نتایج جستجو برای: آپولیپوپروتئین a5

تعداد نتایج: 3107  

2014
Joni L Rutter Nora D Volkow

Drug addiction is a term applied across substance use disorders (SUDs) and defined as a chronic, relapsing complex brain disease characterized by compulsive drug seeking, craving, loss of self-control, and impaired decision making (National Institute on Drug Abuse 2010). Drug addiction persists in spite of harmful consequences and cuts across all demographics. Addiction results from the interac...

2000
David Wagner

A5/1 is the strong version of the encryption algorithm used by about 130 million GSM customers in Europe to protect the over-the-air privacy of their cellular voice and data communication. The best published attacks against it require between 2 40 and 2 45 steps. This level of security makes it vulnerable to hardware-based attacks by large organizations , but not to software-based attacks on mu...

Journal: :American journal of physiology. Regulatory, integrative and comparative physiology 2000
D N Maiorov S C Malpas G A Head

The effects of inhibiting the neural activity in the pontine A5 region on renal sympathetic responses to baroreflex and/or chemoreflex activation were examined in conscious rabbits. Eight rabbits were chronically instrumented with guide cannulas for bilateral microinjections into the A5 area and an electrode for measuring renal sympathetic nerve activity (RSNA). Baroreflex curves were obtained ...

Journal: :Metals 2021

The CaO-SiO2-MgO-5Al2O3-30FeO five (oxide) components slag system was studied by varying the magnesium oxide (MgO) content (5.7–13.6 wt.%.% MgO) and keeping basicity constant). data were analyzed using FactSage software. It observed that liquid network structure precipitation of solid particles had an impact on high-temperature viscosity foaming life. Under same (mass ratio CaO/SiO2 = 1.5) at a...

2000
Alex Biryukov Adi Shamir David A. Wagner

A5/1 is the strong version of the encryption algorithm used by about 130 million GSM customers in Europe to protect the over-the-air privacy of their cellular voice and data communication. The best published attacks against it require between 240 and 245 steps. This level of security makes it vulnerable to hardware-based attacks by large organizations, but not to software-based attacks on multi...

Journal: :American journal of physiology. Heart and circulatory physiology 2003
Christopher J Madden Alan F Sved

To evaluate the role of C1 neurons in the rostral ventrolateral medulla (RVLM) in cardiovascular regulation, we studied rats in which this cell group was destroyed by the injection of anti-dopamine-beta-hydroxylase-saporin into the RVLM. These immunotoxin injections resulted in 32-99% depletion of the RVLM-C1 neurons and approximately 50% depletion of the A5 cell population. In conscious rats w...

2010
Orr Dunkelman Nathan Keller Adi Shamir

The privacy of most GSM phone conversations is currently protected by the 20+ years old A5/1 and A5/2 stream ciphers, which were repeatedly shown to be cryptographically weak. They will soon be replaced by the new A5/3 (and the soon to be announced A5/4) algorithm based on the block cipher KASUMI, which is a modified version of MISTY. In this paper we describe a new type of attack called a sand...

2014
Constantinos Giaginis Nikolaos Tsoukalas Evangelos Bournakis Paraskevi Alexandrou Nikolaos Kavantzas Efstratios Patsouris Stamatios Theocharis

BACKGROUND Ephrin (Eph) receptors are frequently overexpressed in a wide variety of human malignant tumors, being associated with tumor growth, invasion, metastasis and angiogenesis. The present study aimed to evaluate the clinical significance of EphA1, A4, A5 and A7 protein expression in non-small cell lung carcinoma (NSCLC). METHODS EphA1, A4, A5 and A7 protein expression was assessed immu...

Journal: :The Journal of neuroscience : the official journal of the Society for Neuroscience 1998
R W Davenport E Thies R Zhou P G Nelson

Avian retinotectal and rodent retinocollicular systems are general model systems used to examine developmental processes that underpin topographically organized neuronal circuits. The two systems rely on guidance components to establish their precise retinotopic maps, but many cellular events differ during their development. For example, compared with the chick, a generally less restricted outg...

Journal: :Journal of virology 1999
O Williams E J Wolffe A S Weisberg M Merchlinsky

The vaccinia virus WR A5L open reading frame (corresponding to open reading frame A4L in vaccinia virus Copenhagen) encodes an immunodominant late protein found in the core of the vaccinia virion. To investigate the role of this protein in vaccinia virus replication, we have constructed a recombinant virus, vA5Li, in which the endogenous gene has been deleted and an inducible copy of the A5 gen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید