954 resultados para security complex


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Silk gland cells ofBombyx mori undergo chromosomal endoduplication throughout larval development. The DNA content of both posterior and middle silk gland nuclei increased by 300000 times the haploid genomic content, amounting to 18 rounds of replication. The DNA doubling time is approximately 48 h and 24 h during the fourth and fifth instars of larval development. However, DNA content does not change during the interim moult. Concomitant with DNA content, DNA polymerase activity also increases as development progressed. Enzyme activity is predominantly due to DNA polymerase with no detectable level of polymerase . DNA polymerase from silk gland extracts was purified to homogeneity (using a series of columns involving ionexchange, gel-filtration and affintiy chromatography), resulting in a 4000-fold increase in specific activity. The enzyme is a heterogeneous multimer of high molecular mass, and the catalytic (polymerase) activity is resident in the 180-kDa subunit. The enzyme shows a PI of 6.2 and theKm values for the dNTP vary over 5-16 . The polymerase is tightly associated with primase activity and initiates primer synthesis in the presence of ribonucleoside triphosphates on a single-stranded DNA template. The primase activity is resident in the 45-kDa subunit. The enzyme is devoid of any detectable exonuclease activity. The abundance of DNA polymerase α in silk glands and its strong association with the nuclear matrix suggest a role in the DNA endoduplication process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Proximity of molecules is a crucial factor in many solid- state photochemical processes.'S2 The biomolecular photodimerization reactions in the solid state depend on the relative geometry of reactant molecules in the crystal lattice with center-to-center distance of nearest neighbor double bonds of the order of ca. 4 A. This fact emanates from the incisive studies of Schmidt and Cohen.2 One of the two approaches to achieve this distance requirement is the so-called "Crystal-Engineering" of structures, which essentially involves the introduction of certain functional groups that display in-plane interstacking interactions (Cl...Cl, C-He-0, etc.) in the crystal The chloro group is by far the most successful in promoting the /3- packing m ~ d e ,th~o,u~gh recent studies have shown its limitations? Another approach involves the use of constrained media in which the reactants could hopefully be aligned.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Prediction of thermodynamic parameters of protein-protein and antigen-antibody complex formation from high resolution structural parameters has recently received much attention, since an understanding of the contributions of different fundamental processes like hydrophobic interactions, hydrogen bonding, salt bridge formation, solvent reorganization etc. to the overall thermodynamic parameters and their relations with the structural parameters would lead to rational drug design. Using the results of the dissolution of hydrocarbons and other model compounds the changes in heat capacity (DeltaCp), enthalpy (DeltaH) and entropy (DeltaS) have been empirically correlated with the polar and apolar surface areas buried during the process of protein folding/unfolding and protein-ligand complex formation. In this regard, the polar and apolar surfaces removed from the solvent in a protein-ligand complex have been calculated from the experimentally observed values of changes in heat capacity (DeltaCp) and enthalpy (DeltaH) for protein-ligand complexes for which accurate thermodynamic and high resolution structural data are available, and the results have been compared with the x-ray crystallographic observations. Analyses of the available results show poor correlation between the thermodynamic and structural parameters. Probable reasons for this discrepancy are mostly related with the reorganization of water accompanying the reaction which is indeed proven by the analyses of the energetics of the binding of the wheat germ agglutinin to oligosaccharides.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An unusual copper(II) complex [Cu(L-1a)(2)Cl-2] CH3OH center dot H2O center dot H3O+Cl- (1a) was isolated from a solution of a novel tricopper(II) complex [Cu-3(HL1)Cl-2]Cl-3 center dot 2H(2)O (1) in methanol. where L-1a is 3-(2-pyridyl)triazolo [1,5-a]-pyridine, and characterized with single crystal X-ray diffraction study. The tricopper(II) complex of potential ligand 1,5-bis(di-2-pyridyl ketone) carbohydrazone (H2L1) was synthesized and physicochemically characterized, while the formation of the complex la was followed by time-dependant monitoring of the UV-visible spectra. which reveals degradation of ligand backbone as intensity loss of bands corresponding to O -> Cu(II) charge transfer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Le Corbusier participated in an urban dialogue with the first group in France to call itself fascist: the journalist Georges Valois’s militant Faisceau des Combattants et Producteurs (1925-1927), the “Blue Shirts,” inspired by the Italian “Fasci” of Mussolini. Le Corbusier’s portrait photograph materialised on the front cover of the January 1927 issue of the Faisceau League’s newspaper Le Nouveau Siècle edited by the former anarcho-syndicalist journalist Georges Valois, its leader, who fashioned himself as the French Mussolini. Le Corbusier was described in the Revue as one of les animateurs (the “organisers”) of the Party1 – meaning a member of the technical elite who would drive the Faisceau’s plans. On 1 May 1927, the Nouveau Siècle printed a full-page feature “Le Plan Voisin” on Le Corbusier’s 1922 redesign of Paris : the architect’s single-point perspective sketch appeared below an extract lifted from the architect’s original polemic Le Centre de Paris on the pages of Le Corbusier’s second book Urbanisme published two years earlier, a treatise on urbanism.2 Three weeks later, Le Corbusier presented a slide show of his urban plans at a fascist rally for the inauguration of the Faisceau’s new headquarters on the rue du faubourg Poissonniere, thereby crystalising the architect’s hallowed status in the league...