Results 121 to 130 of about 1,157,333 (342)
Microbial Odorant Detection Guides Drosophila Parasitoids Seeking Hosts in Fermenting Fruits
Yeast microbes in fermenting fruits attract both host flies and their parasitoid wasps. Female Leptopilina boulardi detect yeast‐emitted ethyl esters via two olfactory receptors, LbouOR167 and LbouOR136. A conserved residue, Leu159, is critical for binding these compounds, enabling female wasps to locate host‐rich habitats.
Yueqi Lu +11 more
wiley +1 more source
Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review
Jhon Francined Herrera Cubides +4 more
openalex +2 more sources
From Materials to Systems: Challenges and Solutions for Fast‐Charge/Discharge Na‐Ion Batteries
This review systematically analyzes the key characteristics limiting the fast‐charge/discharge capability of Na‐ion batteries (SIBs) from a multi‐scale perspective encompassing electrode materials, the electrode‐electrolyte interface, and the system. Furthermore, it presents practical solution strategies for the fundamental issues arising at each scale,
Bonyoung Ku +5 more
wiley +1 more source
Livestock Tango: U.S. and Latin America Dance Together, but Who Will Lead?
ABSTRACT This study examines the competitiveness between Latin American and U.S. livestock and meat sectors. We employ a computable general equilibrium modeling framework to evaluate two scenarios: coordinated improvements in Latin American productivity, transport efficiency, and market access (Scenario I), and the minimum productivity gains required ...
Taís C. Menezes +2 more
wiley +1 more source
The Role of Artificial Intelligence in Medication Management for Older Adults: A Systematic Review
Artificial intelligence enhances medication management for older adults by improving adherence, personalizing treatment, and predicting risks. Despite benefits, challenges remain in usability, trust, ethics, and system integration. Successful adoption requires user‐centered design, ethical safeguards, and seamless healthcare integration to ensure safe,
Dipak Chandra Das +9 more
wiley +1 more source
Der Untersuchungsbereich der vorliegenden Arbeit erstreckt sich über die Sicherheit aller mit der Web Site eines Unternehmens verbundenen IT-Komponenten vor unbefugter Benutzung, Verlust, Beschädigung, Diebstahl und Manipulation. Dieser Untersuchungsbereich wird hier als 'Web Site Security' (WSS) bezeichnet.
Schwickert, Axel C. +2 more
openaire +3 more sources
Link-E-Param : A URL Parameter Encryption Technique for Improving Web Application Security [PDF]
Deok-Byung Lim, Jun-Cheol Park
openalex +1 more source
ABSTRACT The origin of a product, if associated with good quality, can contribute to building a positive collective reputation, leading to a potential price premium. However, it is conceivable that a producer markets a product by evoking symbols, images, words, and values typical of places other than where it was designed or produced, creating a ...
Annalisa Caloffi +2 more
wiley +1 more source
Security For Three-Tiered Web Application
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing
Wisal H. Abdulsalam
doaj
Jasleen Kaur,1 Asif Irshad Khan,2 Yoosef B Abushark,2 Md Mottahir Alam,3 Suhel Ahmad Khan,4 Alka Agrawal,1 Rajeev Kumar,1 Raees Ahmad Khan1 1Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, UP, India; 2Computer ...
Kaur J +7 more
doaj

