4 resultados para Secreted aspartyl peptidases
em Cochin University of Science
Resumo:
Algal blooms are naturally occurring phenomena in the aquatic environment. These blooms cause mass mortalities of wild and farmed fish and shellfish, human intoxications which sometimes result in death, alteration of marine trophic structure through adverse effects on larvae and other life history stages of commercially important species and death of marine animals. Occurrences of harmful algal blooms and associated mortality have been reported along the coastal waters of India since the early period of the last century. The present study was taken up to study the dynamics of major phytoplankton blooms, which occur along the Kerala coast. The results of quantitative and qualitative analysis of phytoplankton in the coastal waters of Vizhinjam and Chombala, their species diversity and community structure is presented and the major algal blooms recorded along the coast of Kerala during the study period is described and their occurrence is related to the hydrographic and meteorological variations. There is a clear evident from these works in the Indian region that the fishes avoid areas where these harmful algae bloom, either due to the toxicity or due to some irritant property of the chemicals secreted by the algae. Taxonomic diversity studies indicated a change in the community structure of commercial finfishes, crustaceans and molluscs due to the bloom of C.marina and funnel plots indicated the deviation in taxonomic distinctness during the bloom period from theoretical mean for the region.
Resumo:
Strain improvement is one of the major objectives for maximizing the microbial production of industrially significant primary and secondary metabolites. This goal can be achieved by judicious tuning of the organisms by monitoring its growth parameters and optimizing adequate supply of micro and macro nutrients, inducers, pH, temperature and other factors which control fermentation. Though C. rugosa has been under extensive studies for lipases, maximum world production is only 36 units. In fact, in India, enhanced production conditions for lipases have not yet been initiated. C. rugosa has been cultivated in diverse environments like liquid, semi-solid, solid—state and immobilized conditions, though major emphasis is on SmF or suspension culture. Hence the present investigations mainly focused on increasing the yield by adjusting the physico-chemical growth parameters and to characterize the lipase isoforms secreted by C. rugosa in the culture medium. Maximum possible improved methods were investigated to achieve these objectives. Within this under-optimised background, enhancement of lipase production and its characterization were investigated, employing modified liquid, semi-solid, solid—state and immobilized fermentation strategies
Resumo:
Protease inhibitors are found abundantly in numerous plants, animals and microorganisms, owing their significance to their application in the study of enzyme structures, reaction mechanisms and also their utilization in pharmacology and agriculture. They are (synthetic/natural) substances that act directly on proteases to lower the catalytic rate. Although most of these inhibitory proteins are directed against serine proteases, some target cysteine, aspartyl or metalloproteases (Bode and Huber, 1992). Protease inhibitors are essential for regulating the activity of their corresponding proteases and play key regulatory roles in many biological processes. Applications of protease inhibitors are intimately connected to the proteases they inhibit; an overview of proteases with the modes of regulation of their proteolytic activity is discussed
Resumo:
In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.