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been a recent spate of high profile infrastructure cost overruns in Australia and internationally. This is just the tip of a longer-term and more deeply-seated problem with initial budget estimating practice, well recognised in both academic research and industry reviews: the problem of uncertainty. A case study of the Sydney Opera House is used to identify and illustrate the key causal factors and system dynamics of cost overruns. It is conventionally the role of risk management to deal with such uncertainty, but the type and extent of the uncertainty involved in complex projects is shown to render established risk management techniques ineffective. This paper considers a radical advance on current budget estimating practice which involves a particular approach to statistical modelling complemented by explicit training in estimating practice. The statistical modelling approach combines the probability management techniques of Savage, which operate on actual distributions of values rather than flawed representations of distributions, and the data pooling technique of Skitmore, where the size of the reference set is optimised. Estimating training employs particular calibration development methods pioneered by Hubbard, which reduce the bias of experts caused by over-confidence and improve the consistency of subjective decision-making. A new framework for initial budget estimating practice is developed based on the combined statistical and training methods, with each technique being explained and discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this chapter we consider biosecurity surveillance as part of a complex system comprising many different biological, environmental and human factors and their interactions. Modelling and analysis of surveillance strategies should take into account these complexities, and also facilitate the use and integration of the many types of different information that can provide insight into the system as a whole. After a brief discussion of a range of options, we focus on Bayesian networks for representing such complex systems. We summarize the features of Bayesian networks and describe these in the context of surveillance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the first time, we find the complex solitons for a quasi-one-dimensional Bose-Einstein condensate with two-and three-body interactions. These localized solutions are characterized by a power law behaviour. Both dark and right solitons can be excited in the experimentally allowed parameter domain, when two-and three-body interactions are,respectively, repulsive and attractive. The dark solitons travel with a constant speed, which is quite different from the Lieb mode, where profiles with different speeds, bounded above by sound velocity, can exist for specified interaction strengths. We also study the properties of these solitons in the presence of harmonic confinement with time-dependent nonlinearity and loss. The modulational instability and the Vakhitov-Kolokolov criterion of stability are also studied.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main objective of on-line dynamic security assessment is to take preventive action if required or decide remedial action if a contingency actually occurs. Stability limits are obtained for different contingencies. The mode of instability is one of the outputs of dynamic security analysis. When a power system becomes unstable, it splits initially into two groups of generators, and there is a unique cutset in the transmission network known as critical cutset across which the angles become unbounded. The knowledge of critical cutset is additional information obtained from dynamic security assessment, which can be used for initiating preventive control actions, deciding emergency control actions, and adaptive out-of-step relaying. In this article, an analytical technique for the fast prediction of the critical cutset by system simulation for a short duration is presented. Case studies on the New England ten-generator system are presented. The article also suggests the applications of the identification of critical cutsets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Technology is increasingly infiltrating all aspects of our lives and the rapid uptake of devices that live near, on or in our bodies are facilitating radical new ways of working, relating and socialising. This distribution of technology into the very fabric of our everyday life creates new possibilities, but also raises questions regarding our future relationship with data and the quantified self. By embedding technology into the fabric of our clothes and accessories, it becomes ‘wearable’. Such ‘wearables’ enable the acquisition of and the connection to vast amounts of data about people and environments in order to provide life-augmenting levels of interactivity. Wearable sensors for example, offer the potential for significant benefits in the future management of our wellbeing. Fitness trackers such as ‘Fitbit’ and ‘Garmen’ provide wearers with the ability to monitor their personal fitness indicators while other wearables provide healthcare professionals with information that improves diagnosis. While the rapid uptake of wearables may offer unique and innovative opportunities, there are also concerns surrounding the high levels of data sharing that come as a consequence of these technologies. As more ‘smart’ devices connect to the Internet, and as technology becomes increasingly available (e.g. via