Spelling suggestions: "subject:"price)"" "subject:"crime)""
81 |
Japan China's policy Koizumi as a "presidential" prime minister and the foreign and security policymaking process /Horiuchi, Toru. January 2009 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2009. / Includes bibliographical references (leaves 269-283). Also available in print.
|
82 |
The Julia and Mandelbrot sets for the Hurwitz zeta functionTingen, Larry L. January 2009 (has links) (PDF)
Thesis (M.A.)--University of North Carolina Wilmington, 2009. / Title from PDF title page (February 21, 2010) Includes bibliographical references (p. 116-119)
|
83 |
Big primes and character values for solvable groupsSoares, Eliana Farias E. January 1983 (has links)
Thesis (Ph. D.)--University of Wisconsin--Madison, 1983. / Typescript. Vita. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaf 75).
|
84 |
Struggle to lead the Japanese prime minister's power and his conduct of economic policy /Shinoda, Tomohito, January 1994 (has links)
Thesis (Ph. D.)--Johns Hopkins University, 1994. / Vita. Includes bibliographical references (leaves 262-283).
|
85 |
Powerful groups of prime power order /Wilson, Lawrence Eugene. January 2002 (has links)
Thesis (Ph. D.)--University of Chicago. / Includes bibliographical references. Also available on the Internet.
|
86 |
An exposition of the deterministic polynomial-time primality testing algorithm of Agrawal-Kayal-Saxena /Anderson, Robert Lawrence, January 2005 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Mathematics, 2005. / Includes bibliographical references (p. 39-40).
|
87 |
A polynomial time algorithm for prime recognitionDomingues, Riaal. January 2006 (has links)
Thesis (M. Sc.)(Mathematics)--University of Pretoria, 2006. / Includes bibliographical references. Available on the Internet via the World Wide Web.
|
88 |
Peace, progress and prosperity, a biography of the Hon. Walter ScottBarnhart, Gordon Leslie. January 1998 (has links) (PDF)
No description available.
|
89 |
The Prime-and-Realign Process of the Influenza A Virus Occurs to Rescue Cap-Snatched Primers on the Basis of Length and RNA Duplex StabilityDe Vlugt, Corey 05 December 2018 (has links)
Cap-snatching by the influenza A virus (IAV) RNA-dependant RNA polymerase (RdRp) is driven by the abundance of transcripts being actively transcribed by host RNA polymerase II (Pol II)[1]–[3]. Deviations from a direct correlation with abundance do arise, due to selective cleavage of transcripts with a compatible length (10 to 13 nucleotides) and nucleotide sequence (ending in 3’AG)[4]–[7]. Some cap-snatched primers are not directly used to transcribe mRNA, but instead undergo a prime-and-realign mechanism (PAR). As of yet it is unknown why this process occurs. My hypothesis is that the prime-and-realign process is related to the physical characteristics of the primers and their interactions with RdRp and the vRNA template. Here, I used four published deep sequencing datasets of the 5’ ends of IAV mRNA obtained from IAV infected A549 cells to examine PAR[1], [7]–[9]. Primers are biased towards PAR on the basis of length (<12 nucleotides) and RNA duplex stability (mediated by the base directed at 3’U1 and the pyrimidine-purine base pair at position four). PAR typically adds a GCA addition resulting in a primer three nucleotides longer ending in a compatible nucleotide sequence with 3’U1. Prime-and-realign converts poor primers on the basis of length and sequence compatibility with the 3’ end of the vRNA into one that can efficiently undergo transcription of the critical conserved sequence without errors, or failure. Prime-and-realign, therefore, affords tremendous flexibility to RdRp in cap snatched primer length and sequence compatibility.
|
90 |
Prime numbers and encryptionAnicama, Jorge 25 September 2017 (has links)
In this article we will deal with the prime numbers and its current use in encryption algorithms. Encryption algorithms make possible the exchange of sensible data in internet, such as bank transactions, email correspondence and other internet transactions where privacy is important.
|
Page generated in 0.0252 seconds