Anthraquinones and autophagy – Three rings to rule them all?
نویسندگان
چکیده
منابع مشابه
One to rule them all
The development of transposon-based genome manipulation tools can benefit greatly from understanding transposons' inherent regulatory mechanisms. The Tc1-mariner transposons, which are being widely used in biotechnological applications, are subject to a self-inhibitory mechanism whereby increasing transposase expression beyond a certain point decreases the rate of transposition. In a recent pap...
متن کاملThree types of exceptions – and all of them rule - based
A basic premise of this paper is that a simpler grammar is a more adequate one, and that thus exceptions are undesirable. We present studies concerning three different grammatical structures which contain phenomena standardly regarded as exceptions , and show how, in all three cases, the attribution of the status as an exception was unnecessary. In each case, the collection of better data and t...
متن کاملMore Rings to rule them all : Fragmentation , 4 D ↔ 5 D and Split - Spectral Flows
In this note we set-up an explicit 5D construction of AdS-fragmentation, whereby a single black ring splits-up into a multi-black ring configuration. Furthermore it is seen that these fragmented rings are equivalent to a direct 5D lift of 4D multicenter black holes. Along the way we also determine the 4D/5D transformations relevant for multi-center charges. It is seen that the physical charges ...
متن کاملOne entropy function to rule them all
We study the entropy of extremal four dimensional black holes and five dimensional black holes and black rings is a unified framework using Sen’s entropy function and dimensional reduction. The five dimensional black holes and black rings we consider project down to either static or stationary black holes in four dimensions. The analysis is done in the context of two derivative gravity coupled ...
متن کاملOne Key to Rule Them All
We show how to specify an elliptic curve public key, RSA public key and DSA public key all in a single 2048 bit block. The method gives a wide choice of nite elds and curves for use in the ECC system and introduces no known security weaknesses. The method hence allows algorithm type to be decided at run time, rather than at the time the public keys are distributed. However, this is done without...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bioorganic & Medicinal Chemistry
سال: 2019
ISSN: 0968-0896
DOI: 10.1016/j.bmc.2019.115042