955 resultados para domain analysis
Resumo:
The transcription factors TFIIB, Brf1, and Brf2 share related N-terminal zinc ribbon and core domains. TFIIB bridges RNA polymerase II (Pol II) with the promoter-bound preinitiation complex, whereas Brf1 and Brf2 are involved, as part of activities also containing TBP and Bdp1 and referred to here as Brf1-TFIIIB and Brf2-TFIIIB, in the recruitment of Pol III. Brf1-TFIIIB recruits Pol III to type 1 and 2 promoters and Brf2-TFIIIB to type 3 promoters such as the human U6 promoter. Brf1 and Brf2 both have a C-terminal extension absent in TFIIB, but their C-terminal extensions are unrelated. In yeast Brf1, the C-terminal extension interacts with the TBP/TATA box complex and contributes to the recruitment of Bdp1. Here we have tested truncated Brf2, as well as Brf2/TFIIB chimeric proteins for U6 transcription and for assembly of U6 preinitiation complexes. Our results characterize functions of various human Brf2 domains and reveal that the C-terminal domain is required for efficient association of the protein with U6 promoter-bound TBP and SNAP(c), a type 3 promoter-specific transcription factor, and for efficient recruitment of Bdp1. This in turn suggests that the C-terminal extensions in Brf1 and Brf2 are crucial to specific recruitment of Pol III over Pol II.
Resumo:
Peer-reviewed
Resumo:
The amount of installed wind power has been growing exponentially during the past ten years. As wind turbines have become a significant source of electrical energy, the interactions between the turbines and the electric power network need to be studied more thoroughly than before. Especially, the behavior of the turbines in fault situations is of prime importance; simply disconnecting all wind turbines from the network during a voltage drop is no longer acceptable, since this would contribute to a total network collapse. These requirements have been a contributor to the increased role of simulations in the study and design of the electric drive train of a wind turbine. When planning a wind power investment, the selection of the site and the turbine are crucial for the economic feasibility of the installation. Economic feasibility, on the other hand, is the factor that determines whether or not investment in wind power will continue, contributing to green electricity production and reduction of emissions. In the selection of the installation site and the turbine (siting and site matching), the properties of the electric drive train of the planned turbine have so far been generally not been taken into account. Additionally, although the loss minimization of some of the individual components of the drive train has been studied, the drive train as a whole has received less attention. Furthermore, as a wind turbine will typically operate at a power level lower than the nominal most of the time, efficiency analysis in the nominal operating point is not sufficient. This doctoral dissertation attempts to combine the two aforementioned areas of interest by studying the applicability of time domain simulations in the analysis of the economicfeasibility of a wind turbine. The utilization of a general-purpose time domain simulator, otherwise applied to the study of network interactions and control systems, in the economic analysis of the wind energy conversion system is studied. The main benefits of the simulation-based method over traditional methods based on analytic calculation of losses include the ability to reuse and recombine existing models, the ability to analyze interactions between the components and subsystems in the electric drive train (something which is impossible when considering different subsystems as independent blocks, as is commonly done in theanalytical calculation of efficiencies), the ability to analyze in a rather straightforward manner the effect of selections other than physical components, for example control algorithms, and the ability to verify assumptions of the effects of a particular design change on the efficiency of the whole system. Based on the work, it can be concluded that differences between two configurations can be seen in the economic performance with only minor modifications to the simulation models used in the network interaction and control method study. This eliminates the need ofdeveloping analytic expressions for losses and enables the study of the system as a whole instead of modeling it as series connection of independent blocks with no lossinterdependencies. Three example cases (site matching, component selection, control principle selection) are provided to illustrate the usage of the approach and analyze its performance.
Resumo:
A frequency-domain method for nonlinear analysis of structural systems with viscous, hysteretic, nonproportional and frequency-dependent damping is presented. The nonlinear effects and nonproportional damping are considered through pseudo-force terms. The modal coordinates uncoupled equations are iteratively solved. The treatment of initial conditions in the frequency domain which is necessary for the treatment of the uncoupled equations is initially adressed.
Resumo:
This article discusses three possible ways to derive time domain boundary integral representations for elastodynamics. This discussion points out possible difficulties found when using those formulations to deal with practical applications. The discussion points out recommendations to select the convenient integral representation to deal with elastodynamic problems and opens the possibility of deriving simplified schemes. The proper way to take into account initial conditions applied to the body is an interesting topict shown. It illustrates the main differences between the discussed boundary integral representation expressions, their singularities and possible numerical problems. The correct way to use collocation points outside the analyzed domain is carefully described. Some applications are shown at the end of the paper, in order to demonstrate the capabilities of the technique when properly used.
Resumo:
This thesis aims to find an effective way of conducting a target audience analysis (TAA) in cyber domain. There are two main focal points that are addressed; the nature of the cyber domain and the method of the TAA. Of the cyber domain the object is to find the opportunities, restrictions and caveats that result from its digital and temporal nature. This is the environment in which the TAA method is examined in this study. As the TAA is an important step of any psychological operation and critical to its success, the method used must cover all the main aspects affecting the choice of a proper target audience. The first part of the research was done by sending an open-ended questionnaire to operators in the field of information warfare both in Finland and abroad. As the results were inconclusive, the research was completed by assessing the applicability of United States Army Joint Publication FM 3-05.301 in the cyber domain via a theory-based content analysis. FM 3- 05.301 was chosen because it presents a complete method of the TAA process. The findings were tested against the results of the questionnaire and new scientific research in the field of psychology. The cyber domain was found to be “fast and vast”, volatile and uncontrollable. Although governed by laws to some extent, the cyber domain is unpredictable by nature and not controllable to reasonable amount. The anonymity and lack of verification often present in the digital channels mean that anyone can have an opinion, and any message sent may change or even be counterproductive to the original purpose. The TAA method of the FM 3-05.301 is applicable in the cyber domain, although some parts of the method are outdated and thus suggested to be updated if used in that environment. The target audience categories of step two of the process were replaced by new groups that exist in the digital environment. The accessibility assessment (step eight) was also redefined, as in the digital media the mere existence of a written text is typically not enough to convey the intended message to the target audience. The scientific studies made in computer sciences and both in psychology and sociology about the behavior of people in social media (and overall in cyber domain) call for a more extensive remake of the TAA process. This falls, however, out of the scope of this work. It is thus suggested that further research should be carried out in search of computer-assisted methods and a more thorough TAA process, utilizing the latest discoveries of human behavior. ---------------------------------------------------------------------------------------------------------------------------------- Tämän opinnäytetyön tavoitteena on löytää tehokas tapa kohdeyleisöanalyysin tekemiseksi kybertoimintaympäristössä. Työssä keskitytään kahteen ilmiöön: kybertoimintaympäristön luonteeseen ja kohdeyleisöanalyysin metodiin. Kybertoimintaympäristön osalta tavoitteena on löytää sen digitaalisesta ja ajallisesta luonteesta juontuvat mahdollisuudet, rajoitteet ja sudenkuopat. Tämä on se ympäristö jossa kohdeyleisöanalyysiä tarkastellaan tässä työssä. Koska kohdeyleisöanalyysi kuuluu olennaisena osana jokaiseen psykologiseen operaatioon ja on onnistumisen kannalta kriittinen tekijä, käytettävän metodin tulee pitää sisällään kaikki oikean kohdeyleisön valinnan kannalta merkittävät osa-alueet. Tutkimuksen ensimmäisessä vaiheessa lähetettiin avoin kysely informaatiosodankäynnin ammattilaisille Suomessa ja ulkomailla. Koska kyselyn tulokset eivät olleet riittäviä johtopäätösten tekemiseksi, tutkimusta jatkettiin tarkastelemalla Yhdysvaltojen armeijan kenttäohjesäännön FM 3-05.301 soveltuvuutta kybertoimintaympäristössä käytettäväksi teorialähtöisen sisällönanalyysin avulla. FM 3-05.301 valittiin koska se sisältää kokonaisvaltaisen kohdeyleisöanalyysiprosessin. Havaintoja verrattiin kyselytutkimuksen tuloksiin ja psykologian uusiin tutkimuksiin. Kybertoimintaympäristö on tulosten perusteella nopea ja valtava, jatkuvasti muuttuva ja kontrolloimaton. Vaikkakin lait hallitsevat kybertoimintaympäristöä jossakin määrin, on se silti luonteeltaan ennakoimaton eikä sitä voida luotettavasti hallita. Digitaalisilla kanavilla usein läsnäoleva nimettömyys ja tiedon tarkastamisen mahdottomuus tarkoittavat että kenellä tahansa voi olla mielipide asioista, ja mikä tahansa viesti voi muuttua, jopa alkuperäiseen tarkoitukseen nähden vastakkaiseksi. FM 3-05.301:n metodi toimii kybertoimintaympäristössä, vaikkakin jotkin osa-alueet ovat vanhentuneita ja siksi ne esitetään päivitettäväksi mikäli metodia käytetään kyseisessä ympäristössä. Kohdan kaksi kohdeyleisökategoriat korvattiin uusilla, digitaalisessa ympäristössä esiintyvillä ryhmillä. Lähestyttävyyden arviointi (kohta 8) muotoiltiin myös uudestaan, koska digitaalisessa mediassa pelkkä tekstin läsnäolo ei sellaisenaan tyypillisesti vielä riitä halutun viestin välittämiseen kohdeyleisölle. Tietotekniikan edistyminen ja psykologian sekä sosiologian aloilla tehty tieteellinen tutkimus ihmisten käyttäytymisestä sosiaalisessa mediassa (ja yleensä kybertoimintaympäristössä) mahdollistavat koko kohdeyleisöanalyysiprosessin uudelleenrakentamisen. Tässä työssä sitä kuitenkaan ei voida tehdä. Siksi esitetäänkin että lisätutkimusta tulisi tehdä sekä tietokoneavusteisten prosessien että vielä syvällisempien kohdeyleisöanalyysien osalta, käyttäen hyväksi viimeisimpiä ihmisen käyttäytymiseen liittyviä tutkimustuloksia.
Resumo:
Almost identical polyglutamine-containing proteins with unknown structures have been found in human, mouse and rat genomes (GenBank AJ277365, AF525300, AY879229). We infer that an identical new gene (RING) finger domain of real interest is located in each C-terminal segment. A three-dimensional (3-D) model was generated by remote homology modeling and the functional implications are discussed. The model consists of 65 residues from terminal position 707 to 772 of the human protein with a total length of 796 residues. The 3-D model predicts a ubiquitin-protein ligase (E3) as a binding site for ubiquitin-conjugating enzyme (E2). Both enzymes are part of the ubiquitin pathway to label unwanted proteins for subsequent enzymatic degradation. The molecular contact specificities are suggested for both the substrate recognition and the residues at the possible E2-binding surface. The predicted structure, of a ubiquitin-protein ligase (E3, enzyme class number 6.3.2.19, CATH code 3.30.40.10.4) may contribute to explain the process of ubiquitination. The 3-D model supports the idea of a C3HC4-RING finger with a partially new pattern. The putative E2-binding site is formed by a shallow hydrophobic groove on the surface adjacent to the helix and one zinc finger (L722, C739, P740, P741, R744). Solvent-exposed hydrophobic amino acids lie around both zinc fingers (I717, L722, F738, or P765, L766, V767, V733, P734). The 3-D structure was deposited in the protein databank theoretical model repository (2B9G, RCSB Protein Data Bank, NJ).
Resumo:
Background: The hepatitis C virus (HCV) non-structural 5A protein (NS5A) contains a highly conserved C-terminal polyproline motif with the consensus sequence Pro-X-X- Pro-X-Arg that is able to interact with the Src-homology 3 (SH3) domains of a variety of cellular proteins. Results: To understand this interaction in more detail we have expressed two N-terminally truncated forms of NS5A in E. coli and examined their interactions with the SH3 domain of the Src-family tyrosine kinase, Fyn. Surface plasmon resonance analysis revealed that NS5A binds to the Fyn SH3 domain with what can be considered a high affinity SH3 domain-ligand interaction (629 nM), and this binding did not require the presence of domain I of NS5A (amino acid residues 32-250). Mutagenic analysis of the Fyn SH3 domain demonstrated the requirement for an acidic cluster at the C-terminus of the RT-Src loop of the SH3 domain, as well as several highly conserved residues previously shown to participate in SH3 domain peptide binding. Conclusion: We conclude that the NS5A: Fyn SH3 domain interaction occurs via a canonical SH3 domain binding site and the high affinity of the interaction suggests that NS5A would be able to compete with cognate Fyn ligands within the infected cell.
Resumo:
The performance of rank dependent preference functionals under risk is comprehensively evaluated using Bayesian model averaging. Model comparisons are made at three levels of heterogeneity plus three ways of linking deterministic and stochastic models: the differences in utilities, the differences in certainty equivalents and contextualutility. Overall, the"bestmodel", which is conditional on the form of heterogeneity is a form of Rank Dependent Utility or Prospect Theory that cap tures the majority of behaviour at both the representative agent and individual level. However, the curvature of the probability weighting function for many individuals is S-shaped, or ostensibly concave or convex rather than the inverse S-shape commonly employed. Also contextual utility is broadly supported across all levels of heterogeneity. Finally, the Priority Heuristic model, previously examined within a deterministic setting, is estimated within a stochastic framework, and allowing for endogenous thresholds does improve model performance although it does not compete well with the other specications considered.
Resumo:
In industrial polymer and synthetic rubber production facilities, workers are exposed to 1,3-butadiene. This compound is converted in vivo to 1,2,3,4-diepoxybutane (DEB) and has been linked to increased incidences of cancer in these individuals. Carcinogenesis has been attributed to formation of DEB induced DNA interstrand cross-links. Previous studies have demonstrated that DEB cross-links deoxyguanosine residues within 5'-GNC sequences in synthetic DNA, in restriction fragments, and in defined sequence nucleosomes. The current study utilized the polymerase chain reaction (PCR) to examine DEB damage frequencies within nuclear genes, found within "open" regions of chromatin, as compared to regions of unexpressed sequence that reside in tightly packed, "closed" chromatin, to more closely model DEB reactivity in vivo. These initial studies have been performed in chicken liver homogenates. Preliminarily, we have found a dose-dependent DEB lesion-forming response within "open" chromatin. DEB appears to have little-to-no effect upon regions of "closed" chromatin.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
The purpose of this paper is to present the application of a three-phase harmonic propagation analysis time-domain tool, using the Norton model to approach the modeling of non-linear loads, making the harmonics currents flow more appropriate to the operation analysis and to the influence of mitigation elements analysis. This software makes it possible to obtain results closer to the real distribution network, considering voltages unbalances, currents imbalances and the application of mitigation elements for harmonic distortions. In this scenario, a real case study with network data and equipments connected to the network will be presented, as well as the modeling of non-linear loads based on real data obtained from some PCCs (Points of Common Coupling) of interests for a distribution company.
Resumo:
Targeted regulation of protein levels is an important tool to gain insights into the role of proteins essential to cell function and development. In recent years, a method based on mutated forms of the human FKBP12 has been established and used to great effect in various cell types to explore protein function. The mutated FKBP protein, referred to as destabilization domain (DD) tag when fused with a native protein at the N- or C-terminus targets the protein for proteosomal degradation. Regulated expression is achieved via addition of a compound, Shld-1, that stabilizes the protein and prevents degradation. A limited number of studies have used this system to provide powerful insight into protein function in the human malaria parasite Plasmodium falciparum. In order to better understand the DD inducible system in P. falciparum, we studied the effect of Shld-1 on parasite growth, demonstrating that although development is not impaired, it is delayed, requiring the appropriate controls for phenotype interpretation. We explored the quantified regulation of reporter Green Fluorescent Protein (GFP) and luciferase constructs fused to three DD variants in parasite cells either via transient or stable transfection. The regulation obtained with the original FKBP derived DD domain was compared to two triple mutants DD24 and DD29, which had been described to provide better regulation for C-terminal tagging in other cell types. When cloned to the C-terminal of reporter proteins, DD24 provided the strongest regulation allowing reporter activity to be reduced to lower levels than DD and to restore the activity of stabilised proteins to higher levels than DD29. Importantly, DD24 has not previously been applied to regulate proteins in P. falciparum. The possibility of regulating an exported protein was addressed by targeting the Ring-Infected Erythrocyte Surface Antigen (RESA) at its C-terminus. The tagged protein demonstrated an important modulation of its expression.
Resumo:
The technique of Time Domain Reflectometry (TDR) is applied for qualifying ethanol adulterated with water and / or methanol. We used the commercial TDR model VG400, which was originally developed for determining soil moisture, making this study an original approach for qualifying fuels. Several samples of alcohol with the addition of its main contaminants (water and methanol) were prepared and measured with the TDR sensor. The results indicate good response linearity, showing the TDR technique is a promising technique for fuel qualification
Resumo:
As distributed collaborative applications and architectures are adopting policy based management for tasks such as access control, network security and data privacy, the management and consolidation of a large number of policies is becoming a crucial component of such policy based systems. In large-scale distributed collaborative applications like web services, there is the need of analyzing policy interactions and integrating policies. In this thesis, we propose and implement EXAM-S, a comprehensive environment for policy analysis and management, which can be used to perform a variety of functions such as policy property analyses, policy similarity analysis, policy integration etc. As part of this environment, we have proposed and implemented new techniques for the analysis of policies that rely on a deep study of state of the art techniques. Moreover, we propose an approach for solving heterogeneity problems that usually arise when considering the analysis of policies belonging to different domains. Our work focuses on analysis of access control policies written in the dialect of XACML (Extensible Access Control Markup Language). We consider XACML policies because XACML is a rich language which can represent many policies of interest to real world applications and is gaining widespread adoption in the industry.