نتایج جستجو برای: tagged site

تعداد نتایج: 371906  

Journal: :Nucleic acids research 1994
R Agami R Aly S Halman M Shapira

DNA sequences, that control expression of the spliced leader (SL) RNA gene in the parasitic protozoan Leishmania amazonensis, were mapped by block substitution mutagenesis. In the absence of a functional in vitro system for transcription, no promoter elements have yet been identified in this organism. We therefore developed an alternative in vivo approach, in which the SL RNA gene was tagged an...

Journal: :Current drug discovery technologies 2008
Tatsuo Takahashi-Nishioka Koichi Yokogawa Shunji Tomatsu Masaaki Nomura Shinjiro Kobayashi Ken-Ichi Miyamoto

Site-specific drug delivery to bone is considered to be achievable by utilizing acidic amino acid homopeptides. We found that fluorescence-labeled acidic amino acid (L-Asp or L-Glu) homopeptides containing six or more residues bound strongly to hydroxyapatite, which is a major component of bone, and were selectively delivered to and retained in bone after systemic administration. We explored th...

2013
Christine Villegas Virgil Muresan Zoia Ladescu Muresan

The amyloid-bprecursor protein (APP), a type I transmembrane protein genetically associated with Alzheimer’s disease, has a complex biology that includes proteolytic processing into potentially toxic fragments, extensive trafficking and multiple, yet poorly-defined functions. We recently proposed that a significant fraction of APP is proteolytically cleaved in the neuronal soma into Nand C-term...

2007
GARRETT BIRKHOFF

The number of distinct operations (that is, the range of the variable a) may be infinite, but for our main result (Theorem 2), we shall require every n(a) to be finite—that is, it will concern algebras with finitary operations. The concepts of subalgebra, congruence relation on an algebra, homomorphism of one algebra A onto (or into) another algebra with the same operations, and of the direct u...

Journal: :IACR Cryptology ePrint Archive 2015
Masao Kasahara

In this paper we present a very simple scheme for strengthening the conventional product-sum type PKC which has been long considered insecure against the various attacks such as the secret key attack, LLL attack, etc. We show that with the proposed strengthening scheme, the securities of the conventional product-sum type PKC’s can be much improved.

Journal: :Journal of applied genetics 2001
L Stepień Y Chen J Chełkowski K Kowalczyk

Five accessions of Aegilops speltoides and 67 European wheat cultivars (winter and spring) originating from the Czech Republic, Germany, Poland, Russia, Slovakia, United Kingdom, and 4 non-European wheat cultivars from Brazil and the USA were examined with molecular Sequence Tagged Site (STS) markers for resistance genes to powdery mildew: Pm 1, Pm 2, Pm 3 and Pm 13. All markers gave clear, rep...

2013
Masato Kurihara

For an elliptic curve over the rational number field and a prime number p, we study the structure of the classical Selmer group of p-power torsion points. In our previous paper [12], assuming the main conjecture and the non-degeneracy of the p-adic height pairing, we proved that the structure of the Selmer group with respect to p-power torsion points is determined by some analytic elements δ̃m d...

Journal: :Electr. Notes Theor. Comput. Sci. 1997
Zakaria Bouziane Alain Finkel

We prove that cyclic Petri net reachability sets are nite unions of linear combinations of integer vectors whose sizes are exponential in the size of the cyclic Petri net.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید