期刊文献+
共找到14,207篇文章
< 1 2 250 >
每页显示 20 50 100
Time Dilation Cosmology 3: Mathematical Proof of the 3 Temporal and 2 Spatial Acceleration Factors
1
作者 Joseph H. (Cass) Forrington 《Journal of Modern Physics》 2024年第12期2228-2237,共10页
This is the fifth paper in a series on Time Dilation Cosmology, TDC. TDC is an eternal holographic model of the universe based on time dilation that ties astrophysics to quantum physics and resolves all the conundrums... This is the fifth paper in a series on Time Dilation Cosmology, TDC. TDC is an eternal holographic model of the universe based on time dilation that ties astrophysics to quantum physics and resolves all the conundrums in astrophysics and serves as a model for the unified field. In the author’s previous four TDC papers, it was demonstrated that all gravitationally induced velocities are compensation for the apparent difference in the rates of time, “dRt”, due to mass/energy densities, and, vice-versa, in all force-induced velocities the dRt is compensation for the velocity, so the uniform evolution of the continuum at c is maintained at the invariant 1 s/s rate of time of the universe as a whole. These compensations make it impossible for an event to lag behind or get ahead of the evolving continuum. When the author did the first velocity formula derivations in “General Relativity: Effects in Time as Causation” [1], the author felt the explanations for the appearance of the 2spatial and the 3temporal acceleration factors in the formulas were correct, but poorly explained and incomplete. This paper is a proof of the temporal and spatial acceleration factors used in the time dilation-based velocity formula derivations in the Time Dilation Cosmology model. 展开更多
关键词 Mathematical proof Time Dilation Cosmology Acceleration Factors
下载PDF
基于UTXO模型区块链的众包物流可信身份认证模型
2
作者 李致远 吴越 +1 位作者 张威威 李沅格 《江苏大学学报(自然科学版)》 CAS 北大核心 2025年第1期57-63,共7页
针对现有集中式众包物流平台中用户身份数据存储与管理存在的隐私泄露和篡改问题,提出一种基于UTXO模型区块链的众包物流可信身份认证模型.该模型包括利用区块链技术实现身份注册、身份验证、身份撤销及身份认证.针对链上存储用户隐私... 针对现有集中式众包物流平台中用户身份数据存储与管理存在的隐私泄露和篡改问题,提出一种基于UTXO模型区块链的众包物流可信身份认证模型.该模型包括利用区块链技术实现身份注册、身份验证、身份撤销及身份认证.针对链上存储用户隐私数据风险的问题,采用混合加解密方案对链上个人信息做安全存储与分享;针对平台认证用户身份的问题,采用可信身份凭证以零知识证明方式登录众包物流平台.对身份信息以及认证进行安全性分析,并将该方法与LIU方法、LI方法的安全性能进行了对比.在Python3.9环境下完成试验,进行了身份信息加密和零知识身份认证测试分析.结果表明该方案的认证时延和处理事务能力均优于现有的SHAO方案. 展开更多
关键词 众包物流 区块链 身份管理 UTXO模型 可信身份认证 零知识证明
下载PDF
Glia-to-neuron reprogramming to the rescue?
3
作者 Jack W.Hickmott Cindi M.Morshead 《Neural Regeneration Research》 SCIE CAS 2025年第5期1395-1396,共2页
Over the last two decades,the dogma that cell fate is immutable has been increasingly challenged,with important implications for regenerative medicine.The brea kth rough discovery that induced pluripotent stem cells c... Over the last two decades,the dogma that cell fate is immutable has been increasingly challenged,with important implications for regenerative medicine.The brea kth rough discovery that induced pluripotent stem cells could be generated from adult mouse fibroblasts is powerful proof that cell fate can be changed.An exciting extension of the discovery of cell fate impermanence is the direct cellular reprogram ming hypothesis-that terminally differentiated cells can be reprogrammed into other adult cell fates without first passing through a stem cell state. 展开更多
关键词 programming PASSING proof
下载PDF
Corrigendum: MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons
4
《Neural Regeneration Research》 SCIE CAS 2025年第4期945-945,共1页
There is an error in the name of the cell line in the abstract of the published paper“MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons”published on pages 2698-2707,Issue 12,Volume 19 of Ne... There is an error in the name of the cell line in the abstract of the published paper“MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons”published on pages 2698-2707,Issue 12,Volume 19 of Neural Regeneration Research(Sharma et al.,2024),because of oversight during final proof checking.The correct description should be“human-GABA receptor A-α1/β2/γ2L human embryonic kidney(HEK)recombinant cell line.”The authors apologize for any inconvenience this correction may cause for readers and editors of Neural Regeneration Research. 展开更多
关键词 FUNCTION proof correction
下载PDF
基于区块链的民航旅客隐私信息保护方案
5
作者 李文轩 曹卫东 《郑州大学学报(理学版)》 CAS 北大核心 2025年第2期69-77,共9页
目前的民航信息系统必须获取机票和旅客明文信息,才能进行出行验证,存在很高的旅客隐私信息泄露风险。针对此问题,提出一种基于区块链的民航旅客隐私信息保护方案。首先利用网络身份标识和数字证书技术实现区块链账户的实名制注册,确保... 目前的民航信息系统必须获取机票和旅客明文信息,才能进行出行验证,存在很高的旅客隐私信息泄露风险。针对此问题,提出一种基于区块链的民航旅客隐私信息保护方案。首先利用网络身份标识和数字证书技术实现区块链账户的实名制注册,确保信息的真实性;其次采用零知识证明和环签名叠加构造安全的信息认证协议,实现旅客隐私信息完全匿名验证,确保真实信息匿名可验证性;进一步对存储在区块链上的敏感信息利用K-匿名技术脱敏,加强信息的安全存储。实验结果和性能分析表明,该方案能够提供安全有效的民航旅客隐私信息保护,且必要的信息验证总耗时满足效率需求。 展开更多
关键词 民航旅客信息 隐私信息保护 区块链 零知识证明 K-匿名技术
下载PDF
Fool-Proof法在图书馆工作中的应用浅探 被引量:3
6
作者 黄建年 《冶金信息导刊》 2007年第1期36-39,22,共5页
防呆法在企业生产中有大量的应用,在一些大型企业中也取得了显著的效果。作为一个服务部门和信息生产部门,图书馆应用防呆法无疑有助于图书馆的自动化和规范化。根据防呆法原理从10个方面详细列举了防呆法在图书馆的可能应用。
关键词 Fool-proof PKKA-YOKE 愚巧法 防错法 图书馆
下载PDF
民事诉讼表见证明的性质定位及其构造
7
作者 孙晨曦 《北京科技大学学报(社会科学版)》 2025年第1期51-60,共10页
如何认定事实并适用法律,是诉讼中经常遇到的问题。从强化法官心证、缓解当事人证明负担以及保障当事人双方武器平等等因素考量,表见证明作为一种特殊的事实认定方式,在审判实践中发挥着不可替代的作用。但对于如何界定表见证明,理论研... 如何认定事实并适用法律,是诉讼中经常遇到的问题。从强化法官心证、缓解当事人证明负担以及保障当事人双方武器平等等因素考量,表见证明作为一种特殊的事实认定方式,在审判实践中发挥着不可替代的作用。但对于如何界定表见证明,理论研究与判例在经历了长时间的争论后依然莫衷一是,导致我国《民事诉讼法》在考虑是否引进该制度时显得顾虑重重。文章认为,为使表见证明发挥应有的功能价值,应当在明晰其性质的基础上,通过域外相关理论的借鉴,分析和梳理其基本构造,从而对我国民事立法提供有效经验。 展开更多
关键词 表见证明 事实认定 武器平等原则 证明负担减轻 经验法则
下载PDF
电影《相助》片尾曲《The Living Proof》的功能文体学分析
8
作者 盛桂兰 《兰州教育学院学报》 2018年第10期98-100,共3页
电影歌曲作为整部电影的有机组成部分,其重要性不可小觑,一首好的歌曲能达到锦上添花的观影效果。目前国内对电影歌词的研究,大多集中在音乐学、美学、文学等语言学之外的领域,从功能语言学的角度对电影歌曲的解读尚且不多。本文拟以系... 电影歌曲作为整部电影的有机组成部分,其重要性不可小觑,一首好的歌曲能达到锦上添花的观影效果。目前国内对电影歌词的研究,大多集中在音乐学、美学、文学等语言学之外的领域,从功能语言学的角度对电影歌曲的解读尚且不多。本文拟以系统功能语法理论为指导,从语境、经验功能、人际功能着手解析电影《相助》片尾曲《The Living Proof》,以期丰富系统功能语法的研究内容,为电影歌词的分析提供新的视角,帮助观影者深度理解影片主题。 展开更多
关键词 《相助》 《The LIVING proof 系统功能语法
下载PDF
FORMAL PROOF OF RELATIVE STRENGTH OF SECURITY AMONG ECK2007 MODEL AND OTHER PROOF MODELS FOR KEY AGREEMENT PROTOCOLS 被引量:2
9
作者 夏金月 王建东 +2 位作者 方黎明 任勇军 卞仕柱 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第4期282-288,共7页
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ... The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided. 展开更多
关键词 CRYPTOGRAPHY security data key agreement protocol proof model
下载PDF
大数据证明的司法适用与理论检视
10
作者 孙珊 《北京科技大学学报(社会科学版)》 2025年第1期69-78,共10页
在刑事司法活动中,业已出现了有异于传统证明的大数据证明方式。通过对我国当下司法实践中适用案件的观察性分析,可归纳出大数据在刑事司法领域中的证明作用主要表现为:证明涉案主体的同一性、信息载体的关联性、海量信息的涉案数额、... 在刑事司法活动中,业已出现了有异于传统证明的大数据证明方式。通过对我国当下司法实践中适用案件的观察性分析,可归纳出大数据在刑事司法领域中的证明作用主要表现为:证明涉案主体的同一性、信息载体的关联性、海量信息的涉案数额、犯罪行为、犯罪构成中的特征信息五个方面。与传统司法证明相比,大数据证明最鲜明的特点体现为智能化、模型化及特殊相关性,要认识其内在原理与运行机制,可采取一种“海量信息+数据处理+结论”的要素思维。文章基于司法适用和内在机理对大数据证明进行理论上的检视,认为首先应当确立能够作为定案依据的大数据证明结论证据本位的法律属性规范,其次厘清其作为机器意见的事实认定原理,最后尝试以算法应用场景的稳定性为标准建立类案通用型和个案专门型二元分化的审查进路范式。 展开更多
关键词 大数据证明 司法适用 事实认定 司法审查
下载PDF
限缩法定犯适用的证明困境及其出路
11
作者 陈苏豪 《海南大学学报(人文社会科学版)》 2025年第1期151-161,共11页
在法定犯时代,为避免刑法过度适用减损国家治理整体效果,刑法学界提出了司法限缩方案,希望通过激活违法性认识的适用、严格审查前置的违法性、实质判断法益侵害程度来实现出罪减责。上述主张忽略了司法证明对构成要件的反向制约作用。... 在法定犯时代,为避免刑法过度适用减损国家治理整体效果,刑法学界提出了司法限缩方案,希望通过激活违法性认识的适用、严格审查前置的违法性、实质判断法益侵害程度来实现出罪减责。上述主张忽略了司法证明对构成要件的反向制约作用。违法性认识证明困难,决定其应作为责任要素,而非故意要素。行政监管的专业性和复杂性决定了,片面强调司法认定的独立性,否定行政鉴定与行政认定证据资格,不具有现实性。应区分关于专门性问题的报告和行政机关处理决定或意见,对前者参照司法鉴定意见予以规制,将后者归入辅助资料。将个人法益受到侵害作为法定犯构罪的前提,与增设法定犯特别是抽象危险犯立法目的不相适应。抽象危险和具体损害,只有通过反向刑事推定方可建立可转换的联系,从而实现积极出罪。 展开更多
关键词 刑法扩张 法定犯 构成要件 司法证明 证据规则
下载PDF
爆炸性环境用电动机轴承火花放电的研究
12
作者 宋占松 《煤矿机械》 2025年第1期43-45,共3页
隔爆型电动机在工业生产中具有重要地位,然而轴承火花放电问题可能对其安全运行和性能产生重大影响。首先阐述了隔爆型电动机的工作原理及重要性;然后深入分析了轴承火花放电的产生机制,包括摩擦、电蚀等因素的作用;通过对实际案例的研... 隔爆型电动机在工业生产中具有重要地位,然而轴承火花放电问题可能对其安全运行和性能产生重大影响。首先阐述了隔爆型电动机的工作原理及重要性;然后深入分析了轴承火花放电的产生机制,包括摩擦、电蚀等因素的作用;通过对实际案例的研究和试验数据分析,探讨了轴承火花放电对电动机性能和可靠性的危害,如降低轴承寿命、增加故障风险等;进一步提出了预防和控制轴承火花放电的措施。 展开更多
关键词 隔爆型电动机 轴承 火花放电 爆炸环境
下载PDF
Comments and Research on Proofs of Chain Rule 被引量:1
13
作者 张通 《Chinese Quarterly Journal of Mathematics》 CSCD 2001年第3期100-104,共5页
In this paper we point out that the proofs of Chain Rule in many intensively used textbooks are not strict an construct anexa mple of a composite function f(u) which is differentiable with respects t o the independe... In this paper we point out that the proofs of Chain Rule in many intensively used textbooks are not strict an construct anexa mple of a composite function f(u) which is differentiable with respects t o the independednt variable u, but is not differentiable with respect to the dependent variable u=g(x). A strict proof of Chain Rule is presented. Incon sistency of the form and content of Chain Rule is disclosed. 展开更多
关键词 Chain Rule proof unstrict
下载PDF
Study on Ignition Proof AZ91D Magnesium Alloy Chips with Cerium Addition 被引量:8
14
作者 周宏 李伟 +1 位作者 王明星 赵宇 《Journal of Rare Earths》 SCIE EI CAS CSCD 2005年第4期466-469,共4页
