Results 71 to 80 of about 64,280 (295)

Food authentication: Techniques, trends & emerging approaches [PDF]

open access: yesTrAC Trends in Analytical Chemistry, 2016
Abstract Food authentication is a rapidly growing field due to increasing public awareness concerning food quality and safety. This review presents critically the analytical techniques which are used for authenticity assessment, explaining how and why they give plausible solutions.
Danezis, G. P.   +4 more
openaire   +3 more sources

Phenotypic and genotypic characterization of single circulating tumor cells in the follow‐up of high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Single circulating tumor cells (sCTCs) from high‐grade serous ovarian cancer patients were enriched, imaged, and genomically profiled using WGA and NGS at different time points during treatment. sCTCs revealed enrichment of alterations in Chromosomes 2, 7, and 12 as well as persistent or emerging oncogenic CNAs, supporting sCTC identity.
Carolin Salmon   +9 more
wiley   +1 more source

Organic chicken product authentication: state-of-the-art and future perspectives [PDF]

open access: yes, 2014
Podeu consultar el llibre complet a: http://hdl.handle.net/2445/63704Organic food products are highly susceptible to fraud. Currently, administrative controls are conducted to detect fraud, but having an analytical tool able to verify the organic ...
Codony Salcedo, Rafael   +2 more
core  

Dammarenediol II enhances etoposide‐induced apoptosis by targeting O‐GlcNAc transferase and Akt/GSK3β/mTOR signaling in liver cancer

open access: yesMolecular Oncology, EarlyView.
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee   +8 more
wiley   +1 more source

Authentication of the Origin, Variety and Roasting Degree of Coffee Samples by Non-Targeted HPLC-UV Fingerprinting and Chemometrics. Application to the Detection and Quantitation of Adulterated Coffee Samples

open access: yesFoods, 2020
In this work, non-targeted approaches relying on HPLC-UV chromatographic fingerprints were evaluated to address coffee characterization, classification, and authentication by chemometrics.
Nerea Núñez   +4 more
doaj   +1 more source

Fast methods for authentication of organic plant based foods [PDF]

open access: yes
The market shares for organic products have continuously grown over the last decade. Organic products are generally sold at premium prices compared to conventional ones.

core  

Distributed Individual-Based Environmental Simulation [PDF]

open access: yes, 1997
This paper describes the development and construction of a distributed model allowing the simulation of a large population. Particular attention will be paid to allowing the modelling of an individual's behaviour, communication and interaction with a ...
Scahill, Mark
core   +2 more sources

Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment

open access: yesMolecular Oncology, EarlyView.
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley   +1 more source

Non-Targeted HPLC-UV Fingerprinting as Chemical Descriptors for the Classification and Authentication of Nuts by Multivariate Chemometric Methods

open access: yesSensors, 2019
Recently, the authenticity of food products has become a great social concern. Considering the complexity of the food chain and that many players are involved between production and consumption; food adulteration practices are rising as it is easy to ...
Guillem Campmajó   +5 more
doaj   +1 more source

Why Do People Adopt, or Reject, Smartphone Password Managers? [PDF]

open access: yes, 2016
People use weak passwords for a variety of reasons, the most prescient of these being memory load and inconvenience. The motivation to choose weak passwords is even more compelling on Smartphones because entering complex passwords is particularly time ...
Alkaldi, Nora, Renaud, Karen
core   +2 more sources

Home - About - Disclaimer - Privacy