نتایج جستجو برای: guard
تعداد نتایج: 7281 فیلتر نتایج به سال:
Previous studies have demonstrated that methyl jasmonate (MeJA) induces stomatal closure dependent on change of cytosolic free calcium concentration in guard cells. However, these molecular mechanisms of intracellular Ca(2+) signal perception remain unknown. Calcium-dependent protein kinases (CDPKs) function as Ca(2+) signal transducers in various plant physiological processes. It has been repo...
The article presents interpretations of the poetry collection “Native Guard” American writer Natasha Trethewey — Pulitzer Prize winner (2007), and Poet Laureate (2012–2014). Through lens African Critical Race studies, Trethewey’s is analyzed as artistic Civil War reconstruction which writes Louisiana Native Guard regiments into national history. Utilizing wide range poetic forms in collections ...
The exact power distribution of the inter-cell interference is obtained explicitly for cell edge users who are surrounded by circular guard zones. Compared with recent works, the underlying channel model is generalized from Rayleigh fading to a combination of Nakagami fading and Gamma shadowing. In addtion, asymptotic analysis shows that the mean power of intercell interference changes from inf...
Stomata in the plant epidermis open in response to blue light and affect photosynthesis and plant growth by regulating CO2 uptake and transpiration. In stomatal guard cells under blue light, plasma membrane H+-ATPase is phosphorylated and activated via blue light-receptor phototropins and a signaling mediator BLUS1, and H+-ATPase activation drives stomatal opening. However, details of the signa...
In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text...
Although one senior security professional has emphasized that “it is unconscionable to use overly weak components” in a multilevel security (MLS) context, the majority of current transfer guards do exactly that. Basic guard technology is well-developed and has a long history, but most guards are built on low-assurance systems vulnerable to software subversion, and the lack of assurance limits t...
Key reconciliation techniques are employed to discard the effect of uncorrelated noise present at the communicating nodes of a reciprocal channel. Under a direct lineof-sight scenario, to randomize the channel, one of the communicating nodes shall be equipped with a RECAP antenna. The Linde-Buzo-Gray vector quantization is employed to the measured data, to support key generation. To eliminate t...
Guard cells form stomatal pores that optimize photosynthetic carbon dioxide uptake with minimal water loss. Stomatal movements are controlled by complex signaling networks that respond to environmental and endogenous signals. Regulation of stomatal aperture requires coordinated activity of reactive oxygen species (ROS)-generating enzymes, signaling proteins, and downstream executors such as ion...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید