• No results found

Original Article A systematic elucidation of the sanguinarine mechanism in human disease using network pharmacology

N/A
N/A
Protected

Academic year: 2020

Share "Original Article A systematic elucidation of the sanguinarine mechanism in human disease using network pharmacology"

Copied!
9
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1. A. The chemical constitution of SNG which acquired from the Pub-Chem data library (CID: 5154, MF: C20H14NO4+, MW: 332.335 g/mol); B
Table 2. Potential targets of SNG
Figure 2. SNG protein network. Notes: The target protein is represented by black nodes, and different correlations are indicated by the differently colored connections.
Figure 3. GO maps of the assumed target genes. Notes: Biological process categories (A)
+2

References

Related documents

The goal of designing a microstrip array antenna is to improve gain and directivity for IRNSS. There are various important steps

Given that SBIRT screening has been shown to decrease substance misuse, improve patient care, reduce health risks and the financial burden on our health care system, the success

The macro- and micro lesions in the lung and the ileum of calves affected by PES are relevant with regard to the differential diagnosis of the syndrome and its differentiation

To compute the economic insecurity index, the paper follows the Osberg (1998), and Osberg and Sharpe (2002, 2003) method of computing the insecurity index. They computed the

It was found that there is significant relationship between the time to perform the course and the performance in set shot of different height group players

Purposes: The purposes of the study were 1) to evaluate the attitude towards drug therapy among a representative sample of patients treated in a community psychiatric service

In the policy routing, a route computation function has to operate in conjunction with the AD’s administrative policies. Other routing functions such as distribution and information

Though the original EAX has already been proved to be secure, the security bound provided by [5], in particular the authenticity bound, does not show the standard birthday-type