The effect of Ce on ignition point of AZ91D magnesium alloy chips was studied. For the AZ91D and the AZ91D-xCe magnesium alloys, changing the sizes of the chips in the range of 58 - 270 μm has a limited influence on ... The effect of Ce on ignition point of AZ91D magnesium alloy chips was studied. For the AZ91D and the AZ91D-xCe magnesium alloys, changing the sizes of the chips in the range of 58 - 270 μm has a limited influence on ignition point, however, the shift of the content of Ce has much effect on ignition point. Increasing the Ce content, x from 0.15 to 0.25, the ignition point increases with increasing of Ce; however, x from 0.25 to 0.45, the ignition point decreases with increasing of Ce. By the addition of Ce of 0.25 %. the ignition point is raised by 43℃. 展开更多
关键词 metal materials ignition proof CERIUM CHIPS magnesium alloy rare earths
下载PDF
Group Signature Based on Non-interactive Zero-Knowledge Proofs 被引量:2
15
作者 周福才 徐剑 +1 位作者 李慧 王兰兰 《China Communications》 SCIE CSCD 2011年第2期34-41,共8页
Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for ... Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for short) with NIZK proofs is proposed which can prove and sign the multiple values rather than individual bits based on DLIN assumption. DLAGS does not need to interact between the verifier and issuer,which can decrease the communication times and storage cost compared with the existing interactive group signature schemes. We prove and sign the blocks of messages instead of limiting the proved message to only one bit(0 or 1) in the conventional non-interactive zero-knowledge proof system,and we also prove that our scheme satisfy the property of anonymity,unlinkability and traceability. Finally,our scheme is compared with the other scheme(Benoitt's scheme) which is also based on the NIZK proofs system and the DLIN assumption,and the results show that our scheme requires fewer members of groups and computational times. 展开更多
关键词 group signature non-interactive zero-knowledge proofs commitment scheme groth-sahai proofs system
下载PDF
A SIMPLE PROOF OF STABILITY AND CONVERGENCE IN L_2 FOR SOME DIFFERENCE SCHEMES AND THEIR EXTRAPOLATION METHOD FOR PARABOLIC EQUATIONS 被引量:1
16
作者 孙志忠 《Journal of Southeast University(English Edition)》 EI CAS 1994年第2期1-6,共6页
ASIMPLEPROOFOFSTABILITYANDCONVERGENCEINL_2FORSOMEDIFFERENCESCHEMESANDTHEIREXTRAPOLATIONMETHODFORPARABOLICEQU... ASIMPLEPROOFOFSTABILITYANDCONVERGENCEINL_2FORSOMEDIFFERENCESCHEMESANDTHEIREXTRAPOLATIONMETHODFORPARABOLICEQUATIONSSunZhizhong... 展开更多
关键词 simpld proof Wabelic equatiuns DIFFERENCE SCHEMES STABILITY convergenee EXTRAPOLATION METHOD
下载PDF
Game-Based Automated Security Proofs for Cryptographic Protocols 被引量:1
17
作者 顾纯祥 光焱 祝跃飞 《China Communications》 SCIE CSCD 2011年第4期50-57,共8页
Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof ... Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof framework with sequences of games.We make slight modifications to Blanchet's calculus to make it easy for parsing the initial game.The main contribution of this work is that it introduces algebraic properties with observational equivalences to automatic security proofs,and thus can deal with some practical cryptographic schemes with hard problems.We illustrate the use of algebraic properties in the framework by proving the semantic security of the ElGamal encryption scheme. 展开更多
