نتایج جستجو برای: known as dhu

تعداد نتایج: 5882666  

Journal: :Nucleic acids research 2001
R Venkhataraman C D Donald R Roy H J You P W Doetsch Y W Kow

Endonuclease III from Escherichia coli, yeast (yNtg1p and yNtg2p) and human and E.coli endonuclease VIII have a wide substrate specificity, and recognize oxidation products of both thymine and cytosine. DNA containing single dihydrouracil (DHU) and tandem DHU lesions were used as substrates for these repair enzymes. It was found that yNtg1p prefers DHU/G and exhibits much weaker enzymatic activ...

Journal: :ادب فارسی 0
مرضیه گلرنگ دانش آموختة کارشناسی ارشد زبان و ادبیات فارسی دانشگاه تهران و پژوهشگر فرهنگستان زبان و ادب فارسی

abu'l faid thawban ibn ibrahim, known as dhu'l-nun al-misri, is one of the most prominent figures in the history of sufism.  he is certainly considered as one of the top ten sufi scholars throughout the history. recognition of his status and his unheard words, as an effective criterion of western islam-world, seems necessary to recognize islamic sufism, for most of resources appreciat...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد علوم دارویی - پژوهشکده علوم 1392

purpose a metabolic abnormality such as obesity is a major obstacle in the maintenance of the human health system and causes various chronic diseases including type 2 diabetes, hypertension, cardiovascular diseases, as well as various cancers. this study was designed to summarize the recent scientific knowledge regarding the anti-obesity role of curcumin (diferuloylmethane), which is isolated f...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده حقوق 1392

abstract the problems caused by the traditional system of criminal justice (which are based on remuneration and rehabilitation) such as, lack of attention to victim’s rights and position and society, underlie the emergence of restorative justice which had the victim-centered perspective, with respect to the role of the offender and participation of civil society. meanwhile, criminal mediation ...

Journal: :Nucleic acids research 1998
J Liu P W Doetsch

Dihydrouracil (DHU) is a DNA base damage product produced in significant amounts by ionizing radiation damage to cytosine under anoxic conditions. DHU represents a model for pyrimidine base damage (ring saturation products) of the type recognized and repaired by Escherichia coli endonuclease III and its homologs in other species. We have built this lesion into synthetic oligonucleotides, with D...

Journal: :Advanced materials and technologies 2022

Abstract Disordered hyperuniformity (DHU) is one of the most prominent manifestations engineered disorder, which aims to circumvent limitations commonly related order. Considering k ‐space, isotropic DHU characterized by an suppression scattering for wavenumbers approaching zero. Thereby, stealthy a particularly strong form DHU, where even suppressed 0 < ≤ K within circular window radius . A...

Journal: :Scientific American 1876

Journal: :The Biochemical journal 1986
D E Harrison M Poje B Rocic S J Ashcroft

Dehydrouramil hydrate hydrochloride (DHU), a stable analogue of alloxan, inhibited the phosphorylation of an endogenous protein of Mr 53,000 catalysed by a Ca2+-calmodulin-dependent protein kinase in extracts of islets of Langerhans. The concentration of DHU required for 50% inhibition was 0.09 mM. DHU did not inhibit islet cyclic AMP-dependent protein kinase and caused only slight inhibition o...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم پایه دامغان 1390

the space now known as complete erdos space ec was introduced by paul erdos in 1940 as the closed subspace of the hilbert space ?2 consisting of all vectors such that every coordinate is in the convergent sequence {0} ? { 1 n : n ? n}. in a solution to a problem posed by lex g. oversteegen we present simple and useful topological characterizations of ec. as an application we determine the ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید