113 resultados para Cleavage Sites


Relevância:

20.00% 20.00%

Publicador:

Resumo:

While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electrocatalytic processes will undoubtedly be at the heart of energising future transportation and technology with the added importance of being able to create the necessary fuels required to do so in an environmentally friendly and cost effective manner. For this to be successful two almost mutually exclusive surface properties need to be reconciled, namely producing highly active/reactive surface sites that exhibit long term stability. This article reviews the various approaches which have been undertaken to study the elusive nature of these active sites on metal surfaces which are considered as adatoms or clusters of adatoms with low coordination number. This includes the pioneering studies at extended well defined stepped single crystal surfaces using cyclic voltammetry up to the highly sophisticated in situ electrochemical imaging techniques used to study chemically synthesised nanomaterials. By combining the information attained from single crystal surfaces, individual nanoparticles of defined size and shape, density functional theory calculations and new concepts such as mesoporous multimetallic thin films and single atom electrocatalysts new insights into the design and fabrication of materials with highly active but stable active sites can be achieved. The area of electrocatalysis is therefore not only a fascinating and exciting field in terms of realistic technological and economical benefits but also from the fundamental understanding that can be acquired by studying such an array of interesting materials.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this chapter the authors discuss and informal learning settings such as fan fiction sites and their relations to teaching and learning within formal learning settings. Young people today spend a lot of time with social media built on user generated content. These media are often characterized by participatory culture which offers a good environment for developing skills and identity work. In this chapter the authors problematize fan fiction sites as informal learning settings where the possibilities to learn are powerful and significant. They also discuss the learning processes connected to the development of literacies. Here the rhetoric principle of “imitatio” plays a vital part as well as the co-production of texts on the sites, strongly supported by the beta reader and the power of positive feedback. They also display that some fans, through the online publication of fan fiction, are able to develop their craft in a way which previously have been impossible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Management of the industrial nations' hazardous waste is a current and exponentially increasing, global threatening situation. Improved environmental information must be obtained and managed concerning the current status, temporal dynamics and potential future status of these critical sites. To test the application of spatial environmental techniques to the problem of hazardous waste sites, as Superfund (CERCLA) test site was chosen in an industrial/urban valley experiencing severe TCE, PCE, and CTC ground water contamination. A paradigm is presented for investigating spatial/environmental tools available for the mapping, monitoring and modelling of the environment and its toxic contaminated plumes. This model incorporates a range of technical issues concerning the collection of data as augmented by remotely sensed tools, the format and storage of data utilizing geographic information systems, and the analysis and modelling of environment through the use of advance GIS analysis algorithms and geophysic models of hydrologic transport including statistical surface generation. This spatial based approach is evaluated against the current government/industry standards of operations. Advantages and lessons learned of the spatial approach are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Detection and characterisation of structural modifications of a hindered amine light stabiliser (HALS) directly from a polyester-based coil coating have been achieved by desorption electrospray ionisation mass spectrometry (DESI-MS) for the first time. In situ detection is made possible by exposing the coating to an acetone vapour atmosphere prior to analysis. This is a gentle and non-destructive treatment that allows diffusion of analyte to the surface without promoting lateral migration. Using this approach a major structural modification of the HALS TINUVIN®123 (bis(1-octyloxy-2,2,6,6-tetramethyl-4-piperidyl) sebacate) was discovered where one N-ether piperidine moiety (N-OC8H17) is converted to a secondary piperidine (N–H). With the use of 2-dimensional DESI-MS imaging the modification was observed to arise during high curing temperatures (ca. 260 °C) and under simulated physiological conditions (80 °C, full solar spectrum). It is proposed that the secondary piperidine derivative is a result of a highly reactive aminyl radical intermediate produced by N–O homolytic bond cleavage. The nature of the bond cleavage is also suggested by ESR spin-trapping experiments employing α-phenyl-N-tert-butyl nitrone (PBN) in toluene at 80 °C. The presence of a secondary piperidine derivative in situ and the implication of N–OR competing with NO–R bond cleavage suggest an alternative pathway for generation of the nitroxyl radical—an essential requirement in anti-oxidant activity that has not previously been described for the N-ether sub-class of HALS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A pro-fibrotic role of matrix metalloproteinase-9 (MMP-9) in tubular cell epithelial-mesenchymal transition (EMT) is well established in renal fibrosis; however studies from our group and others have demonstrated some previously unrecognized complexity of MMP-9 that has been overlooked in renal fibrosis. Therefore, the aim of this study was to determine the expression pattern, origin and the exact mechanism underlying the contribution of MMP-9 to unilateral ureteral obstruction (UUO), a well-established model of renal fibrosis via MMP-9 inhibition. Renal MMP-9 expression in BALB/c mice with UUO was examined on day 1, 3, 5, 7, 9, 11 and 14. To inhibit MMP-9 activity, MMP-2/9 inhibitor or MMP-9-neutralizing antibody was administered daily for 4 consecutive days from day 0-3, 6-9 or 10-13 and tissues harvested at day 14. In UUO, there was a bi-phasic early- and late-stage upregulation of MMP-9 activity. Interestingly, tubular epithelial cells (TECs) were the predominant source of MMP-9 during early stage, whereas TECs, macrophages and myofibroblasts produced MMP-9 during late-stage UUO. Early- and late-stage inhibition of MMP-9 in UUO mice significantly reduced tubular cell EMT and renal fibrosis. Moreover, MMP-9 inhibition caused a significant reduction in MMP-9-cleaved osteopontin and macrophage infiltration in UUO kidney. Our in vitro study showed MMP-9-cleaved osteopontin enhanced macrophage transwell migration and MMP-9 of both primary TEC and macrophage induced tubular cell EMT. In summary, our result suggests that MMP-9 of both TEC and macrophage origin may directly or indirectly contribute to the pathogenesis of renal fibrosis via osteopontin cleavage, which, in turn further recruit macrophage and induce tubular cell EMT. Our study also highlights the time dependency of its expression and the potential of stage-specific inhibition strategy against renal fibrosis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The introduction of chalcone synthase A transgenes into petunia plants can result in degradation of chalcone synthase A RNAs and loss of chalcone synthase, a process called cosuppression or post-transcriptional gene silencing. Here we show that the RNA degradation is associated with changes in premRNA processing, i.e. loss of tissue specificity in transcript cleavage patterns, accumulation of unspliced molecules, and use of template-specific secondary poly(A) sites. These changes can also be observed at a lower level in leaves but not flowers of nontransgenic petunias. Based on this, a model is presented of how transgenes may disturb the carefully evolved, developmentally controlled post-transcriptional regulation of chalcone synthase gene expression by influencing the survival rate of the endogenous and their own mRNA.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A tissue inhibitor of metalloproteinases-2 (TIMP-2)-independent mechanism for generating the first activational cleavage of pro-matrix metalloproteinase-2 (MMP-2) was identified in membrane type-1 MMP (MT1-MMP)-transfected MCF-7 cells and confirmed in TIMP-2-deficient fibroblasts. In contrast, the second MMP-2-activational step was found to be TIMP-2 dependent in both systems. MMP-2 hemopexin C-terminal domain was found to be critical for the first step processing, confirming a need for membrane tethering. We propose that the intermediate species of MMP-2 forms the well-established trimolecular complex (MT1-MMP/TIMP-2/MMP-2) for further TIMP-2-dependent autocatalytic cleavage to the fully active species. This alternate mechanism may supplement the traditional TIMP-2-mediated first step mechanism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2001, the red imported fire ant (Solenopsis invicta Buren) was identified in Brisbane, Australia. An eradication program involving broadcast bait treatment with two insect growth regulators and a metabolic inhibitor began in September of that year and is currently ongoing. To gauge the impacts of these treatments on local ant populations, we examined long-term monitoring data and quantified abundance patterns of S. invicta and common local ant genera using a linear mixed-effects model. For S. invicta, presence in pitfalls reduced over time to zero on every site. Significantly higher numbers of S. invicta workers were collected on high-density polygyne sites, which took longer to disinfest compared with monogyne and low-density polygyne sites. For local ants, nine genus groups of the 10 most common genera analyzed either increased in abundance or showed no significant trend. Five of these genus groups were significantly less abundant at the start of monitoring on high-density polygyne sites compared with monogyne and low-density polygyne sites. The genus Pheidole significantly reduced in abundance over time, suggesting that it was affected by treatment efforts. These results demonstrate that the treatment regime used at the time successfully removed S. invicta from these sites in Brisbane, and that most local ant genera were not seriously impacted by the treatment. These results have important implications for current and future prophylactic treatment efforts, and suggest that native ants remain in treated areas to provide some biological resistance to S. invicta.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cleavage and polyadenylation factor (CPF) is a multi‐protein complex that functions in pre‐mRNA 3′‐end formation and in the RNA polymerase II (RNAP II) transcription cycle. Ydh1p/Cft2p is an essential component of CPF but its precise role in 3′‐end processing remained unclear. We found that mutations in YDH1 inhibited both the cleavage and the polyadenylation steps of the 3′‐end formation reaction in vitro. Recently, we demonstrated that an important function of CPF lies in the recognition of poly(A) site sequences and RNA binding analyses suggesting that Ydh1p/Cft2p interacts with the poly(A) site region. Here we show that mutant ydh1 strains are deficient in the recognition of the ACT1 cleavage site in vivo. The C‐terminal domain (CTD) of RNAP II plays a major role in coupling 3′‐end processing and transcription. We provide evidence that Ydh1p/Cft2p interacts with the CTD of RNAP II, several other subunits of CPF and with Pcf11p, a component of CF IA. We propose that Ydh1p/Cft2p contributes to the formation of important interaction surfaces that mediate the dynamic association of CPF with RNAP II, the recognition of poly(A) site sequences and the assembly of the polyadenylation machinery on the RNA substrate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current models of HIV-1 morphogenesis hold that newly synthesized viral Gag polyproteins traffic to and assemble at the cell membrane into spherical protein shells. The resulting late-budding structure is thought to be released by the cellular ESCRT machinery severing the membrane tether connecting it to the producer cell. Using electron tomography and scanning transmission electron microscopy, we find that virions have a morphology and composition distinct from late-budding sites. Gag is arranged as a continuous but incomplete sphere in the released virion. In contrast, late-budding sites lacking functional ESCRT exhibited a nearly closed Gag sphere. The results lead us to propose that budding is initiated by Gag assembly, but is completed in an ESCRT-dependent manner before the Gag sphere is complete. This suggests that ESCRT functions early in HIV-1 release-akin to its role in vesicle formation-and is not restricted to severing the thin membrane tether.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Accurate three-dimensional representations of cultural heritage sites are highly valuable for scientific study, conservation, and educational purposes. In addition to their use for archival purposes, 3D models enable efficient and precise measurement of relevant natural and architectural features. Many cultural heritage sites are large and complex, consisting of multiple structures spatially distributed over tens of thousands of square metres. The process of effectively digitising such geometrically complex locations requires measurements to be acquired from a variety of viewpoints. While several technologies exist for capturing the 3D structure of objects and environments, none are ideally suited to complex, large-scale sites, mainly due to their limited coverage or acquisition efficiency. We explore the use of a recently developed handheld mobile mapping system called Zebedee in cultural heritage applications. The Zebedee system is capable of efficiently mapping an environment in three dimensions by continually acquiring data as an operator holding the device traverses through the site. The system was deployed at the former Peel Island Lazaret, a culturally significant site in Queensland, Australia, consisting of dozens of buildings of various sizes spread across an area of approximately 400 × 250 m. With the Zebedee system, the site was scanned in half a day, and a detailed 3D point cloud model (with over 520 million points) was generated from the 3.6 hours of acquired data in 2.6 hours. We present results demonstrating that Zebedee was able to accurately capture both site context and building detail comparable in accuracy to manual measurement techniques, and at a greatly increased level of efficiency and scope. The scan allowed us to record derelict buildings that previously could not be measured because of the scale and complexity of the site. The resulting 3D model captures both interior and exterior features of buildings, including structure, materials, and the contents of rooms.