نتایج جستجو برای: ping pong model

تعداد نتایج: 2106751  

2016

Enzymatic synthesis of palm oil esters (POE) was carried out via alcoholysis of palm oil (PO) and oleyl alcohol (OA) catalyzed by Lipozyme TL IM. The optimum reaction conditions were: temperature: 60 °C; enzyme load: 24.7 wt%; substrate ratio: 1:3 (PO/OA), impeller speed: 275 rpm and reaction time: 3 h. At the optimum condition, the conversion of POE was 79.54%. Reusability study showed that Li...

Journal: :The Journal of Cell Biology 2004
Nicole LeBrasseur

Getting to the inner circle ontiguity between the ER and the nuclear envelope means nuclear membrane proteins have a direct shot to their target. In fact, inner nuclear membrane (INM) proteins were thought to need only to diffuse to the nucleus, pass through the nuclear pore, and then be retained by nuclear-localized binding partners. But new results suggest a more active process. Suraj Saksena...

Journal: :Journal of the Japanese Society of Snow and Ice 2003

2014
Hyung-Suk Kim Jorge Herrera Ge Wang

A recently developed system that uses pitched sounds to discover relative 3D positions of a group of devices located in a shared physical space is described. The measurements are coordinated over an IP network in a decentralized manner, while the actual measurements are carried out measuring the time-of-flight of the notes played by different devices. Approaches to sonify the discovery process ...

2013
Smita Ramsey Ravi Shankar Shukla Zubair Khan

In the next generation of wireless network such as long term evolution (LTE) and worldwide interoperability for microwave access (WiMAX), always best connected concept is required. However in many situation handoff failures and unnecessary handoff are triggered causing degradation of quality of service. In this paper our main focus is on the handoff decision problem which affects the number of ...

2011
PIOTR ZAWADZKI

Quantum secure direct communication protocols offer confidential transmission of classic information over the quantum channel without a prior key agreement. The ping-pong based protocols provide asymptotic security and detailed analysis of the security level provided by each variant of the protocol is required. The paper presents a general method of calculation of the eavesdropped information a...

Journal: :Archives of Disease in Childhood - Fetal and Neonatal Edition 2016

Journal: :Cellular physiology and biochemistry : international journal of experimental cellular physiology, biochemistry, and pharmacology 2009
Luis Beaugé Reinaldo DiPolo

In a previous work we demonstrated that, in dialyzed squid axons, an impairment of the Ca2+(i)-regulatory site affected the apparent affinities for external Na+ and Ca2+ in a way opposite to that predicted by the exiting (ping-pong) models for the exchangers. In the present work, we used model simulations and actual experiments where the Ca2+(i)-regulatory remained always saturated while [Ca2+]...

2013
Zbigniew Paszkiewicz Willy Picard

Volvo IT Belgium has provided real-life datasets for the need of the Third International Business Process Intelligence Challenge, in the form of event logs generated by the VINST system used across the Volvo corporation to support incident and problem handling. Volvo has also pointed 4 aspects of their business operations they would like to be scrutinized. 1) Are the incidents contained within ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید