نتایج جستجو برای: amal donqul
تعداد نتایج: 393 فیلتر نتایج به سال:
Amal M. Banafa, Sadia Roshan, Yunyi Liu (柳昀熠), Shasha Zhao(赵沙沙), Guangxiao Yang (杨广笑) , Guangyuan He (何光源) , Mingjie Chen (陈明洁: 通讯作者)# The Genetic Engineering International Cooperation Base of Ministry of Science and Technology, Key Laboratory of Molecular Biophysics of Chinese Ministry of Education, College of Life Science and Technology, Huazhong University of Science & Technology (HUST), Luo...
A set of vertices S resolves a graph G if every vertex is uniquely determined by its vector of distances to the vertices in S. The metric dimension of G is the minimum cardinality of a resolving set of G. Let {G1, G2, . . . , Gn} be a finite collection of graphs and each Gi has a fixed vertex v0i or a fixed edge e0i called a terminal vertex or edge, respectively. The vertex-amalgamation of G1, ...
A graph G of size q is graceful if there exists an injective function f : V (G) → {0, 1, . . . , q} such that each edge uv of G is labeled |f(u)− f(v)| and the resulting edge labels are distinct. Also, a (p, q) graph G with q ≥ p is harmonious if there exists an injective function f : V (G) → Zq such that each edge uv of G is labeled f(u)+f(v) (mod q) and the resulting edge labels are distinct,...
Knowledge and its practice are two things that very related; the of something should be based on knowledge so what is done in accordance with teachings religion. Ironically, some people, without knowledge, dare to do full confidence. This paper aims discuss relationship between charity Qur'an how apply these concepts life. research was library research; data collected using Mawdu'i method. The ...
Qiang Wang, Heriberto Pfeiffer, Rose Amal, and Dermot O'Hare introduce the Reaction Chemistry & Engineering themed collection on CO 2 capture, utilization storage (CCUS).
This paper introduces AMAL, an automated and behavior-based malware analysis and labeling system that addresses shortcomings of the existing systems. AMAL consists of two sub-systems, AutoMal and MaLabel. AutoMal provides tools to collect low granularity behavioral artifacts that characterize malware usage of the file system, memory, network, and registry, and does that by running malware sampl...
A number of mutant Chinese hamster ovary (CHO) cell lines resistant to the cytotoxic action of alpha-amanitin have been isolated. The alpha-amanitin sensitivity of the different mutant cell lines varied widely, but correlated well with the alpha-amanitin sensitivity of the RNA polymerase II activity in each of these mutant cell lines. In comparison with the RNA polymerase II of wild-type cells,...
A number of mutant Chinese hamster ovary (CHO) cell lines resistant to the cytotoxic action of n-amanitin have been isolated. The a-amanitin sensitivity of the different mutant cell lines varied widely, but correlated well with the au-amanitin sensitivity of the RNA polymerase II activity in each of these mutant cell lines. In comparison with the RNA polymerase II of wild-type cells, three muta...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید