>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到After-the-Fact相关记录32条 . 查询时间(0.053 秒)
近日,内蒙古细胞分子调控重点实验室那顺布和课题组揭示了组蛋白分子伴侣FACT复合物调控全基因组范围内基因表达的分子机制。研究成果以“Transcriptional Regulation of FACT Involves Coordination of Chromatin Accessibility and CTCF Binding”为题发表在Journal of Biological Chemis...
在真核生命中,遗传信息载体DNA分子被一类特殊的蛋白-组蛋白(histone)有序地组织起来,逐级形成核小体(nucleosome)、染色质纤维(chromatin fiber)、染色质环(chromatin loop)、染色质TAD等关键中间结构,最终组装成具有复杂拓扑结构的染色质,将DNA层层包裹。所有与DNA有关的生命活动(比如DNA复制、修复、重组、基因转录等)都需要将这层层被包裹的DNA...
中国科学院物理研究所/北京凝聚态物理国家研究中心软物质物理重点实验室从2002年开始逐步建立起以磁镊力谱和荧光光谱为主的单分子研究体系,在DNA凝聚(JACS 2006,PRL 2012)、DNA与抗癌药物作用(NAR 2009, PRE 2015)、端粒四联体DNA折叠(JACS 2013)以及DNA解旋酶分子机理(EMBOJ 2008,NAR 2015,PRL 2016)等多个课题中取得了系列...
两句耳熟能详的俗语“龙生龙,凤生凤”和“龙生九子各不相同”道出了生物遗传现象中两个关键的特点:相似性和特异性。人类基因组精确测序显示人类基因的差异很小(<0.3%),这解释了遗传相似性的来源;另一方面,基因被一类称为组蛋白的生物大分子通过层层组装形成高度有序的染色质结构,受重塑因子、组装因子、组蛋白和DNA的化学修饰以及组蛋白变体等多种因素影响,导致了遗传的特异性。单分子操纵技术是研究染色质动态调...
The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the adversary obtains side-channel information from the real world implementation of these a...
On October 28, the National Science Foundation (NSF) announced in the Federal Register the Notice of Availability and Notice of Public Meetings for the Draft Environmental Impact Statem...
On May 23, the National Science Foundation (NSF) announced in the Federal Register the beginning of an environmental impact statement (EIS) process to evaluate potential environmental impact...
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this ...
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the ...
Side-channel attacks are severe type of attack against implementation of cryptographic primitives. Leakage-resilient cryptography is a new theoretical approach to formally address the problem of sid...
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Incre...
The paper statistically observed the recorded data of the series of social clashes and violence in Ambon, Indonesia in the period of social conflict between 1999-2004. The scaling laws are revealed an...
Critical thinking, while highly valued as an ability of health care providers, remains a skill that many educators find difficult to teach. This review provides an analysis examining why current metho...
Involving young workers in occupational safety and health (OSH) is a powerful tool to help strengthen workplace safety culture and performance. Getting young people to buy in to the safety culture of ...
The generative surface reconstruction problem can be stated like this: Given a finite collection of 3D shapes, create a small set of functions that can be combined to generate the given shapes ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...