نتایج جستجو برای: identity base
تعداد نتایج: 371989 فیلتر نتایج به سال:
Twenty-one RNA minihelices, resembling the coaxially stacked acceptor- /T-stems and T-loop found along the top of a tRNA's three-dimensional structure, were synthesized and used as substrates for ATP/CTP:tRNA nucleotidyltransferases from Escherichia coli and Saccharomyces cerevisiae. The sequence of nucleotides in the loop varied at positions corresponding to residues 56, 57 and 58 in the T-loo...
The 5'-nucleotide of small RNAs associates directly with the MID domain of Argonaute (AGO) proteins. In humans, the identity of the 5'-base is sensed by the MID domain nucleotide specificity loop and regulates the integrity of miRNAs. In Arabidopsis thaliana, the 5'-nucleotide also controls sorting of small RNAs into the appropriate member of the AGO family; however, the structural basis for th...
The speaker verification is a process of verifying the identity of the claimants. It performs one to one comparison between a newly input voice print and the voice print for the claimed identity that is stored in the database. In this paper, linear predictive coding co-efficient has been used for formant detection. The peak frequencies in the frequency response of vocal tract are formants, whic...
The aim of this study was to determine the arrangement of religion and the modern youth identity and its relation to the well-being. For this purpose, 360 youth participated in the study. The method of sampling was convenience. Modern identity questionnaire, Islamic identity questionnaire, identity processing style (ISIG3 Berzonsky, 1992) and The satisfaction with life scale (Diener, E. D., & e...
identity, a series of traits and characteristics that makes a person or a member of the community come to a kind of “ recognition” about individuals and other communities; the city also, following the example of this criterion gains character and gets independent. identity in the city, through the creation and association with “public memories” of citizens causes the sense of interest and depen...
It is important to be able to evaluate information security systems involving humans. We propose an approach in which we consider the system as a cryptographic protocol, and users are modeled as ordinary players. To model the fact that users make mistakes that affect security, we introduce protocol variants that model mistakes or combinations of mistakes. By analysing the base protocol and its ...
The importance of key management protocol in ensuring secure communications in WSN is undeniable. This paper presents an IBE-Trust security framework utilizing the well-known identity based encryption scheme not to only establish secure communications but to ensure the trustworthiness of the communication between sensor nodes and base station. The framework incorporates ideas from Trusted Compu...
A cDNA clone for human adult intestinal alkaline phosphatase (ALP) [orthophosphoric-monoester phosphohydrolase (alkaline optimum); EC 3.1.3.1] was isolated from a lambda gt11 expression library. The cDNA insert of this clone is 2513 base pairs in length and contains an open reading frame that encodes a 528-amino acid polypeptide. This deduced polypeptide contains the first 40 amino acids of hum...
This paper constructs a formula for measuring the tourists perceived value index of forest experience base recreation on five dimensions: Scenic resource attachment, Forest cultural experience, Environmental quality perception, “Two mountains” concept identity, and leisure time activities. Taking Bamboo Expo Park Experience Base in Tianhuangping Town, Anji County, Huzhou City Zhejiang Province ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید