s Refine Results
  1. 11981

    Population biology of European hake (Merluccius merluccius, Linnaeus, 1758) in Greece by Alexandros Theocharis, Maria Vlachou, Alexis Conides, Dimitris Klaoudatos

    Published 2023-11-01
    “…Results indicate the need for enforcement of stricter management measures to protect the stock.…”
    Get full text
    Article
  2. 11982

    “We are Performance Philosophy Problems” by Janet Gibson, Kate Maguire-Rosier, Tony McCaffrey

    Published 2024-12-01
    “…Two separate pieces form a response to Maoilearca’s question: one from McCaffrey and the other from Maguire-Rosier and Gibson, all participants of the KeyGroup. McCaffrey starts  and ends with videos of performance (and transcription). …”
    Get full text
    Article
  3. 11983

    Systematic content analysis of self-help smokeless tobacco cessation smartphone applications available in India by Nishant Nishant, Arpit Gupta, Richa Shrivastava, Arpita Rai, Diptajit Das, Ashima Goyal

    Published 2024-07-01
    “…Materials and methods: A systematic search of SLT cessation smartphone apps freely available in the Google PlayStore was conducted using nine relevant search terms, and the first fifty apps under each search term were identified. …”
    Get full text
    Article
  4. 11984

    A Novel Approach for Portfolio Optimization Using Fuzzy AHP Based on Gustafson Kessel Clustering Algorithm by Yeşim Akbaş, Türkan Erbay Dalkılıç, Serkan Akbaş

    Published 2024-12-01
    “…In this context, a preliminary reduction step is applied to the stocks using the Gustafson-Kessel (GK) algorithm, a fuzzy clustering method, to select portfolio stocks. …”
    Get full text
    Article
  5. 11985

    Chitosan-DNA nanoparticles: synthesis and optimization for long-term storage and effective delivery by Aigul Raimbekova, Ulpan Kart, Akbayan Yerishova, Timur Elebessov, Sergey Yegorov, Tri Thanh Pham, Gonzalo Hortelano

    Published 2025-01-01
    “…However, most CsNP synthesis protocols are not optimized to allow long-term storage of CsNPs without loss of function. Here, we describe a protocol for CsNP synthesis, lyophilization, and sonication, to store CsNPs and maintain transfection efficiency. …”
    Get full text
    Article
  6. 11986

    The Multifaceted Contributions of Community-Based Breeding Program of Bonga Sheep to Flock Dynamics, Animal Performance, and Socio-economic Benefits of Beneficiaries in Kafa Zone,... by Metsafe Mamiru, Aberra Melesse, Aynalem Haile, Tesfaye Getachew

    Published 2024-01-01
    “…They also acquired more income by 60%, which enabled them to store assets and fulfill routine home needs better than non-members. …”
    Get full text
    Article
  7. 11987

    Nipah Virus: A Zoonotic Threat Re-Emerging in the Wake of Global Public Health Challenges by Francesco Branda, Giancarlo Ceccarelli, Marta Giovanetti, Mattia Albanese, Erica Binetti, Massimo Ciccozzi, Fabio Scarpa

    Published 2025-01-01
    “…As the global community grapples with an increasing number of emerging infectious diseases, the Nipah virus stands as a stark reminder of the importance of coordinated surveillance, rapid containment measures, and the urgent development of novel strategies to mitigate the impact of this re-emerging threat.…”
    Get full text
    Article
  8. 11988

    DLCDroid an android apps analysis framework to analyse the dynamically loaded code by Rati Bhan, Rajendra Pamula, K Susheel Kumar, Nand Kumar Jyotish, Prasun Chandra Tripathi, Parvez Faruki, Jyoti Gajrani

    Published 2025-01-01
    “…We evaluate DLCDroid’s performance using a dataset comprising real-world benign and malware apps from reputed repositories like VirusShare and the Google Play Store. Compared to state-of-the-art approaches, the results indicate a significant improvement in detecting sensitive information leaks, more than 95.6% caused by reflection API. …”
    Get full text
    Article
  9. 11989

    Design and Development of a Wayside AI‐Assisted Vision System for Online Train Wheel Inspection by Muhammad Zakir Shaikh, Sanaullah Mehran, Enrique Nava Baro, Agata Manolova, Mohammad Aslam Uqaili, Tanweer Hussain, Bhawani Shankar Chowdhry

    Published 2025-01-01
    “…ABSTRACT Wayside inspection of rolling stock has been around for some time and wheel impact load and fiber‐grating sensors are actively explored for getting high‐fidelity data. …”
    Get full text
    Article
  10. 11990

    Multidimensional free shape-morphing flexible neuromorphic devices with regulation at arbitrary points by Jiaqi Liu, Chengpeng Jiang, Qianbo Yu, Yao Ni, Cunjiang Yu, Wentao Xu

    Published 2025-01-01
    “…These properties stem from densely-packed, hydrophilic nanometer-sized channels, and the erection of a high-entropy, intricately silver nanowires to capture and store of hydrated cations. Leveraging the remarkable deformation effect, we demonstrate hazard detection-avoidance robot, and multidimensional integration for arbitrary programmed shapes like 360° panoramic information capture and soft-bodied biological deformations wherein localized responses to stimuli are harmoniously integrated to achieve arbitrary coordinated motion. …”
    Get full text
    Article
  11. 11991

    Cross-Chain Identity Authentication Method Based on Relay Chain by Qipeng Huang, Minsheng Tan, Wenlong Tian

    Published 2025-01-01
    “…Additionally, to comply with General Data Protection Regulation (GDPR) principles, we store the user keys from the relay chain in distributed servers using the InterPlanetary File System (IPFS). …”
    Get full text
    Article
  12. 11992

    Development of Vegetative Propagation Strategies for Balanites aegyptiaca in the Sahel, Niger by Moussa Massaoudou, Rabiou Habou, Zounon Christian Serge Félix, Abasse Tougiani, Patrick Van Damme

    Published 2022-01-01
    “…As for air-layering, stems with large diameters react better (53.3%) than those with small diameters (46.6%) because they have thicker bark and store a large amount of elaborate sap responsible for rhizogenesis. …”
    Get full text
    Article
  13. 11993
  14. 11994

    A Comparison of Penguin Swarm Optimization Algorithms for Enhancing Network Throughput by Talha Akhtar, Najmi Ghani Haider, Nadeem Kafi Khan, Rashid Uddin

    Published 2024-12-01
    “…With its ability to deliver computing and storage resources at the network's edge, close to device terminals and users, edge computing is an evolving distributed computing approach well-suited for facilitating extensive management of smart devices in the future smart grid. …”
    Get full text
    Article
  15. 11995

    Enhancement of a SWIPT Based Amplify and Forward Cooperative Relaying Protocol for Wireless Communication System by Festus Kehinde Ojo, Nafiu Olayiwola Akintoye, Samson Iyanda Ojo, Oluwatobi Omolola Oyedokun

    Published 2025-02-01
    “…The first fraction that is , was used for energy harvesting by making it to pass through energy harvester device to scavenge energy and store in the power storage. The remaining fraction that is, , was made to pass through spectral subtraction and amplify using relay gain before forwarded to the destination during second hop transmission. …”
    Get full text
    Article
  16. 11996

    Directions for improving the legal regulation of forensic DNA analysis in Ukraine in the context of integration into the European Union by R. L. Stepaniuk, V. V. Kikinchuk

    Published 2022-06-01
    “…It has been established that the general European legislation defines recommendations on the general principles of using DNA analysis within the framework of the criminal justice system, establishes the obligation of each state to create and maintain a national DNA database, exchange information based on DNA databases, take measures to protect personal data, store DNA profiles of persons convicted of sexual offenses against children, to accredit forensic laboratories to ensure the proper quality of molecular genetic research. …”
    Get full text
    Article
  17. 11997

    Immune-Boosting and Antiviral Effects of Antioxidants in COVID-19 Pneumonia: A Therapeutic Perspective by Stefano Sanduzzi Zamparelli, Alessandro Sanduzzi Zamparelli, Marialuisa Bocchino

    Published 2025-01-01
    “…Moreover, antioxidants may work synergistically with standard antiviral treatments to reduce viral-induced oxidative damage. …”
    Get full text
    Article
  18. 11998

    Methods of state support of real estate market and its classification by O. P. Kuznetsova, D. Yu. Smirnov, V. V. Kuznetsov

    Published 2019-05-01
    “…As a result the state simultaneously solves tasks of providing housing to the population, the expansion of the banking sector through the growth of mortgage loans and the increase of the stock market capitalization through the issuance of mortgage-backed securities, but not only anti-crisis stimulation of the construction industry. …”
    Get full text
    Article
  19. 11999

    Measuring the Temperature and Stress-Strain States of a Tube Sample under the Local Stochastic Temperature Pulsations by S. M. Dmitriev, R. R. Ryazapov, A. V. Mamaev, A. E. Sobornov, A. V. Kotin, M. A. Legchanov, A. V. Lvov

    Published 2019-03-01
    “…Temperature pulsations produced by mixing non-isothermal coolant flows with high temperature gradient are most dangerous. This work is an experimental study of temperature and stress-strain state of a tube sample under local stochastic temperature pulsations caused by mixing of coolant flows.To solve the problems posed, a Y-junction with «counter injection» was built, which was included in the thermal-hydraulic research facility. …”
    Get full text
    Article
  20. 12000

    A Review on Person Re-Identification Techniques and Its Analysis by C. Selvan, H. Anwar Basha, K. Meenakshi, Soumyalatha Naveen

    Published 2025-01-01
    “…Over the past few years, the realm of deep learning applied to video re-ID has consistently delivered remarkable outcomes on public datasets, showcasing a range of innovative strategies devised to tackle the array of issues encountered in video re-ID. In stark contrast to image-based re-ID, video re-ID stands out as significantly more intricate and demanding. …”
    Get full text
    Article