منابع مشابه
Genetic suppression.
Genetic suppression has provided a very powerful tool for analyzing C. elegans. Suppression experiments are facilitated by the ability to handle very large numbers of individuals and to apply powerful selections. Because the animal grows as a self-fertilizing diploid, both dominant and recessive suppressors can be recovered. Many different kinds of suppression have been reported. These are disc...
متن کاملAutophagy in tumour suppression and promotion.
Autophagy, a well-described cellular mechanism for lysosomal degradation of cytoplasmic content, has emerged as a tumour suppression pathway. Recent evidence indicates that the tumour suppressor function of autophagy is mediated by scavenging of damaged oxidative organelles, thereby preventing accumulation of toxic oxygen radicals that would cause genome instability. Paradoxically, however, in ...
متن کاملsuppression of coke formation in thermal cracking by coke inhibitors
the main purpose of this research was to:1.develop a coking model for thermal cracking of naphtha.2.study coke inhibition methods using different coke inhibitors.developing a coking model in naphtha cracking reactors requires a suitable model of the thermal cracking reactor based on a reliable kinetic model.to obtain reliable results all these models shall be solved simultaneously.for this pu...
15 صفحه اولwoman-defined identity: analysis of selected poems of adrienne rich
the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...
automatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Clinical Pathology
سال: 1990
ISSN: 0021-9746
DOI: 10.1136/jcp.43.2.175-b