首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6篇
  免费   0篇
化学工业   1篇
轻工业   1篇
无线电   2篇
一般工业技术   1篇
自动化技术   1篇
  2022年   1篇
  2021年   1篇
  2019年   1篇
  2015年   1篇
  2014年   1篇
  2011年   1篇
排序方式: 共有6条查询结果,搜索用时 15 毫秒
1
1.
The voltage-gated K+ channels Kv3.1 display fast activation and deactivation kinetics and are known to have a crucial contribution to the fast-spiking phenotype of certain neurons. AahG50, as a natural product extracted from Androctonus australis hector venom, inhibits selectively Kv3.1 channels. In the present study, we focused on the biochemical and pharmacological characterization of the component in AahG50 scorpion venom that potently and selectively blocks the Kv3.1 channels. We used a combined optimization through advanced biochemical purification and patch-clamp screening steps to characterize the peptide in AahG50 active on Kv3.1 channels. We described the inhibitory effect of a toxin on Kv3.1 unitary current in black lipid bilayers. In silico, docking experiments are used to study the molecular details of the binding. We identified the first scorpion venom peptide inhibiting Kv3.1 current at 170 nM. This toxin is the alpha-KTx 15.1, which occludes the Kv3.1 channel pore by means of the lysine 27 lateral chain. This study highlights, for the first time, the modulation of the Kv3.1 by alpha-KTx 15.1, which could be an interesting starting compound for developing therapeutic biomolecules against Kv3.1-associated diseases.  相似文献   
2.
The emergence of cloud computing is contributing to the integration of multiple services, in particular VoIP services. While the cloud has recently been used for performing security attacks targeting IP telephony, it also provides new opportunities for supporting the security of this service. In that context, we propose a risk management strategy for VoIP cloud based on security countermeasures that may be outsourced as services. We present the architecture of our solution and its components in the context of services implementing the SIP protocol. We describe the mathematical modelling supporting our approach and detail different treatment strategies for the application of countermeasures. Finally, we quantify the benefits and limits of these strategies based on extensive simulation results. When a countermeasure fails, these strategies allow us to maintain the risk level low at an additional cost of up to 7%, or to accept an additional risk of up to 12%. They can also be combined to obtain a trade‐off between cost and performance. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
3.
Journal of Materials Science: Materials in Electronics - In this work, the structural and dielectric properties for Mg0.5Co0.5Fe2O4 ferrite (abbreviated as MCFO) prepared by sol–gel process...  相似文献   
4.
In this paper, a new analytic method for the fractional state space modeling of non-integer systems is presented. The tool of orthogonal functions and particularly the block pulse basis is used jointly with their generalized operational matrices in order to establish the state space representation which is not always obvious in the fractional framework. The commensurate case which is the simplest one is firstly handled. Then, the same development is generalized to the non-commensurate case defining so a nonlinear criterion to be minimized. Examples and simulations are presented to show the usefulness of the technique.  相似文献   
5.
6.
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号