Results 71 to 80 of about 21,896,620 (367)
Inbreeding Affects on Beetle Clustering [PDF]
The Red Flour Beetle (Tribolium castaneum; Coleoptera: Tenebrionidae) is a common pest in many grain mills (Baldwin and Fasulo 2010) and found wherever grains or other dried foods are stored (Schröder 2008).
Key, Morgan, Marshall, Jeremy
core
The glacier ice worm Mesenchytraeus solifugus survives year‐round at 0 °C. Its ATP6 subunit, which forms a regulatory component of the proton pore in mitochondrial ATP synthase, has a carboxy‐terminal extension not found in any other organism examined to date. Here, we show that fusion of this extension to the homologous AtpB protein in E. coli results
Truman Dunkley+2 more
wiley +1 more source
Deinodryinus velteni sp. n. is described from middle Eocene Baltic amber. The species differs from other fossil Palaearctic species of Deinodryinus Perkins owing to the shape of the antenna (clavate, with distal part very thickened), the large compound ...
Adalgisa Guglielmino, Massimo Olmi
doaj +1 more source
Inquiry Teaching: It is Easier than You Think! [PDF]
This article is a survey of the literature on inquiry teaching. Many teachers do not participate in inquiry teaching for various reasons. The following are the main reasons: it takes too much time; students do not learn what they need for the state test;
Key, S., Owens, D.
core +1 more source
In modular polyketide synthases, the dehydratase (DH) domain catalyzes the dehydration reaction of the β‐hydroxyacyl unit attached to the cognate acyl carrier protein (ACP) domain. However, it is unclear how DH interacts with ACP during the reaction. In this study, we identified DH–ACP interface residues, providing the first detailed insights into DH ...
Kaede Kotagiri+8 more
wiley +1 more source
Network Coding Multicast Key-Capacity [PDF]
For a multi-source multi-terminal noiseless network, the key-dissemination problem involves the task of multicasting a secret key K from the network sources to its terminals. As in secure multicast network-coding, in the key-dissemination problem the source nodes have access to independent randomness and, as the network is noiseless, the resulting key ...
arxiv
Araneibatrus gracilipes gen. n. and sp. n. from South China is described and illustrated. The systematic position of the genus is discussed.
Li-Zhen Li, Zi-Wei Yin, Mei-Jun Zhao
doaj +1 more source
Current Mobile Payment Procedures on the German Market from the View of Customer Requirements [PDF]
The key to mobile payment acceptance is in the hands of customers. In this paper we use the results of the mobile payment survey MP1 in order to identify and roughly weigh the most relevant acceptance criteria.
Pousttchi, Key, Zenker, M.
core
Functional variation among LPMOs revealed by the inhibitory effects of cyanide and buffer ions
This study addresses the inhibition of lytic polysaccharide monooxygenases (LPMOs) by cyanide and explains how and why the magnitude of observed inhibitory effects depends on the way LPMO reactions are setup and on the type of LPMO. Enzymes known as lytic polysaccharide monooxygenases (LPMOs) are mono‐copper polysaccharide‐degrading peroxygenases that ...
Ole Golten+10 more
wiley +1 more source
Physical Unclonable Functions for Device Authentication and Secret Key Generation
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs).
G. Suh, S. Devadas
semanticscholar +1 more source