关键词 cryptographic protocols probable security automatic security proof process calculus
下载PDF
Local Geometric Proof of Riemann Conjecture 被引量:3
18
作者 Chuanmiao Chen 《Advances in Pure Mathematics》 2020年第10期589-610,共22页
Riemann hypothesis (RH) is a difficult problem. So far one doesn’t know how to go about it. Studying <i>ζ</i> and using analysis method likely are two incor-rect guides. Actually, a unique hope may study... Riemann hypothesis (RH) is a difficult problem. So far one doesn’t know how to go about it. Studying <i>ζ</i> and using analysis method likely are two incor-rect guides. Actually, a unique hope may study Riemann function <img alt="" src="Edit_8fcdfff5-6b95-42a4-8f47-2cabe2723dfc.bmp" />, <img alt="" src="Edit_6ce3a4bd-4c68-49e5-aabe-dec3e904e282.bmp" />, <img alt="" src="Edit_29ea252e-a81e-4b21-a41c-09209c780bb2.bmp" /> by geometric analysis, which has the symmetry: v=0 if <i>β</i>=0, and basic expression <img alt="" src="Edit_bc7a883f-312d-44fd-bcdd-00f25c92f80a.bmp" />. We show that |u| is single peak in each root-interval <img alt="" src="Edit_d7ca54c7-4866-4419-a4bd-cbb808b365af.bmp" /> of <i>u</i> for fixed <em>β</em> ∈(0,1/2]. Using the slope u<sub>t</sub>, we prove that <i>v</i> has opposite signs at two end-points of I<sub>j</sub>. There surely exists an inner point such that , so {|u|,|v|/<em>β</em>} form a local peak-valley structure, and have positive lower bound <img alt="" src="Edit_bac1a5f6-673e-49b6-892c-5adff0141376.bmp" /> in I<sub>j</sub>. Because each <i>t</i> must lie in some I<sub>j</sub>, then ||<em>ξ</em>|| > 0 is valid for any <i>t</i> (<i>i.e.</i> RH is true). Using the positivity <img alt="" src="Edit_83c3d2cf-aa7e-4aba-89f5-0eb44659918a.bmp" /> of Lagarias (1999), we show the strict monotone <img alt="" src="Edit_87eb4e9e-bc7b-43e3-b316-5dcf0efaf0d5.bmp" /> for <i>β</i> > <i>β</i><sub>0</sub> ≥ 0 , and the peak-valley structure is equiva-lent to RH, which may be the geometric model expected by Bombieri (2000). This research follows Liuhui’s methodology: “Computing can detect the un-known and method”.</i> 展开更多
关键词 Riemann Conjecture Local Geometric proof Symmetry Peak-Valley Struc-ture EQUIVALENCE Liuhui’s Methodology
下载PDF
A Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID 被引量:1
19
作者 Wen-Tsai Ko Shin-Yan Chiou +1 位作者 Erl-Huei Lu Henry Ker-Chang Chang 《Applied Mathematics》 2012年第4期336-341,共6页
An RFID (Radio-Frequency IDentification) system provides the mechanism to identify tags to readers and then to execute specific RFID-enabled applications. In those applications, secure protocols using lightweight cryp... An RFID (Radio-Frequency IDentification) system provides the mechanism to identify tags to readers and then to execute specific RFID-enabled applications. In those applications, secure protocols using lightweight cryptography need to be developed and the privacy of tags must be ensured. In 2010, Batina et al. proposed a privacy-preserving grouping proof protocol for RFID based on ECC (Elliptic Curve Cryptography) in public-key cryptosystem. In the next year, Lv et al. had shown that Batina et al.’s protocol was insecure against the tracking attack such that the privacy of tags did not be preserved properly. Then they proposed a revised protocol based on Batina et al.’s work. Their revised protocol was claimed to have all security properties and resisted tracking attack. But in this paper, we prove that Lv et al.’s protocol cannot work properly. Then we propose a new version protocol with some nonce to satisfy the functions of Batina et al.’s privacy-preserving grouping proof protocol. Further we try the tracing attack made by Lv et al. on our protocol and prove our protocol can resist this attack to recover the untraceability. 展开更多
关键词 ECC RFID GROUPING proof PRIVACY-PRESERVING
下载PDF
Proof of concept study to identify candidate biomarkers of fibrosis using high throughput peptide aptamer microarray and validate by enzyme linked immunosorbant assay 被引量:1
20
作者 Sam Straw Paul Ko Ferrigno +2 位作者 Qifeng Song Darren Tomlinson Francesco Del Galdo 《Journal of Biomedical Science and Engineering》 2013年第8期32-42,共11页
Background: Nine proteins were identified as putative profibrotic biomarkers in systemic sclerosis (SSc) and an unrelated fibrotic disease in a previously published proteomic study. As the majority of these proteins w... Background: Nine proteins were identified as putative profibrotic biomarkers in systemic sclerosis (SSc) and an unrelated fibrotic disease in a previously published proteomic study. As the majority of these proteins were orphans of commercially available antibodies, the nine proteins were investigated to determine whether binding peptide aptamers of the Stefin A quadruple mutant-Tracy variant (referred to as “affimers”) could be validated by enzyme linked immunosorbant assay (ELISA) to allow the quantification of these candidate biomarkers in the sera of SSc patients. Materials and Methods: Candidate biomarker peptides were analysed by high throughput affimer microarray to identify binding affimers. Two candidate biomarkers were prioritised, and binding affimers were expressed from genetically modified BL21 competent E. coli strains and purified. These affimers were used in indirect ELISA, and then sandwich ELISA formats against the candidate biomarker recombinant proteins osteonectin and pigment epi-thetlium-derived factor (PEDF). Results: 39 affimers were identified as binders for eight of the nine candidate biomarker peptides were by affimer microarray;six for osteonectin and eleven for PEDF. Two of the six and all eleven were able to recognize physiological concentrations (5 and 1 μg·ml﹣1) of osteonectin and PEDF, respectively by indirect ELISA. In sandwich ELISA format: two affimers were able to detect recombinant PEDF;however, the two affimers identified in indirect ELISA were unable to recognise recombinant osteonectin, and were thus hypothesised to bind to osteonectin at the same binding site. Discussion: SSc is currently an orphan of fully validated biomarkers, which is required for the development of stratified medicine in this field. This approach has laid the groundwork for an affimer based on multiplexed assay, to validate biomarkers in the sera of SSc patients in the future. 展开更多
关键词 FIBROSIS Biomarker Peptide APTAMER SYSTEMIC SCLEROSIS proof of Concept
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部