نتایج جستجو برای: cell elisa
تعداد نتایج: 1715061 فیلتر نتایج به سال:
سابقه و هدف: با توجه به کاربرد روش های متعدد در تشخیص عفونت های ناشی از هلیکوباکترپیلوری و با عنایت به مقبولیت روش های غیر تهاجمی از جمله آزمایش های سرولوژیک و وجود گزارش های متناقض در قدرت تشخیصی این آزمایش ها و به منظور تعیین حساسیت و ویژگی دو آزمایش whole-cell elisa و hm-cap elisa، این تحقیق بر روی مراجعه کنندگان به بخش آندوسکوپی بیمارستان الزهرا و فیض اصفهانی طی سال 1375 انجام گرفت. مواد و ...
Introduction: ELISA is a sensitive, specific, reproducible and fast method to quantify the biological activity of antibodies. Trastuzumab is a humanized monoclonal antibody against HER2 receptors which prevents the initiation of downstream signaling pathway. Trastuzumab can be used as a positive control in the ELISA experiments for anti-HER2 antibodies. Additionaly, insufficient washing and blo...
Abstract Background: In molecular approach, serum of camel contains a unique type of antibodies devoid of light chains since the light chain is missing, the heavy-chain antibodies should bind their antigen by one single domain, the variable domain of the heavy immunoglobulin chain. Vascular endothelial growth factor receptor-2 (VEGFR-2) is one of the important proteins in angiogenesis which...
In this paper, we employ the view model given by Bertino to propose a new design approach for a secure multi-level object-oriented database system. The central idea is to provide the user with a multi-level view derived from a single-level secure object-oriented database. Hence the database operations performed on the multi-level views are decomposed into a set of operations on the single-level...
BackgroundAtaxia telangiectasia (A-T) is a common genetically inherited cause of early childhood-onset ataxia. The infrequency of this disease, vast phenotype variation, disorders with features similar to those of A-T, and lack of definite laboratory test, make diagnosis difficult. In addition, there is no rapid reliable laboratory method for identifying A-T heterozygotes, who susceptible to i...
Bertino, Ferrari and Atluri (BFA) have recently presented a model for specifying and enforcing authorization constraints for Workflow Management Systems (WFMS). The model is comprehensive and exhibits strong properties such as (1) a language to express constraints, (2) formal notions of constraint consistency and (3) algorithms for role-task and user-task assignments. In this paper, we extend t...
Recently, IACR ePrint archive posted two fully homomorphic encryption schemes without bootstrapping. In this note, we show that these schemes are trivially insecure. Furthermore, we also show that the encryption schemes of Liu and Wang [6] in CCS 2012 and the encryption scheme of Liu, Bertino, and Xun [5] in ASIACCS 2014 are insecure either.
In this paper, we present a provably secure redactable signature scheme allowing to independently redact structure and content. We identify the problems when structure is not separated from content, resulting in an attack on the scheme proposed at VLDB ’08 by Kundu and Bertino. The attack allows for changing the semantic meaning of a given tree. We introduce a rigid security model, including co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید