Results 81 to 90 of about 626,535 (304)

Long gaps between primes [PDF]

open access: yes, 2014
Let $p_n$ denotes the $n$-th prime. We prove that $$\max_{p_{n+1} \leq X} (p_{n+1}-p_n) \gg \frac{\log X \log \log X\log\log\log\log X}{\log \log \log X}$$ for sufficiently large $X$, improving upon recent bounds of the first three and fifth authors and ...
Kevin Ford   +4 more
semanticscholar   +1 more source

Interplay between circadian and other transcription factors—Implications for cycling transcriptome reprogramming

open access: yesFEBS Letters, EarlyView.
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley   +1 more source

Bounded gaps between primes with a given primitive root [PDF]

open access: yes, 2014
Fix an integer $g \neq -1$ that is not a perfect square. In 1927, Artin conjectured that there are infinitely many primes for which $g$ is a primitive root.
P. Pollack
semanticscholar   +1 more source

Real‐time assay of ribonucleotide reductase activity with a fluorescent RNA aptamer

open access: yesFEBS Letters, EarlyView.
Ribonucleotide reductases (RNR) synthesize DNA building blocks de novo, making them crucial in DNA replication and drug targeting. FLARE introduces the first single‐tube real‐time coupled RNR assay, which enables isothermal tracking of RNR activity at nanomolar enzyme levels and allows the reconstruction of allosteric regulatory patterns and rapid ...
Jacopo De Capitani   +4 more
wiley   +1 more source

Prime languages

open access: yesInformation and Computation, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Orna Kupferman, Jonathan Mosheiff
openaire   +2 more sources

Smelly primes – when olfactory primes do or do not work

open access: yesFrontiers in Psychology, 2014
In applied olfactory cognition the effects that olfactory stimulation can have on (human) behavior are investigated. To enable an efficient application of olfactory stimuli a model of how they may lead to a change in behavior is proposed.
M. Smeets, G. Dijksterhuis
semanticscholar   +1 more source

On the Riemann hypothesis and the difference between primes [PDF]

open access: yes, 2014
We prove some results concerning the distribution of primes assuming the Riemann hypothesis. First, we prove the explicit result that there exists a prime in the interval $(x-\frac{4}{\pi} \sqrt{x}...
Adrian W. Dudek
semanticscholar   +1 more source

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

Counting Functions to Generate The Primes in the RSA Algorithm and Diffie-Hellman Key Exchange

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2018
        The Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods  depended on selecting the primes p and q in order  to be secure enough .
Faez Ali AL-Maamori, Mazin Saied Rashid
doaj   +1 more source

Home - About - Disclaimer - Privacy