Results 81 to 90 of about 142,967 (351)

Conventional and food‐to‐food fortification: An appraisal of past practices and lessons learned

open access: yesFood Science & Nutrition, 2019
Food fortification is an important nutrition intervention to fight micronutrient deficiencies and to reduce their incidence in many low‐ and middle‐income countries.
F.J. Chadare   +10 more
semanticscholar   +1 more source

Polyoxometalate Imide‐Linked Molecules, Covalent Organic Polymers, and Frameworks: Dimensionality Effects on Supercapacitors Performance

open access: yesAdvanced Sustainable Systems, EarlyView.
This study explores polyoxometalate‐based hybrids with varying dimensionalities, linking molecular, polymeric, and framework structures to supercapacitor performance. The results highlight how structural tuning enhances surface area, porosity, and charge transport, offering insights into designing efficient energy storage materials.
Daria Nowicka   +6 more
wiley   +1 more source

Effect of Ferric Sodium EDTA administration, in combination with vitamin C, folic acid, copper gluconate, zinc gluconate and selenomethionine, on cardiovascular risk evaluation: exploration of the HRV frequency domain [PDF]

open access: yes, 2019
diseases. Using the Heart Rate Variability (HRV) analysis is possible to provide an evaluation of the safety and the effectiveness of intervention.
Curcio, A.   +6 more
core   +1 more source

Concentrations of blood folate in Brazilian studies prior to and after fortification of wheat and cornmeal (maize flour) with folic acid: a review

open access: yesRevista Brasileira de Hematologia e Hemoterapia, 2014
BACKGROUND: In July 2004, the Brazilian Ministry of Health through the National Health Surveillance Agency made the fortification of wheat flour and cornmeal (maize flour) with iron and folic acid mandatory, with the intention of reducing the rate of ...
Jéssica Carrilho Britto   +2 more
doaj   +1 more source

Strong Parallel Repetition for Unique Games on Small Set Expanders [PDF]

open access: yesarXiv, 2021
Strong Parallel Repetition for Unique Games on Small Set Expanders The strong parallel repetition problem for unique games is to efficiently reduce the 1-delta vs. 1-C*delta gap problem of Boolean unique games (where C>1 is a sufficiently large constant) to the 1-epsilon vs. epsilon gap problem of unique games over large alphabet.
arxiv  

β‐Glucuronidase‐Expressing Lactobacillus reuteri Triggers Irinotecan Enterotoxicity Through Depleting the Regenerative Epithelial Stem/Progenitor Pool

open access: yesAdvanced Science, EarlyView.
XLP mitigated CPT11 mucositis by suppressing GUS‐expressing microbes, notably L. reuteri, and diminishing bacterial GUS activity, consequently reducing SN38 accumulation to protect the intestinal epithelium. This preservation of the mucosal stem cell niche enabled rapid regeneration of secretory lineages such as mucin‐producing goblet cells, which ...
Bei Yue   +15 more
wiley   +1 more source

Fortificaţia de la Ungra. Cercetări magnetometrice recente [PDF]

open access: yesCercetări Arheologice
The fortification of Ungra is one of the points of interest for the archaeology of the first centuries AD in Brașov County. The archaeological site is located at the intersection of two communication routes, the Homoroade Valley and the Gorge of the Olt ...
Alexandru Popa   +2 more
doaj   +1 more source

Uyskaya Fortification Line of the 18th – 19th centuries According to the Materials of Field and Archive Research

open access: yesЖурнал Фронтирных Исследований, 2023
This article aims to provide an analysis of the basic fortification constructions that formed the Uyskaya Fortification Line during the 18th and 19th centuries, such as fortresses, redoubts and outposts, based on newly found archive documents.
Nadezhda V. Korshunova, Pavel A. Stromov
doaj   +1 more source

SCAR: Power Side-Channel Analysis at RTL-Level [PDF]

open access: yesarXiv, 2023
Power side-channel attacks exploit the dynamic power consumption of cryptographic operations to leak sensitive information of encryption hardware. Therefore, it is necessary to conduct power side-channel analysis for assessing the susceptibility of cryptographic systems and mitigating potential risks.
arxiv  

Home - About - Disclaimer - Privacy