Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Shalini Guha"'
Autor:
Priyanka Barman, Amala Kaja, Pritam Chakraborty, Shalini Guha, Arpan Roy, Jannatul Ferdoush, Sukesh R Bhaumik
Publikováno v:
GENETICS.
Ataxin-7 maintains the integrity of Spt-Ada-Gcn5-Acetyltransferase (SAGA), an evolutionarily conserved coactivator in stimulating preinitiation complex (PIC) formation for transcription initiation, and thus, its upregulation or downregulation is asso
Publikováno v:
RNA Technologies ISBN: 9783031084140
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2b009d9959cb196127c9be077b2a15e7
https://doi.org/10.1007/978-3-031-08415-7_17
https://doi.org/10.1007/978-3-031-08415-7_17
Autor:
Amala Kaja, Rwik Sen, Sukesh R. Bhaumik, Chhabi K. Govind, Priyanka Barman, Shalini Guha, Jannatul Ferdoush
Publikováno v:
Mol Cell Biol
San1 ubiquitin ligase is involved in nuclear protein quality control via its interaction with intrinsically disordered proteins for ubiquitylation and proteasomal degradation. Since several transcription/chromatin regulatory factors contain intrinsic
Autor:
Shalini Guha, Sukesh R. Bhaumik
Publikováno v:
DNA repair. 109
The genomic DNA is constantly under attack by cellular and/or environmental factors. Fortunately, the cell is armed to safeguard its genome by various mechanisms such as nucleotide excision, base excision, mismatch and DNA double-strand break repairs
Autor:
Souvik Chatterjee, Amrin Zaman, Sukalyan Goswami, Bipasha Mukhopadhyay, Shalini Guha, Abhriya Roy, Saptarshi De, Ratan Kumar Basak, Ronit Ray, Sucheta Nag
Publikováno v:
UEMCON
The security and strength of any cryptosystem's encryption depend on the difficulty, both in terms of time and technique, of cracking the message. This paper suggests a bit cipher, a symmetric key cryptographic algorithm which provides bit-level secu
Autor:
Abhriya Roy, Sucheta Nag, Ronit Ray, Shalini Guha, Saptarshi De, Souvik Chatterjee, Sukalyan Goswami, Bipasha Mukhopadhyay, Ratan Kumar Basak, Amrin Zaman
Publikováno v:
UEMCON
Presentation of a novel decision tree based method to improve the ability of hand written character recognition using mathematical morphology. For this paper, classification of hand written digits is done into two groups: one with blob and another wi
Autor:
Riddhi Dutta, Bipasha Mukhopadhyay, Ratan Kumar Basak, Shalini Guha, Sukalyan Goswami, Souvik Chatterjee, Amrin Zaman, Ronit Ray, Abhriya Roy, Saptarshi De
Publikováno v:
UEMCON
In this paper, a procedure for segmentation-based image compression is suggested. Two types of segmentation techniques are used, namely threshold and region growing algorithms, and JPEG is applied to obtain the final compressed result, which provides