Results 1 to 10 of about 118,033 (317)

Chicoric Acid: Natural Occurrence, Chemical Synthesis, Biosynthesis, and Their Bioactive Effects

open access: yesFrontiers in Chemistry, 2022
Chicoric acid has been widely used in food, medicine, animal husbandry, and other commercial products because of its significant pharmacological activities. However, the shortage of chicoric acid limits its further development and utilization. Currently,
Min Yang   +16 more
doaj   +1 more source

Genome-wide identification and characterisation of bHLH transcription factors in Artemisia annua

open access: yesBMC Plant Biology, 2023
Background A. annua (also named Artemisia annua, sweet wormwood) is the main source of the anti-malarial drug artemisinin, which is synthesised and stored in its trichomes. Members of the basic Helix-Loop-Helix (bHLH) family of transcription factors (TFs)
Shuwei Chang   +4 more
doaj   +1 more source

Molecular Basis of Prostate Cancer and Natural Products as Potential Chemotherapeutic and Chemopreventive Agents

open access: yesFrontiers in Pharmacology, 2021
Prostate cancer is the second most common malignant cancer in males. It involves a complex process driven by diverse molecular pathways that closely related to the survival, apoptosis, metabolic and metastatic characteristics of aggressive cancer ...
Bingke Bai   +8 more
doaj   +1 more source

Identification of novel flavin-dependent monooxygenase from Strobilanthes Cusia reveals molecular basis of indoles’ biosynthetic logic

open access: yesBMC Plant Biology, 2023
Background Strobilanthes cusia (Nees) Kuntze is a traditional medical plant distributed widely in south China. The indole compounds that originated from the plant are responsible for its pharmacological activities.
Chang Liu   +4 more
doaj   +1 more source

Change Rule of Diatom in Zhangweixin River in Dezhou

open access: yesFayixue Zazhi, 2022
ObjectiveTo study the annual variation of diatoms in Zhangweixin River, to provide theoretical support by using diatom examination to estimate the time and place of the corpse entering water, and to establish a diatom database.MethodsSamples were taken ...
LI Peng   +5 more
doaj   +1 more source

Detection of Alphitobius diaperinus by Real-Time Polymerase Chain Reaction With a Single-Copy Gene Target

open access: yesFrontiers in Veterinary Science, 2022
Use of edible insects as an alternative source of proteins in food and feed is increasing. These last years, numerous companies in Europe have started producing insects for food and feed purposes.
Aline Marien   +9 more
doaj   +1 more source

A Predictive Model to Correlate Amino Acids and Aromatic Compounds in Calabrian Honeys

open access: yesFoods, 2023
To better understand the biochemistry of the organoleptic properties of honey influencing its commercial value, a predictive model for correlating amino acid profiles to aromatic compounds was built.
Sonia Carabetta   +4 more
doaj   +1 more source

A detailed workflow to develop QIIME2-formatted reference databases for taxonomic analysis of DNA metabarcoding data

open access: yesBMC Genomic Data, 2022
Background The DNA metabarcoding approach has become one of the most used techniques to study the taxa composition of various sample types. To deal with the high amount of data generated by the high-throughput sequencing process, a bioinformatics ...
Benjamin Dubois   +7 more
doaj   +1 more source

The downregulation of NCXs is positively correlated with the prognosis of stage II–IV colon cancer

open access: yesWorld Journal of Surgical Oncology, 2021
Purpose Colon cancer (CC) is a very common gastrointestinal tumor that is prone to invasion and metastasis in the late stage. This study aims to observe the expression of Na+/Ca2+ exchangers (NCXs) and analyze the correlation between NCXs and the ...
Zhixiu Xia, Changliang Wang, Hong Zhang
doaj   +1 more source

Offline User Authentication Ensuring Non-Repudiation and Anonymity

open access: yesSensors, 2022
User authentication is the key to ensuring that only authorized users can deal with specific affairs and access services. Applications or systems possessing different properties or requirements need different authentication schemes.
Ya-Fen Chang, Wei-Liang Tai, Ka-Ho Fung
doaj   +1 more source

Home - About - Disclaimer - Privacy