Localization of Two Phylloquinones, QK and QK′, in an Improved Electron Density Map of Photosystem I at 4-Å Resolution

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multivalent functions and QK spaces

We give a criterion for q-valent analytic functions in the unit disk to belong to Q K , a Möbius-invariant space of functions analytic in the unit disk in the plane for a nonde-creasing function K : [0, ∞) → [0, ∞), and we show by an example that our condition is sharp. As corollaries, classical results on univalent functions, the Bloch space, BMOA, and Q p spaces are obtained. 1. Introduction....

متن کامل

Existence of solutions for nonlinear impulsive qk-difference equations with first-order qk-derivatives

In this paper, we study the nonlinear second-order impulsive qk-difference equations with Sturm-Liouville type, in which nonlinear team and impulsive teams are dependent on first-order qk-derivatives. We obtain the existence and uniqueness results of solutions for the problem by Banach’s contraction mapping principle and Schaefer’s fixed point theorems. Finally, we give two examples to demonstr...

متن کامل

Lacunary Series in Qk Spaces

Under mild conditions on the weight function K we characterize lacunary series in the so-called QK spaces.

متن کامل

On (∈,∈∨ qk)-Intuitionistic Fuzzy Ideals of Hemirings

In this paper, the concept of an (∈,∈∨qk)-intuitionistic fuzzy ideal of a hemiring, which is a generalization of the concept of an(∈,∈∨qk)-intuitionistic fuzzy ideal of a hemiring.. Also, we study some of their basic properties. Mathematics subject classification: 08A72 • 03F55 • 20M12

متن کامل

@qK Authenticating Pervasive Devices with Human Protocols

Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication resources necessary for most cryptographic authentication schemes. Surprisingly, low-cost pervasive devices like Radio Frequency Identification (RFID) tags share similar capabilities with another weak computing device:...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Biological Chemistry

سال: 1999

ISSN: 0021-9258

DOI: 10.1074/jbc.274.11.7361