نتایج جستجو برای: n7
تعداد نتایج: 848 فیلتر نتایج به سال:
BACKGROUND Constituent part of radical lung resection for lung cancer is a dissection of mediastinal lymph nodes. Lymphadenectomy is a standard procedure in an assessment of clinical stage of the disease. The aim of the study was to map metastasizing of bronchogenic non-small cell lung carcinoma into homolateral mediastinal lymph nodes and to assess the importance of mediastinal lymphadenectomy...
The thermodynamics and kinetics for the monofunctional binding of the antitumor drug cisplatin, cis-diamminedichloroplatinum(II), to a purine base site of DNA were studied computationally using guanine and adenine as model reactants. A dominating preference for initial attack at the N7-position of guanine is established experimentally, which is a crucial first step for the formation of a 1,2-in...
Quantitation of DNA adducts in human tissues has been achieved with highly sensitive techniques based on adduct radiolabeling, antisera specific for DNA adducts or modified DNA, and/or adduct structural characterization using chemical instrumentation. Combinations of these approaches now promise to elucidate specific adduct structures and provide detection limits in the range of 1 adduct/10(9) ...
Flavivirus methyltransferase catalyzes both guanine N7 and ribose 2'-OH methylations of the viral RNA cap (GpppA-RNA-->m(7)GpppAm-RNA). The methyltransferase is physically linked to an RNA-dependent RNA polymerase (RdRp) in the flaviviral NS5 protein. Here, we report genetic interactions of West Nile virus (WNV) methyltransferase with the RdRp and the 5'-terminal stem-loop of viral genomic RNA....
S-Adenosyl-L-methionine (SAM) dependent methyltransferases (MTases) play crucial roles in many biological processes. The MTase of the dengue virus is of particular interest for the development of antiviral drugs against flaviviruses. It catalyzes two distinct methylation reactions at the N7 and the 2'O position of the viral RNA cap structure. Based on density functional theory (DFT) electronic ...
In this paper, cyber attack detection and isolation is studied on a network of UAVs in a formation flying setup. As the UAVs communicate to reach consensus on their states while making the formation, the communication network among the UAVs makes them vulnerable to a potential attack from malicious adversaries. Two types of attacks pertinent to a network of UAVs have been considered: a node att...
We present the first polynomial time algorithms for solving the NPcomplete graph problems DOMINATING SET and TOTAL DOMINATING SET when restricted to asteroidal triple-free graphs. We also present algorithms to compute a minimum cardinality dominating set and a minimum cardinality total dominating set on a large superclass of the asteroidal triple-free graphs, called DDP-graphs. These algorithms...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید