نتایج جستجو برای: gtma

تعداد نتایج: 14  

2017
Stephen K Dolan Tobias Bock Vanessa Hering Rebecca A Owens Gary W Jones Wulf Blankenfeldt Sean Doyle

Gliotoxin is an epipolythiodioxopiperazine (ETP) class toxin, contains a disulfide bridge that mediates its toxic effects via redox cycling and is produced by the opportunistic fungal pathogen Aspergillus fumigatus Self-resistance against gliotoxin is effected by the gliotoxin oxidase GliT, and attenuation of gliotoxin biosynthesis is catalysed by gliotoxin S-methyltransferase GtmA. Here we des...

2016
Elizabeth B. Smith Stephen K. Dolan David A. Fitzpatrick Sean Doyle Gary W. Jones

Gliotoxin (GT) is a mycotoxin produced by some species of ascomycete fungi including the opportunistic human pathogen Aspergillus fumigatus. In order to produce GT the host organism needs to have evolved a self-protection mechanism. GT contains a redox-cycling disulfide bridge that is important in mediating toxicity. Recently is has been demonstrated that A. fumigatus possesses a novel thiometh...

2013
Hossein Safari Abdol Hossein Jafarzadeh Ehsan khanmohammadi Mohammad Reza Fathi

Selection of technologies is one of the most challenging decision making areas the management of a company encounters. It is difficult to clarify the right technology alternatives because the number of technologies is increasing and the technologies are becoming more and more complex. The objective of this paper is to present a new method for selecting technology by using of Interval GTMA metho...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2008
Je Won Park Jay Sung Joong Hong Niranjan Parajuli Won Seok Jung Sung Ryeol Park Si-Kyu Lim Jae Kyung Sohng Yeo Joon Yoon

Since the first use of streptomycin as an effective antibiotic drug in the treatment of tuberculosis, aminoglycoside antibiotics have been widely used against a variety of bacterial infections for over six decades. However, the pathways for aminoglycoside biosynthesis still remain unclear, mainly because of difficulty in genetic manipulation of actinomycetes producing this class of antibiotics....

Journal: :Operations Management Research 2022

Recent disasters, such as the ongoing COVID-19 pandemic, have sparked an interest in new applications for unmanned aerial vehicles (UAVs) humanitarian aid. Nevertheless, there are still many divisive changes that need to be made order implement UAVs into a country’s sector successfully. Hence, this paper aims analyze various barriers hindering implementation of logistics both developed and deve...

Journal: :International Journal of Heat and Technology 2021

Cryogenic treatment is a sustainable manufacturing process preferred to improve the properties of material. In present study, effect cryo treated tungsten carbide cobalt bonded insert (WC-Co) measured in terms tool life and surface finish on dry turning high strength AISI4340 steel at different machine parametric conditions. The observations Untreated (UT) Deep Cryo Treated (DCT) inserts were c...

Journal: :international journal of industrial engineering and productional research- 0
ali mohaghar ridge, al-e-ahmad-chamran hw cross, faculty of management, university of tehran, tehran 14155-1163, iran mojtaba kashef m.s candidate of industrial management, dept. of management, university of tehran ehsan kashef khanmohammadi m.s candidate of industrial management, dept. of management, university of tehran

considering the major change occurred in business cells from plant to “chain” and the critical need to choose the best partners to form the supply chain for competing in today’s business setting, one of the vital decisions made at the early steps of constructing a business is supplier selection. given the fact that the early decisions are inherently strategic and therefore hard and costly to ch...

Journal: :Computers & Industrial Engineering 2022

Industry Internet of Things (IIoT) has become the most evolving area over last few years. The number IoT devices connected in industry sharply elevated but this surge led to vulnerability and data breach such as if a malicious entry is made secure network, it will forfeit all network resources. For purpose full pledged authentication method essential safeguard IIoT network. There bulky list aut...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید