967 resultados para LIGAND DOMAIN
Resumo:
This thesis aims to find an effective way of conducting a target audience analysis (TAA) in cyber domain. There are two main focal points that are addressed; the nature of the cyber domain and the method of the TAA. Of the cyber domain the object is to find the opportunities, restrictions and caveats that result from its digital and temporal nature. This is the environment in which the TAA method is examined in this study. As the TAA is an important step of any psychological operation and critical to its success, the method used must cover all the main aspects affecting the choice of a proper target audience. The first part of the research was done by sending an open-ended questionnaire to operators in the field of information warfare both in Finland and abroad. As the results were inconclusive, the research was completed by assessing the applicability of United States Army Joint Publication FM 3-05.301 in the cyber domain via a theory-based content analysis. FM 3- 05.301 was chosen because it presents a complete method of the TAA process. The findings were tested against the results of the questionnaire and new scientific research in the field of psychology. The cyber domain was found to be “fast and vast”, volatile and uncontrollable. Although governed by laws to some extent, the cyber domain is unpredictable by nature and not controllable to reasonable amount. The anonymity and lack of verification often present in the digital channels mean that anyone can have an opinion, and any message sent may change or even be counterproductive to the original purpose. The TAA method of the FM 3-05.301 is applicable in the cyber domain, although some parts of the method are outdated and thus suggested to be updated if used in that environment. The target audience categories of step two of the process were replaced by new groups that exist in the digital environment. The accessibility assessment (step eight) was also redefined, as in the digital media the mere existence of a written text is typically not enough to convey the intended message to the target audience. The scientific studies made in computer sciences and both in psychology and sociology about the behavior of people in social media (and overall in cyber domain) call for a more extensive remake of the TAA process. This falls, however, out of the scope of this work. It is thus suggested that further research should be carried out in search of computer-assisted methods and a more thorough TAA process, utilizing the latest discoveries of human behavior. ---------------------------------------------------------------------------------------------------------------------------------- Tämän opinnäytetyön tavoitteena on löytää tehokas tapa kohdeyleisöanalyysin tekemiseksi kybertoimintaympäristössä. Työssä keskitytään kahteen ilmiöön: kybertoimintaympäristön luonteeseen ja kohdeyleisöanalyysin metodiin. Kybertoimintaympäristön osalta tavoitteena on löytää sen digitaalisesta ja ajallisesta luonteesta juontuvat mahdollisuudet, rajoitteet ja sudenkuopat. Tämä on se ympäristö jossa kohdeyleisöanalyysiä tarkastellaan tässä työssä. Koska kohdeyleisöanalyysi kuuluu olennaisena osana jokaiseen psykologiseen operaatioon ja on onnistumisen kannalta kriittinen tekijä, käytettävän metodin tulee pitää sisällään kaikki oikean kohdeyleisön valinnan kannalta merkittävät osa-alueet. Tutkimuksen ensimmäisessä vaiheessa lähetettiin avoin kysely informaatiosodankäynnin ammattilaisille Suomessa ja ulkomailla. Koska kyselyn tulokset eivät olleet riittäviä johtopäätösten tekemiseksi, tutkimusta jatkettiin tarkastelemalla Yhdysvaltojen armeijan kenttäohjesäännön FM 3-05.301 soveltuvuutta kybertoimintaympäristössä käytettäväksi teorialähtöisen sisällönanalyysin avulla. FM 3-05.301 valittiin koska se sisältää kokonaisvaltaisen kohdeyleisöanalyysiprosessin. Havaintoja verrattiin kyselytutkimuksen tuloksiin ja psykologian uusiin tutkimuksiin. Kybertoimintaympäristö on tulosten perusteella nopea ja valtava, jatkuvasti muuttuva ja kontrolloimaton. Vaikkakin lait hallitsevat kybertoimintaympäristöä jossakin määrin, on se silti luonteeltaan ennakoimaton eikä sitä voida luotettavasti hallita. Digitaalisilla kanavilla usein läsnäoleva nimettömyys ja tiedon tarkastamisen mahdottomuus tarkoittavat että kenellä tahansa voi olla mielipide asioista, ja mikä tahansa viesti voi muuttua, jopa alkuperäiseen tarkoitukseen nähden vastakkaiseksi. FM 3-05.301:n metodi toimii kybertoimintaympäristössä, vaikkakin jotkin osa-alueet ovat vanhentuneita ja siksi ne esitetään päivitettäväksi mikäli metodia käytetään kyseisessä ympäristössä. Kohdan kaksi kohdeyleisökategoriat korvattiin uusilla, digitaalisessa ympäristössä esiintyvillä ryhmillä. Lähestyttävyyden arviointi (kohta 8) muotoiltiin myös uudestaan, koska digitaalisessa mediassa pelkkä tekstin läsnäolo ei sellaisenaan tyypillisesti vielä riitä halutun viestin välittämiseen kohdeyleisölle. Tietotekniikan edistyminen ja psykologian sekä sosiologian aloilla tehty tieteellinen tutkimus ihmisten käyttäytymisestä sosiaalisessa mediassa (ja yleensä kybertoimintaympäristössä) mahdollistavat koko kohdeyleisöanalyysiprosessin uudelleenrakentamisen. Tässä työssä sitä kuitenkaan ei voida tehdä. Siksi esitetäänkin että lisätutkimusta tulisi tehdä sekä tietokoneavusteisten prosessien että vielä syvällisempien kohdeyleisöanalyysien osalta, käyttäen hyväksi viimeisimpiä ihmisen käyttäytymiseen liittyviä tutkimustuloksia.
Resumo:
Two adjacent tracts of tropical secondary forest, situated in Itambé do Mato Dentro, south-eastern Brazil, which had been regenerating for 15 and 40 years after clearing, were compared with the purpose of detecting differences in species diversity and composition, species guild composition (regeneration, stratification and dispersion), and stand structure. Four and three 1,125 m² plots laid on the 15- and 40-year-old stands, respectively, sampled 2,430 trees with diameter at the base of the stem > 5 cm. The number of species (S = 199) was high for this forest type and significantly higher for the older stand. Tree density was significantly higher in the younger stand, particularly for smaller trees, whereas the two stands did not differ in both basal area and volume per hectare. Trees of shade-tolerant and understory species were significantly more abundant in the older stand. Though sharing a large proportion of species (49%), the two stands differed significantly in the abundance of many species. Live stumps probably contributed to the relatively quick restoration of some forest characteristics, particularly species diversity, basal area and volume.
Resumo:
A simple and inexpensive shaker/Erlenmeyer flask system for large-scale cultivation of insect cells is described and compared to a commercial spinner system. On the basis of maximum cell density, average population doubling time and overproduction of recombinant protein, a better result was obtained with a simpler and less expensive bioreactor consisting of Erlenmeyer flasks and an ordinary shaker waterbath. Routinely, about 90 mg of pure poly(ADP-ribose) polymerase catalytic domain was obtained for a total of 3 x 109 infected cells in three liters of culture
Resumo:
The effects of the benzodiazepine1 (BZ1) receptor agonist SX-3228 were studied in rats (N = 12) implanted for chronic sleep procedures. Administration of 0.5, 1.0 and 2.5 mg/kg SX-3228, sc, to rats 1 h after the beginning of the light phase of the light-dark cycle induced a significant reduction of rapid-eye-movement sleep (REMS) during the third recording hour. Moreover, slow wave sleep (SWS) was increased during the fourth recording hour after the two largest doses of the compound. Administration of 0.5, 1.0 and 2.5 mg/kg SX-3228 one hour after the beginning of the dark period of the light-dark cycle caused a significant and maintained (6-h recording period) reduction of waking (W), whereas SWS and light sleep (LS) were increased. REMS values tended to increase during the entire recording period; however, the increase was statistically significant only for the 1.0 mg/kg dose during the first recording hour. In addition, a significant and dose-related increase of power density in the delta and the theta regions was found during nonREM sleep (LS and SWS) in the dark period. Our results indicate that SX-3228 is a potent hypnotic when given to the rat during the dark period of the light-dark cycle. Moreover, the sleep induced by SX-3228 during the dark phase closely resembles the physiological sleep of the rat.
Resumo:
The purpose of the present study was to investigate the expression (mRNA) of CD40 ligand (CD40L), interferon-gamma (IFN-gamma) and Fas ligand (FasL) genes in human cardiac allografts in relation to the occurrence of acute cardiac allograft rejection as well as its possible value in predicting acute rejection. The mRNA levels were determined by a semiquantitative reverse transcriptase-polymerase chain reaction method in 39 samples of endomyocardial biopsies obtained from 10 adult cardiac transplant recipients within the first six months after transplantation. Biopsies with ongoing acute rejection showed significantly higher CD40L, IFN-gamma and FasL mRNA expression than biopsies without rejection. The median values of mRNA expression in biopsies with and without rejection were 0.116 and zero for CD40L (P<0.003), 0.080 and zero for IFN-gamma (P<0.0009), and 0.156 and zero for FasL (P<0.002), respectively. In addition, the levels of IFN-gamma mRNA were significantly increased 7 to 15 days before the appearance of histological evidence of rejection (median of 0.086 in pre-rejection biopsies), i.e., they presented a predictive value. This study provides further evidence of heightened expression of immune activation genes during rejection and shows that some of these markers may present predictive value for the occurrence of acute rejection.
Resumo:
A construct (AT1R-NF) containing a "Flag" sequence added to the N-terminus of the rat AT1 receptor was stably expressed in Chinese hamster ovary cells and quantified in the cell membrane by confocal microscopy after reaction with a fluorescein-labeled anti-Flag monoclonal antibody. Angiotensin II bound to AT1R-NF and induced endocytosis with a half-time of 2 min. After 60-90 min, fluorescence accumulated around the cell nucleus, suggesting migration of the ligand-receptor complex to the nuclear membrane. Angiotensin antagonists also induced endocytosis, suggesting that a common step in the transduction signal mechanism occurring after ligand binding may be responsible for the ligand-receptor complex internalization.
Resumo:
Nonobese diabetic (NOD) mice and a derived strain, NOD.H.2h4, have been used as a model for experimental spontaneous thyroiditis and thyroiditis induced by iodide excess after a goiter-inducing period. Some authors have proposed that iodide, given after methimazole or propylthiouracil, is capable of inducing apoptosis in thyroid cells and that anti-thyroid drugs can modulate the expression of apoptosis components such as Fas and its ligand (Fas-L). Here we evaluated the effect of potassium iodide (20 µg/animal for 4 days, ip) given to NOD mice at the 10th week of life after exposure to methimazole (1 mg/ml) in drinking water from the 4th to the 10th week of life. Fas, Fas-L and Bcl-w expression were analyzed semiquantitatively by RT-PCR immediately after potassium iodide administration (group MI44D) or at week 32 (MI32S). Control groups were added at 10 (C10) and 32 weeks (C32), as well as a group that received only methimazole (CM10). An increase in the expression of Fas-L and Bcl-w (P<0.01, ANOVA) was observed in animals of group MI44D, while Fas was expressed at higher levels (P = 0.02) in group C32 (72.89 ± 47.09 arbitrary units) when compared to group C10 (10.8 ± 8.55 arbitrary units). Thus, the analysis of Fas-L and Bcl-w expression in the MI44D group and Fas in group C32 allowed us to detect two different patterns of expression of these apoptosis components in thyroid tissue of NOD mice.
Resumo:
Centromere function requires the proper coordination of several subfunctions, such as kinetochore assembly, sister chromatid cohesion, binding of kinetochore microtubules, orientation of sister kinetochores to opposite spindle poles, and their movement towards the spindle poles. Centromere structure appears to be organized in different, separable domains in order to accomplish these functions. Despite the conserved nature of centromere functions, the molecular genetic definition of the DNA sequences that form a centromere in the yeasts Saccharomyces cerevisiae and Schizosaccharomyces pombe, in the fruit fly Drosophila melanogaster, and in humans has revealed little conservation at the level of centromere DNA sequences. Also at the protein level few centromere proteins are conserved in all of these four organisms and many are unique to the different organisms. The recent analysis of the centromere structure in the yeast S. pombe by electron microscopy and detailed immunofluorescence microscopy of Drosophila centromeres have brought to light striking similarities at the overall structural level between these centromeres and the human centromere. The structural organization of the centromere is generally multilayered with a heterochromatin domain and a central core/inner plate region, which harbors the outer plate structures of the kinetochore. It is becoming increasingly clear that the key factors for assembly and function of the centromere structure are the specialized histones and modified histones which are present in the centromeric heterochromatin and in the chromatin of the central core. Thus, despite the differences in the DNA sequences and the proteins that define a centromere, there is an overall structural similarity between centromeres in evolutionarily diverse eukaryotes.
Resumo:
Almost identical polyglutamine-containing proteins with unknown structures have been found in human, mouse and rat genomes (GenBank AJ277365, AF525300, AY879229). We infer that an identical new gene (RING) finger domain of real interest is located in each C-terminal segment. A three-dimensional (3-D) model was generated by remote homology modeling and the functional implications are discussed. The model consists of 65 residues from terminal position 707 to 772 of the human protein with a total length of 796 residues. The 3-D model predicts a ubiquitin-protein ligase (E3) as a binding site for ubiquitin-conjugating enzyme (E2). Both enzymes are part of the ubiquitin pathway to label unwanted proteins for subsequent enzymatic degradation. The molecular contact specificities are suggested for both the substrate recognition and the residues at the possible E2-binding surface. The predicted structure, of a ubiquitin-protein ligase (E3, enzyme class number 6.3.2.19, CATH code 3.30.40.10.4) may contribute to explain the process of ubiquitination. The 3-D model supports the idea of a C3HC4-RING finger with a partially new pattern. The putative E2-binding site is formed by a shallow hydrophobic groove on the surface adjacent to the helix and one zinc finger (L722, C739, P740, P741, R744). Solvent-exposed hydrophobic amino acids lie around both zinc fingers (I717, L722, F738, or P765, L766, V767, V733, P734). The 3-D structure was deposited in the protein databank theoretical model repository (2B9G, RCSB Protein Data Bank, NJ).
Resumo:
The dorsoventral axis of the eye is determined prior to optic cup invagination. A variety of signaling pathways have been implicated in the maintenance of the optic dorsoventral axis, including, but not limited to, bone morphogenetic protein 4, Sonic Hedgehog and retinoic acid. Here, we investigated the possible contribution of Wnt ligands to the establishment or maintenance of the optic axis by analyzing their expression pattern during early chick optic development. We performed in situ hybridization of Wnt-1, Wnt-3a, Wnt-4, and Wnt-5a during the optic vesicle, early optic cup and established optic cup stages and focused our analysis on the optic region. Our data showed that Wnt-5a, but none of the others, is expressed in the dorsal region of the eye starting from the Hamburger and Hamilton stage 14 (HH14). These results are supported by cryosections of the labeled optic region, which further reveal that Wnt-5a is expressed only in the dorsal retinal pigmented epithelium. Thus, we propose that Wnt-5a is a marker for dorsal retinal pigmented epithelium in chick embryos from HH14 to HH19.
Resumo:
Ionotropic glutamate receptors are major excitatory receptors in the central nervous system and also have a far reaching influence in other areas of the body. Their modular nature has allowed for the isolation of the ligand-binding domain and for subsequent structural studies using a variety of spectroscopic techniques. This review will discuss the role of specific ligand:protein interactions in mediating activation in the a-amino-3-hydroxy-5-methyl-4-isoxazolepropionic acid subtype of glutamate receptors as established by various spectroscopic investigations of the GluR2 and GluR4 subunits of this receptor. Specifically, this review will provide an introduction to the insight gained from X-ray crystallography and nuclear magnetic resonance investigations and then go on to focus on studies utilizing vibrational spectroscopy and fluorescence resonance energy transfer to study the behavior of the isolated ligand-binding domain in solution and discuss the importance of specific ligand:protein interactions in the mechanism of receptor activation.
Resumo:
Azospirillum brasilense is a diazotroph that associates with important agricultural crops and thus has potential to be a nitrogen biofertilizer. The A. brasilense transcription regulator NifA, which seems to be constitutively expressed, activates the transcription of nitrogen fixation genes. It has been suggested that the nitrogen status-signaling protein GlnB regulates NifA activity by direct interaction with the NifA N-terminal GAF domain, preventing the inhibitory effect of this domain under conditions of nitrogen fixation. In the present study, we show that an N-terminal truncated form of NifA no longer required GlnB for activity and lost regulation by ammonium. On the other hand, in trans co-expression of the N-terminal GAF domain inhibited the N-truncated protein in response to fixed nitrogen levels. We also used pull-down assays to show in vitro interaction between the purified N-terminal GAF domain of NifA and the GlnB protein. The results showed that A. brasilense GlnB interacts directly with the NifA N-terminal domain and this interaction is dependent on the presence of ATP and 2-oxoglutarate.
Resumo:
Siva-1 induces apoptosis in multiple pathological processes and plays an important role in the suppression of tumor metastasis, protein degradation, and other functions. Although many studies have demonstrated that Siva-1 functions in the cytoplasm, a few have found that Siva-1 can relocate to the nucleus. In this study, we found that the first 33 amino acid residues of Siva-1 are required for its nuclear localization. Further study demonstrated that the green fluorescent protein can be imported into the nucleus after fusion with these 33 amino acid residues. Other Siva-1 regions and domains showed less effect on Siva-1 nuclear localization. By site-mutagenesis of all of these 33 amino acid residues, we found that mutants of the first 1-18 amino acids affected Siva-1 nuclear compartmentalization but could not complete this localization independently. In summary, we demonstrated that the N-terminal 33 amino acid residues were sufficient for Siva-1 nuclear localization, but the mechanism of this translocation needs additional investigation.
Resumo:
Notch signaling plays a vital role in tumorigenicity and tumor progression by regulating proliferation, invasion, and the tumor microenvironment. Previous research by our group indicated that Notch ligand Delta-like 1 (Dll1) is involved in angiogenesis in melanoma, and we noticed that it took a longer time to trypsinize Dll1-expressing B16 melanoma cells than the control cells. In this article, we extended our study to investigate the effects of Dll1 on tumor cell adhesion and metastasis. Dll1 overexpression activated Notch signaling in B16 tumor cells and significantly enhanced the adhering capacity of B16 tumor cells both in vitro and in vivo. B16-Dll1 cells also had a higher metastatic potential than their counterpart in the mouse model of lung metastasis. Along with increased Dll1 expression, N-cadherin, but not E-cadherin, was upregulated in B16-Dll1 cells. These data suggested that Notch ligand Dll1 may enhance the adhesion and metastasis of melanoma cells by upregulation of N-cadherin.
Resumo:
Phenomena in cyber domain, especially threats to security and privacy, have proven an increasingly heated topic addressed by different writers and scholars at an increasing pace – both nationally and internationally. However little public research has been done on the subject of cyber intelligence. The main research question of the thesis was: To what extent is the applicability of cyber intelligence acquisition methods circumstantial? The study was conducted in sequential a manner, starting with defining the concept of intelligence in cyber domain and identifying its key attributes, followed by identifying the range of intelligence methods in cyber domain, criteria influencing their applicability, and types of operatives utilizing cyber intelligence. The methods and criteria were refined into a hierarchical model. The existing conceptions of cyber intelligence were mapped through an extensive literature study on a wide variety of sources. The established understanding was further developed through 15 semi-structured interviews with experts of different backgrounds, whose wide range of points of view proved to substantially enhance the perspective on the subject. Four of the interviewed experts participated in a relatively extensive survey based on the constructed hierarchical model on cyber intelligence that was formulated in to an AHP hierarchy and executed in the Expert Choice Comparion online application. It was concluded that Intelligence in cyber domain is an endorsing, cross-cutting intelligence discipline that adds value to all aspects of conventional intelligence and furthermore that it bears a substantial amount of characteristic traits – both advantageous and disadvantageous – and furthermore that the applicability of cyber intelligence methods is partly circumstantially limited.