نتایج جستجو برای: tang 2004

تعداد نتایج: 131249  

Journal: :Biological & pharmaceutical bulletin 2002
Feng Zuo Zhong-Ming Zhou Mei-Zhen Yan Mei-Lan Liu Yu-Lan Xiong Qing Zhang Hong-Yue Song Wen-Hua Ye

In the course of studies on the metabolism of active components of Huangqin-Tang by human intestinal flora (HIF), Huangqin-Tang and all individual herbs in the decoctions were incubated with a human fecal suspension separately. By using a high-performance liquid chromatographic (HPLC) method which was previously established in our laboratory, the metabolites in both the compound prescription an...

2018
Ju Ah Lee Soobin Jang Ji Hee Jun Myeong Soo Lee Eunhee Lee Namkwen Kim Dong Hyo Lee

h Abstract Background: Bojungikki-tang, a herbal medicine for strengthening the digestive system, has been widely used in East Asian countries since the Yuan Dynasty in China. Moreover, Bojungikki-tang has reportedly exhibited anti-allergy effects in many clinical trials. This systematic review will assess the effectiveness and safety of Bojungikki-tang for allergic rhinitis (AR). Methodsand an...

2005
Zvonimir Dogic Seth Fraden

The reasons physicists give for studying colloids are varied. Our initial motivation was that colloids can serve as model experimental systems to study simple fluids because with careful preparation, colloids approximate hard particles. Numerous studies have investigated the phase behavior, structure, and macroscopic viscoelastic properties of suspensions of spherical colloids (Poon and Pusey 1...

Journal: :The European respiratory journal 2011
I Nenekidis G T Stathopoulos V Anagnostakou A Kokkori P Dedeilias J Kokotsakis M Argiriou C Zisis

REFERENCES 1 Segaert S, Van Cutsem E. Clinical signs, pathophysiology and management of skin toxicity during therapy with epidermal growth factor receptor inhibitors. Ann Oncol 2005; 16: 1425–1433. 2 Tang X, Shigematsu H, Bekele BN, et al. EGFR tyrosine kinase domain mutations are detected in histologically normal respiratory epithelium in lung cancer patients. Cancer Res 2005; 65: 7568–7572. 3...

2009
Daniela Büttner Sheng Yang He

Many gram-negative plant and animal pathogenic bacteria employ a type III secretion system (T3SS) to subvert and colonize their respective host organisms. The T3SS injects effector proteins directly into the cytosol of eukaryotic cells and thus allows the manipulation of host cellular activities to the benefit of the pathogen. In plant pathogenic bacteria, T3SSs are encoded by hrp (for hypersen...

2004
Tong Tang Mei Hua Gao David M. Roth Tracy Guo Kirk Hammond

Tang, Tong, Mei Hua Gao, David M. Roth, Tracy Guo, and H. Kirk Hammond. Adenylyl cyclase type VI corrects cardiac sarcoplasmic reticulum calcium uptake defects in cardiomyopathy. Am J Physiol Heart Circ Physiol 287: H1906–H1912, 2004. First published July 8, 2004; doi:10.1152/ajpheart.00356.2004.—Calcium malfunction plays a central role in heart failure. Here, we provide evidence that adenylyl ...

2017
Jones Guo Chen

Introduction Cardiac myocyte contraction is driven by the coordinated release of Ca from the sarcoplasmic reticulum (SR). This release of Ca occurs through the cardiac RyR2. Physiologically, Ca release occurs in response to an influx of Ca through L-type Ca channels, via a mechanism termed CICR. This transient increase in cytosolic Ca activates the RyR2 channel as a result of Ca binding to the ...

2007
Ivan Martinovic Frank A. Zdarsky Adam Bachorek Christian Jung Jens B. Schmitt

Web-based authentication is a popular mechanism implemented by Wireless Internet Service Providers (WISPs) because it allows a simple registration and authentication of customers, while avoiding high resource requirements of the new IEEE 802.11i security standard and backward compatibility issues of legacy devices. In this work we demonstrate two different and novel attacks against web-based au...

Journal: :Comput. Sci. Inf. Syst. 2006
Radomir Prodanovic Dejan Simic

Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. T...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید