نتایج جستجو برای: آپولیپوپروتئین a5
تعداد نتایج: 3107 فیلتر نتایج به سال:
PURPOSE The cells of the mammalian lens must be carefully organized and regulated to maintain clarity. Recent studies have identified the Eph receptor ligand ephrin-A5 as a major contributor to lens development, as mice lacking ephrin-A5 develop abnormal lenses, resulting in cataracts. As a follow-up to our previous study on the cataracts observed in ephrin-A5(-/-) animals, we have further exam...
OBJECTIVES In the present study, the authors have investigated whether rotational thromboelastometry (ROTEM) could predict thrombocytopenia and hypofibrinogenemia in cardiac surgery using the clot amplitude after 5 minutes (A5). Another parameter, PLTEM, in which the contribution of fibrinogen is eliminated by subtracting a fibrin-specific ROTEM test (FIBTEM) from an extrinsically-activated ROT...
A5: Automated Analysis of Adversarial Android Applications (CMU-CyLab-13-009) (Revised June 3, 2014)
Mobile malware is growing – both in overall volume and in number of existing variants – at a pace rapid enough that systematic manual, human analysis is becoming increasingly difficult. As a result, there is a pressing need for techniques and tools that provide automated analysis of mobile malware samples. We present A5, an automated system to process Android malware. A5 is a hybrid system comb...
BACKGROUND AND OBJECTIVE The pathogenesis of exercise-induced bronchoconstriction (EIB) in asthma is incompletely understood. The role of exhaled breath condensate (EBC) annexin A5, which is an anti-inflammatory mediator, has not been investigated. The purpose of this study is to evaluate EBC annexin A5 levels in EIB in asthmatic children. METHODS Two groups of children were enrolled in this ...
OBJECTIVE Annexins are Ca(2+)-dependent phospholipid binding proteins. Externalized annexin A5 has been recently suggested to have a proapoptotic effect. Our aim was to determine whether annexin A5, which is intracellular in cardiomyocytes, could be translocated and/or externalized and play a role during the apoptotic process. METHODS Apoptosis was induced in rat cardiomyocytes by continuous ...
به منظور تأمین امنیت مکالمات تلفنی در مخابرات ماهواره ای (استاندارد gmr-1) از الگوریتم رمز دنباله ایa5-gmr-1 و a5-gmr-2 استفاده می شود. نحوه کار این الگوریتم ها تا قبل از سال 2012 میلادی مشخص نبود و پس از آن از طریق مهندسی معکوس افشا شد. در این پایان نامه ضمن معرفی الگوریتم رمز a5-gmr-1 و مقایسه آن با الگوریتم رمز دنباله ای a5/2 تلاش می شود که عملکرد امنیتی آن مورد تحلیل و بررسی قرار داده شود. ...
Bleomycin is used in combination with other antineoplastic agents to effectively treat lymphomas, testicular carcinomas, and squamous cell carcinomas of the cervix, head, and neck. However, resistance to bleomycin remains a persistent limitation in exploiting the full therapeutic benefit of the drug with other types of cancers. Previously, we documented that the Saccharomyces cerevisiae L-carni...
Recent genetic studies show that the Eph/ephrin bidirectional signaling pathway is associated with both congenital and age-related cataracts in mice and humans. We have investigated the molecular mechanisms of cataractogenesis and the roles of ephrin-A5 and EphA2 in the lens. Ephrin-A5 knockout ⁻/⁻ mice often display anterior polar cataracts while EphA2⁻/⁻ lenses show very mild cortical or nucl...
PURPOSE To investigate the effect of annexin A5, a calcium-dependent phospholipid-binding protein, on corneal epithelial wound healing. METHODS The effect of annexin A5 on migration of rabbit corneal epithelial (RCE) cells in vitro was examined in scrape-wounded cell monolayers. The effect of annexin A5 on the release of urokinase-type plasminogen activator (uPA) from cultured RCE cells was d...
The Global System for Mobile communication, GSM voice calls are encrypted using a family of algorithms collectively called A5. A5/1 is the stream cipher which encrypts the information transmitted from mobile user. Initially A5 algorithm was kept secret to ensure the security but as algorithm was disclosed many cryptanalytic attacks were proposed and proved the A5 algorithm cryptographically wea...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید