نتایج جستجو برای: strand protocol

تعداد نتایج: 284992  

Journal: :Clinical molecular pathology 1996
I Petersen M B Reichel M Dietel

Aims-To develop a protocol that is applicable to single strand conformation polymorphism (SSCP), direct sequencing and loss of heterozygosity analysis of DNA.Methods-The protocol is based on the detection of biotinylated DNA by a Streptavidin-alkaline phosphatase conjugate. Biotinylation of DNA was achieved by using 5'-end biotinylated primers for PCR. After polyacrylamide gel electrophoresis, ...

Journal: :Intelligent Automation & Soft Computing 2011
Jing-Jing Gui Jinshuang Wang Yu-sen Zhang Tao Zhang

The threat analysis for routing protocol is a significant issue in the ad-hoc network security. In this paper we propose a framework in which the vulnerabilities from the Sybil attack for ad-hoc routing protocol can be modeled in a mathematic approach, and the formal analysis is carried out with a specific proof system under the extended strand space model in order to further verify the validit...

Journal: :J. Information Security 2010
Yongjian Li Jun Pang

In this paper, we show how to use the novel extended strand space method to verify Kerberos V. First, we formally model novel semantical features in Kerberos V such as timestamps and protocol mixture in this new framework. Second, we apply unsolicited authentication test to prove its secrecy and authentication goals of Kerberos V. Our formalization and proof in this case study have been mechani...

2000
Joshua D. GUTTMAN F. Javier THAYER Fábrega

One protocol (called the primary protocol) is independent of other protocols (jointly called the secondary protocol) if the question whether the primary protocol achieves a security goal never depends on whether the secondary protocol is in use. In this paper, we use multiprotocol strand spaces ([27], cf. [28]) to prove that two cryptographic protocols are independent if they use encryption in ...

Journal: :Journal of Computer Security 2001
Dawn Xiaodong Song Sergey Berezin Adrian Perrig

We propose a new efficient automatic verification technique, Athena, for security protocol analysis. It uses a new efficient representation — our extension to the Strand Space Model, and utilizes techniques from both model checking and theorem proving approaches. Athena is fully automatic and is able to prove the correctness of many security protocols with arbitrary number of concurrent runs. T...

Hossein Tavakoli-Anbaran, Nadere Naderi

Introduction: Passage of ionizing radiation through the organs of living creatures develops clusters of damaged nucleotides inside the DNA rounds. 192Ir Gamma source is one of the most widely used sources in brachytherapy of cervical and prostate cancer. Thus, in this research, we investigated the flux of photons and its resulting secondary electrons, the single-strand break (S...

Journal: :acta medica iranica 0
a. m. navali a. r. rouhani j. mortazavi

although the increase in the number of core sutures during flexor tendon repair increases the tensile strength of the repair, both increased handling at the time of repair and increased bulk at the repair site have been hypothesized as affecting clinical outcomes by increasing gliding resistance. the purpose of our study was to assess whether increasing the number of core sutures from two stran...

2016
Eugene Judson

Eugene Judson is an Associate Professor of for the Mary Lou Fulton Teachers College at Arizona State University. His past experiences include having been a middle school science teacher, Director of Academic and Instructional Support for the Arizona Department of Education, a research scientist for the Center for Research on Education in Science, Mathematics, Engineering and Technology (CRESMET...

Journal: :EMBO reports 2001
C E Besnier H Kong

N.BstNBI is a nicking endonuclease that recognizes the sequence GAGTC and nicks one DNA strand specifically. The Type IIs endonuclease, MlyI, also recognizes GAGTC, but cleaves both DNA strands. Sequence comparisons revealed significant similarities between N.BstNBI and MlyI. Previous studies showed that MlyI dimerizes in the presence of a cognate DNA, whereas N.BstNBI remains a monomer. This s...

Journal: :Fly 2010
Li M Li David N Arnosti

The structure of chromatin in eukaryotes exerts significant influences on many DNA related processes, including transcription, replication, recombination and repair. A useful tool for mapping chromatin structure is micrococcal nuclease (MNase), which induces double-strand breaks within nucleosome linker regions, and with more extensive digestion, single-strand nicks within the nucleosome itself...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید