Abstract P-574

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Math 574

1. Reference and definition The formulation of the “divided cell” algorithm as an approach to the study of the values of a function f (x, y) that is a product of two inhomogeneous linear forms on a lattice in R2 appears in E. S. Barnes, “The inhomogeneous minima of binary quadratic forms (IV)”, Acta Math. 92 (1954) 235–264. Although this is the fourth paper in a series, the first three were wri...

متن کامل

Npgrj_nsmb_1591 574..581

Most proteins must fold into precise three-dimensional conformations to fulfill their biological functions. Here we review recent concepts emerging from studies of protein folding in vitro and in vivo, with a focus on how proteins navigate the complex folding energy landscape inside cells with the aid of molecular chaperones. Understanding these reactions is also of considerable medical relevan...

متن کامل

568 - 574 Shaban Gohardehi.pmd

Parasitic gastrointestinal infections are one of the most important health problems in the developing countries, which lead to the onset of intestinal disease particularly diarrhoea. Due to the particular geographic situation in the Mazandaran province, individuals are infected with various intestinal parasites. The aim of this study was to determine the prevalence rate of enteropathogenic para...

متن کامل

Dmd054205 566..574

The bile salt export pump (BSEP) is located on the canalicular plasma membrane of hepatocytes and plays an important role in the biliary clearance of bile acids (BAs). Therefore, any drug or new chemical entity that inhibits BSEP has the potential to cause cholestasis and possibly liver injury. In reality, however, one must consider the complexity of the BA pool, BA enterohepatic recirculation ...

متن کامل

EECS 574 : Computational Complexity Theory Final

Zero-knowledge proofs are proofs that yield nothing (i.e. knowledge) beyond the validity of the assertion being proven. This fascinating nature made them directly applicable in the domain of cryptography: they were typically used to force malicious parties to behave according to a predetermined protocol. In addition to their intermediate applicability in cryptography, zero-knowledge proofs serv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Pediatric Critical Care Medicine

سال: 2018

ISSN: 1529-7535

DOI: 10.1097/01.pcc.0000538031.58569.4e