6,021 research outputs found

    Bufferin commercial

    Get PDF

    The Maxilla in Rhynchophorous Coleoptera

    Get PDF

    Back flushing on milking machine teat cups

    Get PDF
    THE possibility of replacing the dipping of teat cups between cows with a system of back flushing with water has been investigated for some time by different workers

    How early studies on secreted and membrane protein quality control gave rise to the ER associated degradation (ERAD) pathway: The early history of ERAD

    Get PDF
    AbstractAll newly synthesized proteins are subject to quality control check-points, which prevent aberrant polypeptides from harming the cell. For proteins that ultimately reside in the cytoplasm, components that also reside in the cytoplasm were known for many years to mediate quality control. Early biochemical and genetic data indicated that misfolded proteins were selected by molecular chaperones and then targeted to the proteasome (in eukaryotes) or to proteasome-like particles (in bacteria) for degradation. What was less clear was how secreted and integral membrane proteins, which in eukaryotes enter the endoplasmic reticulum (ER), were subject to quality control decisions. In this review, we highlight early studies that ultimately led to the discovery that secreted and integral membrane proteins also utilize several components that constitute the cytoplasmic quality control machinery. This component of the cellular quality control pathway is known as ER associated degradation, or ERAD. This article is part of a Special Issue entitled: Functional and structural diversity of endoplasmic reticulum

    Bulletin No. 201 - Economic Insects in Some Streams of Northern Utah

    Get PDF
    The food of trout in our mountain streams is mainly insects. It is, in part, land insects that fall on the water and are taken as they float upon its surface, but in a much larger part it is insects that grow up in the water and are taken in their immature stages. These are the constant and dependable food-supply. They have been little studied hitherto. This bulletin is a report of a preliminary examination of some Utah streams, made for the purpose of discovering what forms of life are present in the streams and in what relative abundance. Some are beneficial and some injurious to trout, being competitors with them for food

    Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    Get PDF
    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples
    • …
    corecore