Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Identity-based

Paste Mixing. The active materials for both positive and negative plates are made from the identical base materials. Lead oxide, fibers, water, and a dilute solution of sulfuric acid are combined in an agitated batch mixer or reactor to form a pastelike mixture of lead sulfates, the normal, tribasic, and tetrabasic sulfates, plus PbO, water, and free lead. The positive and negative pastes differ only in additives to the base mixture. Organic expanders, barium sulfate [7727-43-7] BaSO carbon, and occasionally mineral oil are added to the negative paste. Red lead [1314-41 -6] or minium, Pb O, is sometimes added to the positive mix. The paste for both electrodes is characterized by cube weight or density, penetration, and raw plate density. [Pg.576]

A strain Rhodococcus IMP-S02 capable of desulfurization of 4,6-dimethyl DBT was isolated, and was reported to be similar to R. globerulus (99.8% identity), based on 16S rRNA analysis. The products of desulfurization of DBT were verified by GC-MS and were the same desulfurized products obtained from IGTS8 [49],... [Pg.78]

ICAM-1 and -2 are constitutively expressed on endothelial cells ICAM-1 may be further up-regulated by exposure to cytokines. ICAM-3 has recently been described (its identity based on the unique specificity of a monoclonal antibody) and is a 124-kDa glycoprotein present on the surfaces of T cells, monocytes and neutrophils its expression may be up-regulated by stimulants such as mitogens. VCAM-1, which is expressed on the luminal surface of cytokine-exposed endothelial cells, binds T cells via VLA-4. It is also expressed on the surface of some leukaemic cell lines, on rheumatoid synovial cells and on some tumours.On the other hand, ICAM-1 is found on all endothelial surfaces, and its interaction with neutrophil integrins is the major mechanism that results in the stimulation of transendothelial migration. [Pg.103]

Figure 10.7 Electrophoretogram of dendritic nucleic acid 4 (lane 2) and a linear analog of identical base composition (lane 3). Lanes 1 and 4 marker dyes xylene cyanol (XC) and bromophenol blue (BPB). (Reprinted with permission from reference 23, copyright (1993) American Chemical Society.)... Figure 10.7 Electrophoretogram of dendritic nucleic acid 4 (lane 2) and a linear analog of identical base composition (lane 3). Lanes 1 and 4 marker dyes xylene cyanol (XC) and bromophenol blue (BPB). (Reprinted with permission from reference 23, copyright (1993) American Chemical Society.)...
It is noteworthy also that excitons, which have also been assumed, on the basis of some of the optical properties of DNA, to be locahzed to one base, have recently been shown to be delocahzed. In the experiments of Rist et al. [35] it has been shown that, when there are two identical bases adjacent to each other, the exciton is delocalized over the two bases. [Pg.79]

Biometrics means a method of verifying an individual s identity based on measurement of the individual s physical feature(s) or repeatable action(s) where those features and/or actions are both unique to that individual and measurable. [Pg.43]

When dividing identical bases, you subtract the exponents. [Pg.163]

When multiplying identical bases, keep the same base and add the exponents ... [Pg.42]

There are numerous cases, where identical bases, mismatched bases, and even complementary bases in protonated states are involved in hydrogen bonding. Examples are as follows Protonated adenine (HA+) has been observed in DNA mismatches as well as in RNA in pairs such as HA 1 (antl) G(syn) and HA+(anti) C(anti) (70). Poly(A) forms HA+ HA+ self-pairs in a parallel strand fashion at pH <4 (21). Protonated cytosine (HC+) exists in hemiproto-nated polyC (i-motif) (32), in HC+(anti) G(syn) (71), in a HC+ C RNA... [Pg.394]

More recent research and development efforts have resulted in a second kind of digital certificate, the attribute certificate [10] that can be used for supporting attribute-based access control systems. An attribute certificate has a structure similar to an identity certificate but contains attributes that specify access control information associated with the certificate holder (e.g., group membership, role, security clearance). Note that in principle these attributes can be placed in the extension fields of identity certificates [12]. However, this is not a viable solution for two main reasons. First, the certificate authorities who issue the identity certificates are not usually responsible for this kind of authorization information. As a result, certificate authorities must take additional steps to obtain access control information from the source. Second, the lifetime associated with attribute-based information is different from the lifetime associated with identity-based certificates. In an attribute... [Pg.289]

The DNA double helix is not necessarily the continuous smooth structure shown in Figure 10.20. There may be bulges of various sorts, loops, and palindromic hairpin turns. A palindrome is a section of DNA in which the two DNA strands have an identical base sequence running in opposite directions. Figure 10.23 shows a double-stranded DNA with some such features. Of most interest are the cruciform bulges and palindromic structures. Note that in the cruciform structure, there are two pairs of palindromic sequences on the vertical... [Pg.290]

Identity Based on amino acid sequence of protein... [Pg.42]

Size of Public Key File The problem is that the public key file might be large, proportional to w, the number of subsets. In the Complete Subtree method w = 2N — 1 and in the Subtree Difference method it is N log N. An interesting open problem is to come up with a public-key cryptosystem where it is possible to compress the public-keys to a more manageable size. For instance, an identity-based cryptosystem would be helpful for the information-theoretic case where keys are assigned independently. A recent proposal that fits this requirement is [8]. [Pg.18]

D. Boneh and M. Franklin. Identity Based Encryption. Manuscript, 2001. [Pg.31]

What s the score Using the identity-based scoring system (Section 7,2). calculate the score for the following alignment. Do you think the score is statistically significant ... [Pg.298]

Unfortunately, the inverse is not necessarily true. If the spectra are identical, based on the algorithm used for comparison, the peak can stiU be impure for one or several of three possible reasons ... [Pg.1121]

Moreover, atom-type -state indices were proposed as molecular descriptors encoding topological and electronic information related to particular atom types in the molecule [Hall and Kier, 1995a Hall et al., 1995b]. They are calculated by summing the -state values of all atoms of the same atom type in the molecule. Each atom type is first defined by atom identity, based on the atomic number Z, and valence state, itself identified by the valence state indicator (VST) defined as ... [Pg.162]

The need to identify microorganisms rapidly has led to the development of a number of molecular identification and characterization tools. These have not yet become routinely adopted in the analytical or diagnostic laboratory but will probably do so in the future. One such technique isolates and amplifies 16S ribosomal DNA and, following sequencing of the bases, compares this with known sequences held in a reference library. This approach enables phylogenetic relationships to be derived even for those bacteria that have not previously been identified. Other systems examine the patterns of key constituents of the cells such as fatty acids and assign identities based on similarity matches to known reference cultures. [Pg.43]

The isolated degradant was analyzed by NMR and mass spectrometry for structural identity. Based on LC/MS data collected, the isolated degradant was confirmed to have an addition of 14 Da to the molecular weight of the drug substance, indicative of a ketone moiety. NMR analysis confirmed that the M+14 degradant contained a carbonyl group at the benzylic site shown. [Pg.374]

Sham85 Adi Shamir Identity-Based Cryptosystems and Signature Schemes Crypto 84, LNCS 196, Springer-Verlag, Berlin 1985,47-53. [Pg.384]

The replication process requires that each double-helical molecule of DNA produce two identical molecules of DNA. This means that wherever a G-C or A-T base pair occurs in the parental molecule, the identical base pair must occur in the progeny molecules. However, many factors interfere with accurate replication of DNA. If an A should pair with C or G with T as a result of tautomeriza-tion (Chapter 23), a point mutation (a change in one base pair) will result. Occasionally, a segment of DNA will be replicated more than once (duplication) or a segment may fail to be replicated (deletion). These and other aberrations in DNA replication do occur, but the mechanism of replication has evolved to minimize such mistakes. [Pg.546]

Figure 6.11 Alignment of identities only versus the Blosum 62 matrix. Repeated shuffling and scoring reveal the significance of sequence alignment for human myoglobin versus lupine leghemoglobin with the use of either (A) the simple, identity-based scoring system or (B) the Blosum-62 matrix. The scores for the alignment of the authentic sequences are shown in red. The Blosum matrix provides greater statistical power. Figure 6.11 Alignment of identities only versus the Blosum 62 matrix. Repeated shuffling and scoring reveal the significance of sequence alignment for human myoglobin versus lupine leghemoglobin with the use of either (A) the simple, identity-based scoring system or (B) the Blosum-62 matrix. The scores for the alignment of the authentic sequences are shown in red. The Blosum matrix provides greater statistical power.
Which alignment has a higher score if the identity-based scoring system (Section 6.2 is used Which alignment has a higher score if the Blosum-62 substitution matrix (Figure 6.9) is used ... [Pg.182]


See other pages where Identity-based is mentioned: [Pg.28]    [Pg.511]    [Pg.98]    [Pg.17]    [Pg.364]    [Pg.163]    [Pg.114]    [Pg.287]    [Pg.210]    [Pg.245]    [Pg.57]    [Pg.37]    [Pg.531]    [Pg.162]    [Pg.315]    [Pg.286]    [Pg.67]    [Pg.398]    [Pg.317]    [Pg.31]    [Pg.31]    [Pg.31]   
See also in sourсe #XX -- [ Pg.31 ]




SEARCH



Composition, protein identity based

DNA-based tissue identity testing

Identity Based Theory Reduction

Protein identity sequence-based

Protein identity, based on composition

© 2024 chempedia.info