نتایج جستجو برای: cell elisa

تعداد نتایج: 1715061  

ژورنال: :فیض 0
علی فاضلی ali fazeli department of bacteriology & virology, isfahan university of medical sciences, isfahan, iranدانشگاه علوم پزشکی اصفهان، گروه باکتری شناسی و ویروس شناسی محمد رضا نفیسی mohamamd reza nafisi کامبیز حاذقی kambiz hazeghi احمد قوامی نژاد ahmad ghavaminejad

سابقه و هدف: با توجه به کاربرد روش های متعدد در تشخیص عفونت های ناشی از هلیکوباکترپیلوری و با عنایت به مقبولیت روش های غیر تهاجمی از جمله آزمایش های سرولوژیک و وجود گزارش های متناقض در قدرت تشخیصی این آزمایش ها و به منظور تعیین حساسیت و ویژگی دو آزمایش whole-cell elisa و hm-cap elisa، این تحقیق بر روی مراجعه کنندگان به بخش آندوسکوپی بیمارستان الزهرا و فیض اصفهانی طی سال 1375 انجام گرفت. مواد و ...

ژورنال: کومش 2020

Introduction: ELISA is a sensitive, specific, reproducible and fast method to quantify the biological activity of antibodies. Trastuzumab is a humanized monoclonal antibody against HER2 receptors which prevents the initiation of downstream signaling pathway. Trastuzumab can be used as a positive control in the ELISA experiments for anti-HER2 antibodies. Additionaly, insufficient washing and blo...

ژورنال: پژوهش در پزشکی 2011
بهدانی, مهدی, حبیبی انبوهی, مهدی, زینلی, سیروس, کریمی پور, مرتضی, آزادمنش, کیهان , اسدزاده, نادر , خان احمد, حسین , خبیری, علیرضا ,

Abstract Background: In molecular approach, serum of camel contains a unique type of antibodies devoid of light chains since the light chain is missing, the heavy-chain antibodies should bind their antigen by one single domain, the variable domain of the heavy immunoglobulin chain. Vascular endothelial growth factor receptor-2 (VEGFR-2) is one of the important proteins in angiogenesis which...

1996
Ahmad Baraani-Dastjerdi Josef Pieprzyk Reihaneh Safavi-Naini

In this paper, we employ the view model given by Bertino to propose a new design approach for a secure multi-level object-oriented database system. The central idea is to provide the user with a multi-level view derived from a single-level secure object-oriented database. Hence the database operations performed on the multi-level views are decomposed into a set of operations on the single-level...

BackgroundAtaxia telangiectasia (A-T) is a common genetically inherited cause of early childhood-onset ataxia. The infrequency of this disease, vast phenotype variation, disorders with features similar to those of A-T, and lack of definite laboratory test, make diagnosis difficult.  In addition, there is no rapid reliable laboratory method for identifying A-T heterozygotes, who susceptible to i...

1999
Savith Kandala Ravi S. Sandhu

Bertino, Ferrari and Atluri (BFA) have recently presented a model for specifying and enforcing authorization constraints for Workflow Management Systems (WFMS). The model is comprehensive and exhibits strong properties such as (1) a language to express constraints, (2) formal notions of constraint consistency and (3) algorithms for role-task and user-task assignments. In this paper, we extend t...

Journal: :IACR Cryptology ePrint Archive 2015
Yongge Wang

Recently, IACR ePrint archive posted two fully homomorphic encryption schemes without bootstrapping. In this note, we show that these schemes are trivially insecure. Furthermore, we also show that the encryption schemes of Liu and Wang [6] in CCS 2012 and the encryption scheme of Liu, Bertino, and Xun [5] in ASIACCS 2014 are insecure either.

2012
Kai Samelin Henrich Christopher Pöhls Arne Bilzhause Joachim Posegga Hermann de Meer

In this paper, we present a provably secure redactable signature scheme allowing to independently redact structure and content. We identify the problems when structure is not separated from content, resulting in an attack on the scheme proposed at VLDB ’08 by Kundu and Bertino. The attack allows for changing the semantic meaning of a given tree. We introduce a rigid security model, including co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید