988 resultados para Enzyme applications
Resumo:
The present article gives an overview of the reversible addition fragmentation chain transfer (RAFT) process. RAFT is one of the most versatile living radical polymerization systems and yields polymers of predictable chain length and narrow molecular weight distribution. RAFT relies on the rapid exchange of thiocarbonyl thio groups between growing polymeric chains. The key strengths of the RAFT process for polymer design are its high tolerance of monomer functionality and reaction conditions, the wide range of well-controlled polymeric architectures achievable, and its (in-principle) non-rate-retarding nature. This article introduces the mechanism of polymerization, the range of polymer molecular weights achievable, the range of monomers in which polymerization is controlled by RAFT, the various polymeric architectures that can be obtained, the type of end-group functionalities available to RAFT-made polymers, and the process of RAFT polymerization.
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.
Resumo:
While applications of amine oxidases are increasing, few have been characterised and our understanding of their biological role and strategies for bacteria exploitation are limited. By altering the nitrogen source (NH4Cl, putrescine and cadaverine (diamines) and butylamine (monoamine)) and concentration, we have identified a constitutive flavin dependent oxidase (EC 1.4.3.10) within Rhodococcus opacus. The activity of this oxidase can be increased by over two orders of magnitude in the presence of aliphatic diamines. In addition, the expression of a copper dependent diamine oxidase (EC 1.4.3.22) was observed at diamine concentrations>1mM or when cells were grown with butylamine, which acts to inhibit the flavin oxidase. A Michaelis-Menten kinetic treatment of the flavin oxidase delivered a Michaelis constant (KM)=190μM and maximum rate (kcat)=21.8s(-1) for the oxidative deamination of putrescine with a lower KM (=60μM) and comparable kcat (=18.2s(-1)) for the copper oxidase. MALDI-TOF and genomic analyses have indicated a metabolic clustering of functionally related genes. From a consideration of amine oxidase specificity and sequence homology, we propose a putrescine degradation pathway within Rhodococcus that utilises oxidases in tandem with subsequent dehydrogenase and transaminase enzymes. The implications of PUT homeostasis through the action of the two oxidases are discussed with respect to stressors, evolution and application in microbe-assisted phytoremediation or bio-augmentation.
Resumo:
By combining gene design and heterologous over-expression of Rhodotorula gracilis D-amino acid oxidase (RgDAO) in Pichia pastoris, enzyme production was enhanced by one order of magnitude compared to literature benchmarks, giving 350 kUnits/l of fed-batch bioreactor culture with a productivity of 3.1 kUnits/l h. P. pastoris cells permeabilized by freeze-drying and incubation in 2-propanol (10% v/v) produce a highly active (1.6 kUnits/g dry matter) and stable oxidase preparation. Critical bottlenecks in the development of an RgDAO catalyst for industrial applications have been eliminated.
Resumo:
Trigonopsis variabilis D-amino acid oxidase (TvDAO) is a well characterized enzyme used for cephalosporin C conversion on industrial scale. However, the demands on the enzyme with respect to activity, operational stability and costs also vary with the field of application. Processes that use the soluble enzyme suffer from fast inactivation of TvDAO while immobilized oxidase preparations raise issues related to expensive carriers and catalyst efficiency. Therefore, oxidase preparations that are more robust and active than those currently available would enable a much broader range of economically viable applications of this enzyme in fine chemical syntheses. A multi-step engineering approach was chosen here to develop a robust and highly active Pichia pastoris TvDAO whole-cell biocatalyst. As compared to the native T. variabilis host, a more than seven-fold enhancement of the intracellular level of oxidase activity was achieved in P. pastoris through expression optimization by codon redesign as well as efficient subcellular targeting of the enzyme to peroxisomes. Multi copy integration further doubled expression and the specific activity of the whole cell catalyst. From a multicopy production strain, about 1.3 x 103 U/g wet cell weight (wcw) were derived by standard induction conditions feeding pure methanol. A fed-batch cultivation protocol using a mixture of methanol and glycerol in the induction phase attenuated the apparent toxicity of the recombinant oxidase to yield final biomass concentrations in the bioreactor of >or= 200 g/L compared to only 117 g/L using the standard methanol feed. Permeabilization of P. pastoris using 10% isopropanol yielded a whole-cell enzyme preparation that showed 49% of the total available intracellular oxidase activity and was notably stabilized (by three times compared to a widely used TvDAO expressing Escherichia coli strain) under conditions of D-methionine conversion using vigorous aeration. Stepwise optimization using a multi-level engineering approach has delivered a new P. pastoris whole cell TvDAO biocatalyst showing substantially enhanced specific activity and stability under operational conditions as compared to previously reported preparations of the enzyme. The production of the oxidase through fed-batch bioreactor culture and subsequent cell permeabilization is high-yielding and efficient. Therefore this P. pastoris catalyst has been evaluated for industrial purposes.
Resumo:
Autonomous navigation and picture compilation tasks require robust feature descriptions or models. Given the non Gaussian nature of sensor observations, it will be shown that Gaussian mixture models provide a general probabilistic representation allowing analytical solutions to the update and prediction operations in the general Bayesian filtering problem. Each operation in the Bayesian filter for Gaussian mixture models multiplicatively increases the number of parameters in the representation leading to the need for a re-parameterisation step. A computationally efficient re-parameterisation step will be demonstrated resulting in a compact and accurate estimate of the true distribution.
Resumo:
Analysis of behavioural consistency is an important aspect of software engineering. In process and service management, consistency verification of behavioural models has manifold applications. For instance, a business process model used as system specification and a corresponding workflow model used as implementation have to be consistent. Another example would be the analysis to what degree a process log of executed business operations is consistent with the corresponding normative process model. Typically, existing notions of behaviour equivalence, such as bisimulation and trace equivalence, are applied as consistency notions. Still, these notions are exponential in computation and yield a Boolean result. In many cases, however, a quantification of behavioural deviation is needed along with concepts to isolate the source of deviation. In this article, we propose causal behavioural profiles as the basis for a consistency notion. These profiles capture essential behavioural information, such as order, exclusiveness, and causality between pairs of activities of a process model. Consistency based on these profiles is weaker than trace equivalence, but can be computed efficiently for a broad class of models. In this article, we introduce techniques for the computation of causal behavioural profiles using structural decomposition techniques for sound free-choice workflow systems if unstructured net fragments are acyclic or can be traced back to S- or T-nets. We also elaborate on the findings of applying our technique to three industry model collections.
Resumo:
Cold-active lipases are of significant interest as biocatalysts in industrial processes. We have identified a lipase that displayed activity towards long carbon-chain-p-nitrophenyl substrates (C12–C18) at 25 °C from the culture supernatant of an Antarctic Penicillium expansum strain assigned P. expansum SM3. Zymography revealed a protein band of around 30 kDa with activity towards olive oil. DNA fragments of a lipase gene designated as lipPE were isolated from the genomic DNA of P. expansum SM3 by genomic walking PCR. Subsequently, the complete genomic lipPE gene was amplified using gene-specific primers designed from the 5′- and 3′-regions. Reverse transcription PCR was used to amplify the lipPE cDNA. The deduced amino acid sequence consisted of 285 residues that included a predicted signal peptide. Three peptides identified by LC/MS/MS analysis of the proteins in the culture supernatant of P. expansum were also present in the deduced amino acid sequence of the lipPE gene suggesting that this gene encoded the lipase identified by initial zymogram activity analysis. Full analysis of the nucleotide and the deduced amino acid sequences indicated that the lipPE gene encodes a novel P. expansum lipase. The lipPE gene was expressed in E. coli for further characterization of the enzyme with a view of assessing its suitability for industrial applications.
Resumo:
Background Kiwifruit (Actinidia spp.) are a relatively new, but economically important crop grown in many different parts of the world. Commercial success is driven by the development of new cultivars with novel consumer traits including flavor, appearance, healthful components and convenience. To increase our understanding of the genetic diversity and gene-based control of these key traits in Actinidia, we have produced a collection of 132,577 expressed sequence tags (ESTs). Results The ESTs were derived mainly from four Actinidia species (A. chinensis, A. deliciosa, A. arguta and A. eriantha) and fell into 41,858 non redundant clusters (18,070 tentative consensus sequences and 23,788 EST singletons). Analysis of flavor and fragrance-related gene families (acyltransferases and carboxylesterases) and pathways (terpenoid biosynthesis) is presented in comparison with a chemical analysis of the compounds present in Actinidia including esters, acids, alcohols and terpenes. ESTs are identified for most genes in color pathways controlling chlorophyll degradation and carotenoid biosynthesis. In the health area, data are presented on the ESTs involved in ascorbic acid and quinic acid biosynthesis showing not only that genes for many of the steps in these pathways are represented in the database, but that genes encoding some critical steps are absent. In the convenience area, genes related to different stages of fruit softening are identified. Conclusion This large EST resource will allow researchers to undertake the tremendous challenge of understanding the molecular basis of genetic diversity in the Actinidia genus as well as provide an EST resource for comparative fruit genomics. The various bioinformatics analyses we have undertaken demonstrates the extent of coverage of ESTs for genes encoding different biochemical pathways in Actinidia.
Resumo:
This thesis developed new search engine models that elicit the meaning behind the words found in documents and queries, rather than simply matching keywords. These new models were applied to searching medical records: an area where search is particularly challenging yet can have significant benefits to our society.
Resumo:
Smartphone technology provides free or inexpensive access to mental health and wellbeing resources. As a result the use of mobile applications for these purposes has increased significantly in recent years. Yet, there is currently no app quality assessment alternative to the popular ‘star’-ratings, which are often unreliable. This presentation describes the development of the Mobile Application Rating Scale (MARS) a new measure for classifying and rating the quality of mobile applications. A review of existing literature on app and web quality identified 25 published papers, conference proceedings, and online resources (published since 1999), which identified 372 explicit quality criteria. Qualitative analysis identified five broad categories of app quality rating criteria: engagement, functionality, aesthetics, information quality, and overall satisfaction, which were refined into the 23-item MARS. Independent ratings of 50 randomly selected mental health and wellbeing mobile apps indicated the MARS had excellent levels of internal consistency (α = 0.92) and inter-rater reliability (ICC = 0.85). The MARS provides practitioners and researchers with an easy-to-use, simple, objective and reliable tool for assessing mobile app quality. It also provides mHealth professionals with a checklist for the design and development of high quality apps.
Resumo:
This thesis investigates the fusion of 3D visual information with 2D image cues to provide 3D semantic maps of large-scale environments in which a robot traverses for robotic applications. A major theme of this thesis was to exploit the availability of 3D information acquired from robot sensors to improve upon 2D object classification alone. The proposed methods have been evaluated on several indoor and outdoor datasets collected from mobile robotic platforms including a quadcopter and ground vehicle covering several kilometres of urban roads.
Resumo:
Purpose The purpose of this study was to evaluate the validity of the CSA activity monitor as a measure of children's physical activity using energy expenditure (EE) as a criterion measure. Methods Thirty subjects aged 10 to 14 performed three 5-min treadmill bouts at 3, 4, and 6 mph, respectively. While on the treadmill, subjects wore CSA (WAM 7164) activity monitors on the right and left hips. (V) over dot O-2 was monitored continuously by an automated system. EE was determined by multiplying the average (V) over dot O-2 by the caloric equivalent of the mean respiratory exchange ratio. Results Repeated measures ANOVA indicated that both CSA monitors were sensitive to changes in treadmill speed. Mean activity counts from each CSA unit were not significantly different and the intraclass reliability coefficient for the two CSA units across all speeds was 0.87. Activity counts from both CSA units were strongly correlated with EE (r = 0.86 and 0.87, P < 0.001). An EE prediction equation was developed from 20 randomly selected subjects and cross-validated on the remaining 10. The equation predicted mean EE within 0.01 kcal.min(-1). The correlation between actual and predicted values was 0.93 (P < 0.01) and the SEE was 0.93 kcal.min(-1). Conclusion These data indicate that the CSA monitor is a valid and reliable tool for quantifying treadmill walking and running in children.