Results 61 to 70 of about 548,676 (308)

Evolution Equation of Phenotype Distribution: General Formulation and Application to Error Catastrophe

open access: yes, 2006
An equation describing the evolution of phenotypic distribution is derived using methods developed in statistical physics. The equation is solved by using the singular perturbation method, and assuming that the number of bases in the genetic sequence is ...
A. E. Mayo   +17 more
core   +1 more source

The IQ‐compete assay for measuring mitochondrial protein import efficiencies in living yeast cells

open access: yesFEBS Letters, EarlyView.
The efficiency of mitochondrial protein import depends on the properties of the newly synthesized precursor proteins. The Import and de‐Quenching Competition (IQ‐compete) assay is a novel method to monitor the import efficiency of different proteins by fluorescence in living yeast cells.
Yasmin Hoffman   +3 more
wiley   +1 more source

Why highly expressed proteins evolve slowly [PDF]

open access: yes, 2005
Much recent work has explored molecular and population-genetic constraints on the rate of protein sequence evolution. The best predictor of evolutionary rate is expression level, for reasons which have remained unexplained.
Akashi   +41 more
core   +4 more sources

Targeting EZH2 reverses thyroid cell dedifferentiation and enhances iodide uptake in anaplastic thyroid cancer

open access: yesFEBS Letters, EarlyView.
Anaplastic thyroid cancer (ATC) lacks iodide uptake ability due to MAPK activation increasing the expression of the histone methyltransferase EZH2, which represses thyroid differentiation genes (TDGs) such as the sodium iodide symporter (NIS). Dual inhibition of MAPK (U0126) and EZH2 (EPZ6438/Tazemetostat) reverses this mechanism, thus restoring TDG ...
Diego Claro de Mello   +6 more
wiley   +1 more source

A robust audio steganography algorithm based on differential evolution

open access: yesDianxin kexue, 2021
Audio steganography is to hide secret information into the audio carrier and has become a research hotspot in the field of information hiding.Most of the existing studies focus on minimizing distortion at the expense of steganography capacity, and it is ...
Zhaopin SU   +4 more
doaj   +2 more sources

In silico genetic robustness analysis of microRNA secondary structures: potential evidence of congruent evolution in microRNA

open access: yesBMC Evolutionary Biology, 2007
Background Robustness is a fundamental property of biological systems and is defined as the ability to maintain stable functioning in the face of various perturbations.
Ni Ming   +4 more
doaj   +1 more source

Evolution of Canalizing Boolean Networks

open access: yes, 2007
Boolean networks with canalizing functions are used to model gene regulatory networks. In order to learn how such networks may behave under evolutionary forces, we simulate the evolution of a single Boolean network by means of an adaptive walk, which ...
A. Szejka   +19 more
core   +2 more sources

Generalized Langevin equations for a driven tracer in dense soft colloids: construction and applications [PDF]

open access: yes, 2014
We describe a tracer in a bath of soft Brownian colloids by a particle coupled to the density field of the other bath particles. From the Dean equation, we derive an exact equation for the evolution of the whole system, and show that the density field ...
Bénichou, Olivier   +2 more
core   +1 more source

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy