نتایج جستجو برای: ping pong model
تعداد نتایج: 2106751 فیلتر نتایج به سال:
We generalize results about the classical Schottky groups to quasiconvex subgroups in negatively curved groups, answering a question of M. Bestvina.
Ping-Pong Electron Transfer through DNA Benjamin Elias, Prof. , Joseph C. Genereux , Jacqueline K. Barton, Prof. 1 * Division of Chemistry and Chemical Engineering, California Institute of Technology, Pasadena, CA 91125 (USA), Fax: (+1) 626 577 4976 Chimie Organique et Médicinale, Université catholique de Louvain (Belgium) email: Jacqueline K. Barton ([email protected]) Correspondence to Jac...
The NADH-dependent morphinone reductase from Pseudomonas putida M10 catalyses the reduction of morphinone and codeinone to hydromorphone and hydrocodone respectively. Morphinone reductase was purified from crude cell extracts to apparent homogeneity in a single affinity-chromatography step using Mimetic Yellow 2. The purified enzyme was a dimeric flavoprotein with two identical subunits of M(r)...
Substance abuse disorders are considered to comprise the fourth class of diseases. The aim of the present study was to investigate the effectiveness of the multidimensional treatment procedure comprising mindfulness-based cognitive therapy, exercises (chess, ping pong), and daily self-monitoring reports. This study conducted on 40 drug abusers who were selected using convenience sampling method...
In this study, decolorization of the diazo dye, Reactive Black 5 (RB5) in a Coprinus cinereus peroxidase-catalyzed reaction has been investigated. A bisubstate kinetic model for the reaction rate based on the Ping-Pong mechanism was assumed for the enzymatic decolorization. Experiment...
In animals, the piRNA pathway preserves the integrity of gametic genomes, guarding them against the activity of mobile genetic elements. This innate immune mechanism relies on distinct genomic loci, termed piRNA clusters, to provide a molecular definition of transposons, enabling their discrimination from genes. piRNA clusters give rise to long, single-stranded precursors, which are processed i...
The paper describes a verification technique based on program transformation with unfolding. The technique allows to find short attacks on multi-party ping-pong protocols in the Dolev–Yao intruder model. Protocols are modelled by prefix grammars, and questions of model optimization and complexity are considered. Examples of model programs for protocols were written in a functional language and ...
PIWI proteins and their associated piRNAs protect germ cells from the activity of mobile genetic elements. Two classes of piRNAs—primary and secondary—are defined by their mechanisms of biogenesis. Primary piRNAs are processed directly from transcripts of piRNA cluster loci, whereas secondary piRNAs are generated in an adaptive amplification loop, termed the ping-pong cycle. In mammals, piRNA p...
BACKGROUND Piwi-interacting RNAs (piRNAs) are approximately 24-30 nucleotide regulatory RNAs that are abundant in animal gonads and early embryos. The best-characterized piRNAs mediate a conserved pathway that restricts transposable elements, and these frequently engage a "ping-pong" amplification loop. Certain stages of mammalian testis also accumulate abundant piRNAs of unknown function, whic...
A sufficient condition for secure ping–pong protocols is repretsented. This condition, called name– suffixing, is essentially to insert identities of participants in messages. We prove its sufficiency and discuss the feature of security in terms of name–suffixing.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید