Results 41 to 50 of about 1,097,514 (242)

Various drug residues in honey and their currently most common detection techniques - A mini-review [PDF]

open access: yesMedicamentul Veterinar, 2023
Honey is a natural product made by honeybees, containing numerous simple sugars, organic acids, vitamins, minerals, antioxidants and enzymes, which provide good nutritional and medicinal qualities. Honey that has come into contact with foreign substances
Ioana Spiridon   +2 more
doaj  

Integrating Interactive Detection of Code Smells into Scrum: Feasibility, Benefits, and Challenges

open access: yesApplied Sciences, 2023
(Context) Code smells indicate poor coding practices or design flaws, suggesting deeper software quality issues. While addressing code smells promptly improves software quality, traditional detection techniques often fail in continuous detection during ...
Danyllo Albuquerque   +4 more
doaj   +1 more source

Revealing the structure of land plant photosystem II: the journey from negative‐stain EM to cryo‐EM

open access: yesFEBS Letters, EarlyView.
Advances in cryo‐EM have revealed the detailed structure of Photosystem II, a key protein complex driving photosynthesis. This review traces the journey from early low‐resolution images to high‐resolution models, highlighting how these discoveries deepen our understanding of light harvesting and energy conversion in plants.
Roman Kouřil
wiley   +1 more source

Biological functions of 5-methylcytosine RNA-binding proteins and their potential mechanisms in human cancers

open access: yesFrontiers in Oncology
The 5-methylcytosine (m5C) modification is a crucial epigenetic RNA modification, which is involved in the post-transcriptional regulation of genes. It plays an important role in various biological processes, including cell metabolism, growth, apoptosis,
Tingting Zhao   +5 more
doaj   +1 more source

Millet Crop Yield Variation through Feature Extraction Using XGBoost [PDF]

open access: yesE3S Web of Conferences
Agriculture, being a vital industry, relies significantly on predicting and improving crop yields for sustainable food production. In this context, millet, a staple crop in various regions globally, holds immense agricultural importance due to its ...
Jagadamba K. Ujas   +4 more
doaj   +1 more source

Spatiotemporal and quantitative analyses of phosphoinositides – fluorescent probe—and mass spectrometry‐based approaches

open access: yesFEBS Letters, EarlyView.
Fluorescent probes allow dynamic visualization of phosphoinositides in living cells (left), whereas mass spectrometry provides high‐sensitivity, isomer‐resolved quantitation (right). Their synergistic use captures complementary aspects of lipid signaling. This review illustrates how these approaches reveal the spatiotemporal regulation and quantitative
Hiroaki Kajiho   +3 more
wiley   +1 more source

The role and implications of mammalian cellular circadian entrainment

open access: yesFEBS Letters, EarlyView.
At their most fundamental level, mammalian circadian rhythms occur inside every individual cell. To tell the correct time, cells must align (or ‘entrain’) their circadian rhythm to the external environment. In this review, we highlight how cells entrain to the major circadian cues of light, feeding and temperature, and the implications this has for our
Priya Crosby
wiley   +1 more source

Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10

open access: yesFEBS Letters, EarlyView.
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang   +8 more
wiley   +1 more source

DDoSAttacks: Detection Techniques

open access: yesScholarly Review Journal, 2023
As we become more reliant on technology, we also become more vulnerable to cyberattacks. One of the most common types of cyberattacks is DDoS attacks, or Distributed Denial of Service attacks. These attacks are carried out to make certain servers or web pages unavailable, or very slow to update.
openaire   +1 more source

Home - About - Disclaimer - Privacy