Results 71 to 80 of about 64,280 (295)
Food authentication: Techniques, trends & emerging approaches [PDF]
Abstract Food authentication is a rapidly growing field due to increasing public awareness concerning food quality and safety. This review presents critically the analytical techniques which are used for authenticity assessment, explaining how and why they give plausible solutions.
Danezis, G. P. +4 more
openaire +3 more sources
Single circulating tumor cells (sCTCs) from high‐grade serous ovarian cancer patients were enriched, imaged, and genomically profiled using WGA and NGS at different time points during treatment. sCTCs revealed enrichment of alterations in Chromosomes 2, 7, and 12 as well as persistent or emerging oncogenic CNAs, supporting sCTC identity.
Carolin Salmon +9 more
wiley +1 more source
Organic chicken product authentication: state-of-the-art and future perspectives [PDF]
Podeu consultar el llibre complet a: http://hdl.handle.net/2445/63704Organic food products are highly susceptible to fraud. Currently, administrative controls are conducted to detect fraud, but having an analytical tool able to verify the organic ...
Codony Salcedo, Rafael +2 more
core
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source
In this work, non-targeted approaches relying on HPLC-UV chromatographic fingerprints were evaluated to address coffee characterization, classification, and authentication by chemometrics.
Nerea Núñez +4 more
doaj +1 more source
Fast methods for authentication of organic plant based foods [PDF]
The market shares for organic products have continuously grown over the last decade. Organic products are generally sold at premium prices compared to conventional ones.
core
Distributed Individual-Based Environmental Simulation [PDF]
This paper describes the development and construction of a distributed model allowing the simulation of a large population. Particular attention will be paid to allowing the modelling of an individual's behaviour, communication and interaction with a ...
Scahill, Mark
core +2 more sources
Tumour–host interactions in Drosophila: mechanisms in the tumour micro‐ and macroenvironment
This review examines how tumour–host crosstalk takes place at multiple levels of biological organisation, from local cell competition and immune crosstalk to organism‐wide metabolic and physiological collapse. Here, we integrate findings from Drosophila melanogaster studies that reveal conserved mechanisms through which tumours hijack host systems to ...
José Teles‐Reis, Tor Erik Rusten
wiley +1 more source
Recently, the authenticity of food products has become a great social concern. Considering the complexity of the food chain and that many players are involved between production and consumption; food adulteration practices are rising as it is easy to ...
Guillem Campmajó +5 more
doaj +1 more source
Why Do People Adopt, or Reject, Smartphone Password Managers? [PDF]
People use weak passwords for a variety of reasons, the most prescient of these being memory load and inconvenience. The motivation to choose weak passwords is even more compelling on Smartphones because entering complex passwords is particularly time ...
Alkaldi, Nora, Renaud, Karen
core +2 more sources

