نتایج جستجو برای: ping pong model

تعداد نتایج: 2106751  

1999
Rita Gitik RITA GITIK

We generalize results about the classical Schottky groups to quasiconvex subgroups in negatively curved groups, answering a question of M. Bestvina.

Journal: :Angewandte Chemie 2008
Benjamin Elias Joseph C Genereux Jacqueline K Barton

Ping-Pong Electron Transfer through DNA Benjamin Elias, Prof. , Joseph C. Genereux , Jacqueline K. Barton, Prof. 1 * Division of Chemistry and Chemical Engineering, California Institute of Technology, Pasadena, CA 91125 (USA), Fax: (+1) 626 577 4976 Chimie Organique et Médicinale, Université catholique de Louvain (Belgium) email: Jacqueline K. Barton ([email protected]) Correspondence to Jac...

Journal: :The Biochemical journal 1994
C E French N C Bruce

The NADH-dependent morphinone reductase from Pseudomonas putida M10 catalyses the reduction of morphinone and codeinone to hydromorphone and hydrocodone respectively. Morphinone reductase was purified from crude cell extracts to apparent homogeneity in a single affinity-chromatography step using Mimetic Yellow 2. The purified enzyme was a dimeric flavoprotein with two identical subunits of M(r)...

ژورنال: Journal of Research and Health 2019

Substance abuse disorders are considered to comprise the fourth class of diseases. The aim of the present study was to investigate the effectiveness of the multidimensional treatment procedure comprising mindfulness-based cognitive therapy, exercises (chess, ping pong), and daily self-monitoring reports. This study conducted on 40 drug abusers who were selected using convenience sampling method...

Hamid Reza Kariminia, Mohammad Mansouri Majoumerd

In this study, decolorization of the diazo dye, Reactive Black 5 (RB5) in a Coprinus cinereus peroxidase-catalyzed reaction has been investigated. A bisubstate kinetic model for the reaction rate based on the Ping-Pong mechanism was assumed for the enzymatic decolorization. Experiment...

Journal: :RNA 2012
Jonathan B Preall Benjamin Czech Paloma M Guzzardo Felix Muerdter Gregory J Hannon

In animals, the piRNA pathway preserves the integrity of gametic genomes, guarding them against the activity of mobile genetic elements. This innate immune mechanism relies on distinct genomic loci, termed piRNA clusters, to provide a molecular definition of transposons, enabling their discrimination from genes. piRNA clusters give rise to long, single-stranded precursors, which are processed i...

2014
Antonina Nepeivoda

The paper describes a verification technique based on program transformation with unfolding. The technique allows to find short attacks on multi-party ping-pong protocols in the Dolev–Yao intruder model. Protocols are modelled by prefix grammars, and questions of model optimization and complexity are considered. Examples of model programs for protocols were written in a functional language and ...

Journal: :Genes & development 2015
Kaja A Wasik Oliver H Tam Simon R Knott Ilaria Falciatori Molly Hammell Vasily V Vagin Gregory J Hannon

PIWI proteins and their associated piRNAs protect germ cells from the activity of mobile genetic elements. Two classes of piRNAs—primary and secondary—are defined by their mechanisms of biogenesis. Primary piRNAs are processed directly from transcripts of piRNA cluster loci, whereas secondary piRNAs are generated in an adaptive amplification loop, termed the ping-pong cycle. In mammals, piRNA p...

Journal: :Current Biology 2009
Nicolas Robine Nelson C. Lau Sudha Balla Zhigang Jin Katsutomo Okamura Satomi Kuramochi-Miyagawa Michael D. Blower Eric C. Lai

BACKGROUND Piwi-interacting RNAs (piRNAs) are approximately 24-30 nucleotide regulatory RNAs that are abundant in animal gonads and early embryos. The best-characterized piRNAs mediate a conserved pathway that restricts transposable elements, and these frequently engage a "ping-pong" amplification loop. Certain stages of mammalian testis also accumulate abundant piRNAs of unknown function, whic...

Journal: :IACR Cryptology ePrint Archive 2001
Masao Mori

A sufficient condition for secure ping–pong protocols is repretsented. This condition, called name– suffixing, is essentially to insert identities of participants in messages. We prove its sufficiency and discuss the feature of security in terms of name–suffixing.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید