997 resultados para common alpha
Resumo:
alpha-Carboxylate radical anions are potential reactive intermediates in the free radical oxidation of biological molecules (e. g., fatty acids, peptides and proteins). We have synthesised well-defined alpha-carboxylate radical anions in the gas phase by UV laser photolysis of halogenated precursors in an ion-trap mass spectrometer. Reactions of isolated acetate ((center dot)CH(2)CO(2)) and 1-carboxylatobutyl (CH(3)CH(2)CH(2)(center dot)CHCO(2)(-)) radical anions with dioxygen yield carbonate (CO(3)(center dot-)) radical anions and this chemistry is shown to be a hallmark of oxidation in simple and alkyl-substituted cross-conjugated species. Previous solution phase studies have shown that C(alpha)-radicals in peptides, formed from free radical damage, combine with dioxygen to form peroxyl radicals that subsequently decompose into imine and keto acid products. Here, we demonstrate that a novel alternative pathway exists for two alpha-carboxylate C(alpha)-radical anions: the acetylglycinate radical anion (CH(3)C(O)NH(center dot)CHCO(2)(-)) and the model peptide radical anion, YGGFG(center dot-). Reaction of these radical anions with dioxygen results in concerted loss of carbon dioxide and hydroxyl radical. The reaction of the acetylglycinate radical anion with dioxygen reveals a two-stage process involving a slow, followed by a fast kinetic regime. Computational modelling suggests the reversible formation of the C(alpha) peroxyl radical facilitates proton transfer from the amide to the carboxylate group, a process reminiscent of, but distinctive from, classical proton-transfer catalysis. Interestingly, inclusion of this isomerization step in the RRKM/ME modelling of a G3SX level potential energy surface enables recapitulation of the experimentally observed two-stage kinetics.
Resumo:
The application of artificial neural networks (ANN) in finance is relatively new area of research. We employed ANNs that used both fundamental and technical inputs to predict future prices of widely held Australian stocks and used these predicted prices for stock portfolio selection over a 10-year period (2001-2011). We found that the ANNs generally do well in predicting the direction of stock price movements. The stock portfolios selected by the ANNs with median accuracy are able to generate positive alpha over the 10-year period. More importantly, we found that a portfolio based on randomly selected network configuration had zero chance of resulting in a significantly negative alpha but a 27% chance of yielding a significantly positive alpha. This is in stark contrast to the findings of the research on mutual fund performance where active fund managers with negative alphas outnumber those with positive alphas.
Resumo:
The focus of Cents and Sustainability is to respond to the call by Dr Gro Brundtland in the seminal book Our Common Future to achieve, 'a new era of economic growth - growth that is forceful and at the same time socially and environmentally sustainable'. With the 20th anniversary of Our Common Future in 2007, it is clearly time to re-examine this important work in a modern global context. Using the framework of ‘Decoupling Economic Growth from Environmental Pressures’, Cents and Sustainability investigates a range of new evidence and research in order to develop a deeper understanding of how, and under what conditions, this 'forceful sustainable growth' is possible. With an introduction by Dr Jim MacNeill (former Secretary General to the Brundtland Commission, and former Director, OECD Environment Directorate 1978 -1984), the book will carry forewords from Dr Gro Brundtland (former Chair of the World Commission on Environment and Development), Dr Rajendra Pachauri (Chief, Intergovernmental Panel on Climate Change (IPCC), and joint recipient of the 2007 Nobel Peace Prize on behalf of the IPCC), and Dr Kenneth Ruffing (former Deputy Director and Chief Economist of the OECD Environment Directorate 2000 - 2005). Beginning with a detailed explanation of decoupling theory, along with investigation into a range of issues and barriers to its achievement, the book then focuses on informing national strategies for decoupling. Then putting this into action the book focuses on five key areas of decoupling, namely greenhouse gas emissions, biodiversity, freshwater extraction, waste production, and air pollution, and in each case showing compelling evidence for significant cost effective reductions in environmental pressures. The book concludes with a detailed case study of the groundbreaking application of public interest litigation to combat air pollution in Delhi, India.
Resumo:
We consider the following problem: members in a dynamic group retrieve their encrypted data from an untrusted server based on keywords and without any loss of data confidentiality and member’s privacy. In this paper, we investigate common secure indices for conjunctive keyword-based retrieval over encrypted data, and construct an efficient scheme from Wang et al. dynamic accumulator, Nyberg combinatorial accumulator and Kiayias et al. public-key encryption system. The proposed scheme is trapdoorless and keyword-field free. The security is proved under the random oracle, decisional composite residuosity and extended strong RSA assumptions.
Resumo:
Recent findings from the clinic and the laboratory have transformed the way proteases and their inhibitors are perceived in the outermost layer of the skin, the epidermis. It now appears that an integrated proteolytic network operates within the epidermis, comprising more than 30 enzymes that carry out a growing list of essential functions. Equally, defective regulation or execution of protease-mediated processes is emerging as a key contributor to diverse human skin pathologies, and in recent years the number of diseases attributable to aberrant proteolytic activity has more than doubled. Here, we survey the different roles of proteases in epidermal homeostasis (from processing enzymes to signalling molecules) and explore the spectrum of rare and common human skin disorders where proteolytic pathways are dysregulated.
Resumo:
Most urban dwelling Australians take secure and safe water supplies for granted. That is, they have an adequate quantity of water at a quality that can be used by people without harm from human and animal wastes, salinity and hardness or pollutants from agriculture and manufacturing industries. Australia wide urban and peri-urban dwellers use safe water for all domestic as well as industrial purposes. However, this is not the situation remote regions in Australia where availability and poor quality water can be a development constraint. Nor is it the case in Sri Lanka where people in rural regions are struggling to obtain a secure supply of water, irrespective of it being safe because of the impact of faecal and other contaminants. The purposes of this paper are to overview: the population and environmental health challenges arising from the lack of safe water in rural and remote communities; response pathways to address water quality issues; and the status of and need for integrated catchment management (ICM) in selected remote regions of Australia and vulnerable and lagging rural regions in Sri Lanka. Conclusions are drawn that focus on the opportunity for inter-regional collaborations between Australia and Sri Lanka for the delivery of safe water through ICM.
Resumo:
ORIGO Stepping Stones is written and developed by a team of experts to provide teachers with a world-class elementary math program. Our expert team of authors and consultants are utilizing all available educational research to create a unique program that has never before been available to teachers. The full color Student Practice Book provides practice pages that support previous and current lessons.
Resumo:
We have investigated the gas-phase reaction of the alpha-aminoacetate (glycyl) radical anion (NH2(sic)CHCO2-) with O-2 using ion trap mass spectrometry, quantum chemistry, and statistical reaction rate theory. This radical is found to undergo a remarkably rapid reaction with O-2 to form the hydroperoxyl radical (HO2(sic)) and an even-electron imine (NHCHCO2-), with experiments and master equation simulations revealing that reaction proceeds at the ion molecule collision rate. This reaction is facilitated by a low-energy concerted HO2(sic) elimination mechanism in the NH2CH(OO(sic))CO2- peroxyl radical. These findings can explain the widely observed free-radical-mediated oxidation of simple amino acids to amides plus alpha-keto acids (their imine hydrolysis products). This work also suggests that imines will be the main intermediates in the atmospheric oxidation of primary and secondary amines, including amine carbon capture solvents such as 2-aminoethanol (commonly known as monoethanolamine, or MEA), in a process that avoids the ozone-promoting conversion of (sic)NO to (sic)NO2 commonly encountered in peroxyl radical chemistry.
Resumo:
The gas phase degradation reactions of the chemical warfare agent (CWA) simulant, dimethyl methylphosphonate (DMMP), with the hydroperoxide anion (HOO(-)) were investigated using a modified quadrupole ion trap mass spectrometer. The HOO(-) anion reacts readily with neutral DMMP forming two significant product ions at m/z 109 and m/z 123. The major reaction pathways correspond to (i) the nucleophilic substitution at carbon to form \[CH(3)P(O)(OCH(3))O](-) (m/z 109) in a highly exothermic process and (ii) exothermic proton transfer. The branching ratios of the two reaction pathways, 89% and 11% respectively, indicate that the former reaction is significantly faster than the latter. This is in contrast to the trend for the methoxide anion with DMMP, where proton transfer dominates. The difference in the observed reactivities of the HOO(-) and CH(3)O(-) anions can be considered as evidence for an a-effect in the gas phase and is supported by electronic structure calculations at the B3LYP/aug-cc-pVTZ//B3LYP/6-31+G(d) level of theory that indicate the S(N)2(carbon) process has an activation energy 7.8 kJ mol(-1) lower for HOO(-) as compared to CH(3)O(-). A similar alpha-effect was calculated for nucleophilic addition-elimination at phosphorus, but this process an important step in the perhydrolysis degradation of CWAs in solution - was not observed to occur with DMMP in the gas phase. A theoretical investigation revealed that all processes are energetically accessible with negative activation energies. However, comparison of the relative Arrhenius pre-exponential factors indicate that substitution at phosphorus is not kinetically competitive with respect to the S(N)2(carbon) and deprotonation processes.
Common origins of MDA-MB-435 cells from various sources with those shown to have melanoma properties
Resumo:
Recently, the tissue origin of MDA-MB-435 cell line has been the subject of considerable debate. In this study, we set out to determine whether MDA-MB-435-DTP cells shown to express melanoma-specific genes were identical to various other MDA-MB-435 cell stocks worldwide. CGH-microarray, genetic polymorphism genotyping, microsatellite fingerprint analysis and/or chromosomal number confirmed that the MDA-MB-435 cells maintained at the Lombardi Comprehensive Cancer Center (MDA-MB-435-LCC) are almost identical to the MDA-MB-435-DTP cells, and showed a very similar profile to those obtained from the same original source (MD Anderson Cancer Center) but maintained independently (MDA-MB-435-PMCC). Gene expression profile analy-sis confirmed common expression of genes among different MDA-MB-435-LCC cell stocks, and identified some unique gene products in MDA-MB-435-PMCC cells. RT-PCR analysis confirmed the expression of the melanoma marker tyrosinase across multiple MDA-MB-435 cell stocks. Collectively, our results show that the MDA-MB-435 cells used widely have identical origins to those that exhibit a melanoma-like gene expression signature, but exhibit a small degree of genotypic and phenotypic drift.
Resumo:
This article explains the new pre-court procedures and additional procedures designed to foster settlement of claims introduced by the Workcover Queensland Act 1996, and the implication of the new provisions for practitioners.
Resumo:
We consider the following problem: users in a dynamic group store their encrypted documents on an untrusted server, and wish to retrieve documents containing some keywords without any loss of data confidentiality. In this paper, we investigate common secure indices which can make multi-users in a dynamic group to obtain securely the encrypted documents shared among the group members without re-encrypting them. We give a formal definition of common secure index for conjunctive keyword-based retrieval over encrypted data (CSI-CKR), define the security requirement for CSI-CKR, and construct a CSI-CKR based on dynamic accumulators, Paillier’s cryptosystem and blind signatures. The security of proposed scheme is proved under strong RSA and co-DDH assumptions.
Resumo:
This paper presents the design of a dual Z-source inverter that can be used with either a single dc source or two isolated dc sources. Unlike traditional inverters, the integration of a properly designed Z-source network and semiconductor switches to the proposed dual inverter allows buck-boost power conversion to be performed over a wide modulation range with three-level output waveforms generated. The connection of an additional transformer to the inverter ac output also allows all generic wye- or delta-connected loads with three-wire or four-wire configuration to be supplied by the inverter. Modulation-wise, the dual inverter can be controlled using a carefully designed carrier-based pulse-width modulation (PWM) scheme that always will ensure balanced voltage boosting of the Z-source network, while simultaneously achieving reduced common-mode switching. Because of the omission of dead-time delays in the dual inverter PWM scheme, its switched common-mode voltage can be completely eliminated, unlike in traditional inverters where narrow common-mode spikes are still generated. Under semiconductor failure conditions, the presented PWM schemes can easily be modified to allow the inverter to operate without interruption and for cases where two isolated sources are used, zero common-mode voltage can still be ensured. These theoretical findings together with the inverter practicality have been confirmed both in simulations using PSIM with Matlab/Simulink coupler and experimentally using a laboratory implemented inverter prototype.
Resumo:
This paper presents the design of a dual Z-source inverter that can be used with either a single dc source or two isolated dc sources. Unlike traditional inverters, the integration of a properly designed Z-source network and semiconductor switches to the proposed dual inverter allows buck-boost power conversion to be performed over a wide modulation range, with three-level output waveforms generated. The connection of an additional transformer to the inverter ac output also allows all generic wye-or delta-connected loads with three-wire or four-wire configuration to be supplied by the inverter. Modulationwise, the dual inverter can be controlled using a carefully designed carrier-based pulsewidth-modulation (PWM) scheme that will always ensure balanced voltage boosting of the Z-source network while simultaneously achieving reduced common-mode switching. Because of the omission of dead-time delays in the dual-inverter PWM scheme, its switched common-mode voltage can be completely eliminated, unlike in traditional inverters, where narrow common-mode spikes are still generated. Under semiconductor failure conditions, the presented PWM schemes can easily be modified to allow the inverter to operate without interruption, and for cases where two isolated sources are used, zero common-mode voltage can still be ensured. These theoretical findings, together with the inverter practicality, have been confirmed in simulations both using PSIM with Matlab/Simulink coupler and experimentally using a laboratory-implemented inverter prototype.
Resumo:
The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.