1000 resultados para SKI COMPLEX
Resumo:
Hauptziel dieser Arbeit ist die Identifizierung, Verifizierung und Charakterisierung von Interaktionspartnern von HelF, einem Negativregulator der RNA-Interferenz in Dictyostelium discoideum (Popova et al. 2006). Es ist gelungen, die Interaktion von HelF und der 5‘ 3‘ Exonuklease Xrn1 nachzu-weisen, aber alle anderen Versuchen, bisher unbekannte Protein-Interaktionspartner zu identifizieren, schlugen fehl. Xrn1 ist in den Organismen D. melanogaster (Orban und Izaurralde 2005), C. elegans (Newbury und Woollard 2004) und A. thaliana (Gazzani et al. 2004) bereits als Regulator der RNA-Interferenz bekannt. Mit Aufreinigungen nach der TAP-Methode und mit dem Nanotrap wurde ebenfalls versucht, RNA-Interaktionspartner von HelF zu identifizieren. Es konnten in einigen Aufreinigungen putative, für HelF spezifische RNAs identifiziert werden, doch entweder es handelte sich nachweislich nicht um RNA oder die Reproduktion der Daten schlug trotz mehrfacher Versuche fehl. Bezüglich der zellulären Lokalisation von HelF und Xrn1 konnte gezeigt werden, dass HelF zusätzlich zur bekannten Lokalisation in Foci im Nukleus (Popova et al. 2006) vermutlich auch im Cytoplasma und dort angeordnet in mehreren Granula zu finden ist. Xrn1 ist nahezu ausschließlich im Cytoplasma lokalisiert, wo es in mehreren Foci organisiert ist. Es wird vermutet, dass es sich bei diesen Foci um Processing-Bodies (P-Bodies) handelt und dass möglicherweise Xrn1 und HelF in eben diesen P-Bodies co-lokalisieren. In der Entwicklung vom Einzeller zum mehrzelligen Organismus zeigen die Xrn1KO- und die HelFKO-Mutante jeweils einen eindeutigen Phänotyp, der vom Wildtyp abweicht. Die Phänotypen der beiden Mutanten unterscheiden sich deutlich voneinander. Beim Mischen von HelF-Knockout-Zellen mit grün fluoreszierenden Wildtyp-Zellen zeigt sich, dass beide Stämme innerhalb des sich entwickelnden Organismus an definierten Stellen lokalisieren. Entgegen den Erwartungen befinden sich die Zellen der Mutante in den Stadien „Finger“ und „Slug“ nicht hauptsächlich im vorderen Teil des Organismus, sondern sind auch im hinteren Teil, der später die Sporenmasse bildet, vertreten. Dies lässt vermuten, dass HelF-Knockout-Mutanten in gleichem Maße wie Wildtypzellen als Sporen in die nächste Generation übergehen. Weitere Mix-Experimente, in denen HelFKO-Zellen und Xrn1KO-Zellen mit grün fluoreszierenden Wildtypzellen gemischt wurden, belegen eindeutig, dass beide Knockoutmutanten in Konkurrenz zum Wildtyp bei der Generierung von Sporen und somit beim Übergang in die nächste Generation benachteiligt sind. Dies steht im Gegensatz zu den Ergebnissen der vorher beschriebenen Mix-Experimente, in denen der Organismus als Ganzes betrachtet wurde. Weiterhin konnte herausgefunden werden, dass Xrn1 ebenso wie HelF (Popova et al. 2006) eine Rolle als Negativregulator in der RNA-Interferenz innehat. Fraglich ist aber, ob HelF wie bisher angenommen auch Einfluss auf den Weg der Generierung von miRNAs nimmt, da in HelFKO für keinen der beiden miRNA-Kandidaten eine Hoch- bzw. Runterregulierung der reifen miRNAs im Vergleich zum Wildtyp beobachtet werden kann. Im Xrn1KO hingegen ist die reife miRNA ddi-mir-1176 im Vergleich zum Wildtyp hochreguliert. In Bezug auf die Generierung von siRNAs konnte herausgefunden werden, dass Xrn1 und HelF im Fall der Generierung von Skipper siRNAs regulierend eingreifen, dass aber nicht alle siRNAs von der negativen Regulierung durch HelF und Xrn1betroffen sind, was am Beispiel der DIRS-1-siRNAs belegt werden kann. Das von B. Popova entwickelte Modell (Popova 2005) bezüglich der Rolle von HelF in der RNA-Interferenz wurde basierend auf den neu gewonnenen Daten weiterentwickelt und um Xrn1 ergänzt, um die Funktionen von HelF und Xrn1 als Antagonisten der RNA-Interferenz näher zu beleuchten. Literatur: Gazzani, S., T. Lawrenson, et al. (2004). "A link between mRNA turnover and RNA interference in Arabidopsis." Science 306(5698): 1046-8. Newbury, S. and A. Woollard (2004). "The 5'-3' exoribonuclease xrn-1 is essential for ventral epithelial enclosure during C. elegans embryogenesis." Rna 10(1): 59-65. Orban, T. I. and E. Izaurralde (2005). "Decay of mRNAs targeted by RISC requires XRN1, the Ski complex, and the exosome." Rna 11(4): 459-69. Popova, B. (2005). HelF, a suppressor of RNAi mediated gene silencing in Dictyostelium discoideum. Genetik. Kassel, Universität Kassel. PhD: 200. Popova, B., M. Kuhlmann, et al. (2006). "HelF, a putative RNA helicase acts as a nuclear suppressor of RNAi but not antisense mediated gene silencing." Nucleic Acids Res 34(3): 773-84.
Resumo:
In eukaryotes, pre-rRNA processing depends on a large number of nonribosomal trans-acting factors that form intriguingly organized complexes. One of the early stages of pre-rRNA processing includes formation of the two intermediate complexes pre-40S and pre-60S, which then form the mature ribosome subunits. Each of these complexes contains specific pre-rRNAs, ribosomal proteins and processing factors. The yeast nucleolar protein Nop53p has previously been identified in the pre-60S complex and shown to affect pre-rRNA processing by directly binding to 5.8S rRNA, and to interact with Nop17p and Nip7p, which are also involved in this process. Here we show that Nop53p binds 5.8S rRNA co-transcriptionally through its N-terminal region, and that this protein portion can also partially complement growth of the conditional mutant strain Delta nop53/GAL:NOP53. Nop53p interacts with Rrp6p and activates the exosome in vitro. These results indicate that Nop53p may recruit the exosome to 7S pre-rRNA for processing. Consistent with this observation and similar to the observed in exosome mutants, depletion of Nop53p leads to accumulation of polyadenylated pre-rRNAs.
Resumo:
Anthropological examinations were performed on skeletal material from four barrow necropolises located in the Yampil region (Ukraine) and dated to the Eneolithic, Bronze age and iron age . The purpose of the examinations was the determination of sex and age at death of individuals, reconstruction of their stature and assessment of their status of health . The examinations covered 61 individuals: 17 children and 44 adults . Their health status was assessed using four common indicators: linear enamel hypoplasia, cribra orbitalia, porotic hyperostosis and dental caries.
Resumo:
The application of spectroscopy to the study of contaminants in soils is important. Among the many contaminants is arsenic, which is highly labile and may leach to non-contaminated areas. Minerals of arsenate may form depending upon the availability of specific cations for example calcium and iron. Such minerals include carminite, pharmacosiderite and talmessite. Each of these arsenate minerals can be identified by its characteristic Raman spectrum enabling identification.
Complex Impedance Measurement During RF Catheter Ablation: A More Accurate Measure of Power Delivery
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.
Resumo:
Engineering assets such as roads, rail, bridges and other forms of public works are vital to the effective functioning of societies {Herder, 2006 #128}. Proficient provision of this physical infrastructure is therefore one of the key activities of government {Lædre, 2006 #123}. In order to ensure engineering assets are procured and maintained on behalf of citizens, government needs to devise the appropriate policy and institutional architecture for this purpose. The changing institutional arrangements around the procurement of engineering assets are the focus of this paper. The paper describes and analyses the transition to new, more collaborative forms of procurement arrangements which are becoming increasingly prevalent in Australia and other OECD countries. Such fundamental shifts from competitive to more collaborative approaches to project governance can be viewed as a major transition in procurement system arrangements. In many ways such changes mirror the shift from New Public Management, with its emphasis on the use of market mechanisms to achieve efficiencies {Hood, 1991 #166}, towards more collaborative approaches to service delivery, such as those under network governance arrangements {Keast, 2007 #925}. However, just as traditional forms of procurement in a market context resulted in unexpected outcomes for industry, such as a fragmented industry afflicted by chronic litigation {Dubois, 2002 #9}, the change to more collaborative forms of procurement is unlikely to be a panacea to the problems of procurement, and may well also have unintended consequences. This paper argues that perspectives from complex adaptive systems (CAS) theory can contribute to the theory and practice of managing system transitions. In particular the concept of emergence provides a key theoretical construct to understand the aggregate effect that individual project governance arrangements can have upon the structure of specific industries, which in turn impact individual projects. Emergence is understood here as the macro structure that emerges out of the interaction of agents in the system {Holland, 1998 #100; Tang, 2006 #51}.