7 resultados para Amin, Samir

em CentAUR: Central Archive University of Reading - UK


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Terpene synthases are responsible for the biosynthesis of the complex chemical defense arsenal of plants and microorganisms. How do these enzymes, which all appear to share a common terpene synthase fold, specify the many different products made almost entirely from one of only three substrates? Elucidation of the structure of 1,8-cineole synthase from Salvia fruticosa (Sf-CinS1) combined with analysis of functional and phylogenetic relationships of enzymes within Salvia species identified active-site residues responsible for product specificity. Thus, Sf-CinS1 was successfully converted to a sabinene synthase with a minimum number of rationally predicted substitutions, while identification of the Asn side chain essential for water activation introduced 1,8-cineole and alpha-terpineol activity to Salvia pomifera sabinene synthase. A major contribution to product specificity in Sf-CinS1 appears to come from a local deformation within one of the helices forming the active site. This deformation is observed in all other mono- or sesquiterpene structures available, pointing to a conserved mechanism. Moreover, a single amino acid substitution enlarged the active-site cavity enough to accommodate the larger farnesyl pyrophosphate substrate and led to the efficient synthesis of sesquiterpenes, while alternate single substitutions of this critical amino acid yielded five additional terpene synthases.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two so-called “integrated” polarimetric rate estimation techniques, ZPHI (Testud et al., 2000) and ZZDR (Illingworth and Thompson, 2005), are evaluated using 12 episodes of the year 2005 observed by the French C-band operational Trappes radar, located near Paris. The term “integrated” means that the concentration parameter of the drop size distribution is assumed to be constant over some area and the algorithms retrieve it using the polarimetric variables in that area. The evaluation is carried out in ideal conditions (no partial beam blocking, no ground-clutter contamination, no bright band contamination, a posteriori calibration of the radar variables ZH and ZDR) using hourly rain gauges located at distances less than 60 km from the radar. Also included in the comparison, for the sake of benchmarking, is a conventional Z = 282R1.66 estimator, with and without attenuation correction and with and without adjustment by rain gauges as currently done operationally at Météo France. Under those ideal conditions, the two polarimetric algorithms, which rely solely on radar data, appear to perform as well if not better, pending on the measurements conditions (attenuation, rain rates, …), than the conventional algorithms, even when the latter take into account rain gauges through the adjustment scheme. ZZDR with attenuation correction is the best estimator for hourly rain gauge accumulations lower than 5 mm h−1 and ZPHI is the best one above that threshold. A perturbation analysis has been conducted to assess the sensitivity of the various estimators with respect to biases on ZH and ZDR, taking into account the typical accuracy and stability that can be reasonably achieved with modern operational radars these days (1 dB on ZH and 0.2 dB on ZDR). A +1 dB positive bias on ZH (radar too hot) results in a +14% overestimation of the rain rate with the conventional estimator used in this study (Z = 282R^1.66), a -19% underestimation with ZPHI and a +23% overestimation with ZZDR. Additionally, a +0.2 dB positive bias on ZDR results in a typical rain rate under- estimation of 15% by ZZDR.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Rodenticides with delayed action are generally more effective than fast-acting compounds because of the phenomenon of bait shyness. Calciferols have a stop-feed effect quite soon after dosing, and physiological effects are measurable within one day of dosing. We investigated whether bait shyness might result from these fairly rapid effects in the laboratory rat. We found evidence of bait shyness following recovery from sub-lethal dosing with two forms of calciferol. Use of intubation as well as feeding showed that the response was to the bait carrier rather than to detection of calciferols per se.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Poorer people are more likely to use antibiotics; inappropriate antibiotic use causes resistance, and health campaigns attempt to change behaviour through education. However, fuelled by the media, the public think antibiotic resistance is outside their control. Differences in the attribution of blame for antibiotic resistance in two genres of UK newspapers, targeting distinct socioeconomic groups, were examined using a mixed methods approach. Firstly, depiction of blame was categorised as either external to the lay public (outside their control) or internal (lay person accountable) and subjected to a chi-square test. Secondly, using critical discourse analysis, we examined the portrayal of the main agents through newspaper language. Data from 597 articles (307 broadsheets) analysed revealed a significant association between newspaper genre and attribution of blame for antibiotic resistance. While both newspaper types blamed antibiotic resistance predominantly on factors external to the lay public, broadsheets were more likely to acknowledge internal factors than tabloids. Tabloids provided a more skewed representation, exposing readers to inaccurate explanations about antibiotic resistance. They highlighted ineptitude in health professionals, victimising patients and blaming others, while broadsheets used less emotive language. Pharmacists should take special care to communicate the importance of appropriate antibiotic use against this backdrop of distortion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although social networking sites (SNSs) present a great deal of opportunities to support learning, the privacy risk is perceived by learners as a friction point that affects their full use for learning. Privacy risks in SNSs can be divided into risks that are posed by the SNS provider itself and risks that result from user’s social interactions. Using an online survey questionnaire, this study explored the students’ perception of the benefits in using social networking sites for learning purposes and their perceived privacy risks. A sample of 214 students from Uganda Christian University in Africa was studied. The results show that although 88 % of participants indicated the usefulness of SNSs for learning, they are also aware of the risks associated with these sites. Most of the participants are concerned with privacy risks such as identity theft, cyber bullying, and impersonation that might influence their online learning participation in SNSs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.