首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13篇
  免费   3篇
研究方法   2篇
综合类   12篇
自然研究   2篇
  2018年   1篇
  2016年   1篇
  2012年   3篇
  2011年   2篇
  2010年   1篇
  2007年   2篇
  2006年   5篇
  2005年   1篇
排序方式: 共有16条查询结果,搜索用时 703 毫秒
11.
CD4(+) T-helper cells that selectively produce interleukin (IL)-17 (T(H)17), are critical for host defence and autoimmunity. Although crucial for T(H)17 cells in vivo, IL-23 has been thought to be incapable of driving initial differentiation. Rather, IL-6 and transforming growth factor (TGF)-β1 have been proposed to be the factors responsible for initiating specification. Here we show that T(H)17 differentiation can occur in the absence of TGF-β signalling. Neither IL-6 nor IL-23 alone efficiently generated T(H)17 cells; however, these cytokines in combination with IL-1β effectively induced IL-17 production in naive precursors, independently of TGF-β. Epigenetic modification of the Il17a, Il17f and Rorc promoters proceeded without TGF-β1, allowing the generation of cells that co-expressed RORγt (encoded by Rorc) and T-bet. T-bet(+)RORγt(+) T(H)17 cells are generated in vivo during experimental allergic encephalomyelitis, and adoptively transferred T(H)17 cells generated with IL-23 without TGF-β1 were pathogenic in this disease model. These data indicate an alternative mode for T(H)17 differentiation. Consistent with genetic data linking IL23R with autoimmunity, our findings re-emphasize the importance of IL-23 and therefore may have therapeutic implications.  相似文献   
12.
The application of the non-explosive expansion material (NEEM) is widely used as the controlled fracture method in quarry mining, especially in hard rocks. The pressure of NEEM is an important parameter in causing rock fracture. An empirical model based on hole spacing was developed to determine the pressure of NEEM in the rock fracture process. Primarily, the empirical model was developed by the mathematical method, utilizing dimensional analysis. Then, the Phase2 code, which is based on the finite element method, was utilized to predict crack growth in rocks. The results of numerical analysis show slight deviations from the empirical model. Hence, the polynomial regression analysis was used to modify the model. Finally, the modified model shows a good agreement with the results gained from numerical modeling.  相似文献   
13.
Coin flipping by telephone protocol(CFP) is utilized in a system to exchange a binary sequence at random between two person apart far from each other. However, CFP cannot he used in a system with many users like in a group environment system. A transmutation of CFP named T-CFP is proposed in this paper. The precondition of T-CFP is the system's user trusts the system center and center's cheating is meaningless at the same time. The significant difference between CFP and T-CFP is that CFP supports only two users while T-CFP can support many users to exchange special information. The security and efficiency of T-CFP are discussed with a detailed example on T-CFP utilization is demonstrated in this paper.  相似文献   
14.
The key problem of securing multieast is to generate, distribute and update Session Encryption Key(SEK). Polynomial expansion with multi-seed (MPE) scheme is an approach which is based on Polynomial expansion (PE) scheme and overcomes PE's shortage. Its operation is demonstrated by using multi-seed, the group member is partitioned to many subgroups. While updating the SEK, computation is needed only in one of subgroups, the other of them will use the computation history to update their SEK. The key problems to design a MPE scheme application includes to find a feasible one way function as well as to generate a Strict Prime Number (SPN). Those technologies with multi-seed and computation history concepts make MPE as a good choice in practical applications. A prototype test system is designed and solutions of all above mentioned problems are included in this proposed paper.  相似文献   
15.
Resource sharing among peers is one of important application in Peer-to-Peer(P2P) network. Inexistenee of server makes P2P network to be a less trustable tool for property owners to distribute their resource. In order to protect intelligent property, reputation management strategy is adopted in many P2P network. As long as a P2P network reputation strategy is confirmed, application designer can employ a special detailed distribution scheme to fulfill content distribution within the net. Shmir (k, n) threshold scheme, for example, is an encryption scheme to enhance the distribution se curity of this kind of design. (k*, n) threshold scheme is a new tool similar to Shmir scheme is proposed in this paper. The new scheme based on polynomial expansion and its security is decided by the one way function used in the secret distribution procedure. The scheme efficiency and its features as well as comparison between new and Shmir scheme are also discussed in this paper.  相似文献   
16.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号