Wi-Fi, Bluetooth), more products, artefacts and things are becoming interconnected. This digital connection of devices is called The ‘Internet of Things’ (IoT). IoT is spreading rapidly, with many traditionally non-online devices becoming increasingly connected; products such as mobile phones, fridges, pedometers, coffee machines, video cameras, cars and clothing. The IoT is growing at a rapid rate with estimates indicating that by 2020 there will be over 25 billion connected things globally. As the number of devices connected to the Internet increases, so too does the amount of data collected and type of information that is stored and potentially shared. The ability to collect massive amounts of data - known as ‘big data’ - can be used to better understand and predict behaviours across all areas of research from societal and economic to environmental and biological. With this kind of information at our disposal, we have a more powerful lens with which to perceive the world, and the resulting insights can be used to design more appropriate products, services and systems. It can however, also be used as a method of surveillance, suppression and coercion by governments or large organisations. This is becoming particularly apparent in advertising that targets audiences based on the individual preferences revealed by the data collected from social media and online devices such as GPS systems or pedometers. This type of technology also provides fertile ground for public debates around future fashion, identity and broader social issues such as culture, politics and the environment. The potential implications of these type of technological interactions via wearables, through and with the IoT, have never been more real or more accessible. But, as highlighted, this interconnectedness also brings with it complex technical, ethical and moral challenges. Data security and the protection of privacy and personal information will become ever more present in current and future ethical and moral debates of the 21st century. This type of technology is also a stepping-stone to a future that includes implantable technology, biotechnologies, interspecies communication and augmented humans (cyborgs). Technologies that live symbiotically and perpetually in our bodies, the built environment and the natural environment are no longer the stuff of science fiction; it is in fact a reality. So, where next?... The works exhibited in Wear Next_ provide a snapshot into the broad spectrum of wearables in design and in development internationally. This exhibition has been curated to serve as a platform for enhanced broader debate around future technology, our mediated future-selves and the evolution of human interactions. As you explore the exhibition, may we ask that you pause and think to yourself, what might we... Wear Next_? WEARNEXT ONLINE LISTINGS AND MEDIA COVERAGE: http://indulgemagazine.net/wear-next/ http://www.weekendnotes.com/wear-next-exhibition-gallery-artisan/ http://concreteplayground.com/brisbane/event/wear-next_/ http://www.nationalcraftinitiative.com.au/news_and_events/event/48/wear-next http://bneart.com/whats-on/wear-next_/ http://creativelysould.tumblr.com/post/124899079611/creative-weekend-art-edition http://www.abc.net.au/radionational/programs/breakfast/smartly-dressed-the-future-of-wearable-technology/6744374 http://couriermail.newspaperdirect.com/epaper/viewer.aspx RADIO COVERAGE http://www.abc.net.au/radionational/programs/breakfast/wear-next-exhibition-whats-next-for-wearable-technology/6745986 TELEVISION COVERAGE http://www.abc.net.au/radionational/programs/breakfast/wear-next-exhibition-whats-next-for-wearable-technology/6745986 https://au.news.yahoo.com/video/watch/29439742/how-you-could-soon-be-wearing-smart-clothes/#page1

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Oxovanadium(IV) complexes [VOCl(B)(2)]Cl (1-3) of phenanthroline bases (B), viz. 1,10-phenanthroline (phen in 1), dipyrido[3,2-d: 2', 3'-f] quinoxaline (dpq in 2) and dipyrido[3,2-a: 2', 3'-c] phenazine (dppz in 3), have been prepared, characterized and their DNA and protein binding, photo-induced DNA and protein cleavage activity andm photocytotoxicity have been studied. Complex 2, structurally characterized by X-ray crystallography, shows the presence of a vanadyl group in VOClN4 coordination geometry. The dpq ligand displays a chelating mode of binding with a N-donor site trans to the oxo-group. The chloride ligand is cis to the oxo-group. The one-electron paramagnetic complexes show a d-d band near 715 nm in 15% DMF-Tris-HCl buffer. The complexes are redox active exhibiting a V(IV)/V(III) redox couple within -0.5 to -0.7 V vs. SCE in 20% DMF-Tris-HCl/0.1 M KCl. The complexes bind to calf thymus (CT) DNA in the order: 3 (dppz) > 2 (dpq) > 1 (phen). The binding data reveal the groove and/or partial intercalative DNA binding nature of the complexes. The complexes show chemical nuclease'' activity in the dark in the presence of 3-mercaptopropionic acid or hydrogen peroxide via a hydroxyl radical pathway. The dpq and dppz complexes are efficient photocleavers of DNA in UV-A light of 365 nm forming reactive singlet oxygen (O-1(2)) and hydroxyl radical ((OH)-O-center dot) species. Complexes 2 and 3 also show DNA cleavage activity in red light (> 750 nm) by an exclusive (OH)-O-center dot pathway. The complexes display a binding propensity to bovine serum albumin (BSA) protein giving K-BSA values in the range of 7.1 x 10(4)-1.8 x 10(5) M-1. The dppz complex 3 shows BSA and lysozyme protein cleavage activity in UV-A light of 365 nm via (OH)-O-center dot pathway. The dppz complex 3 exhibits significant PDT effect in human cervical cancer HeLa cells giving IC50 values of 1.0 mu M and 12.0 mu M in UV-A and visible light, respectively (IC50 = > 100 mu M in the dark).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a signal processing approach using discrete wavelet transform (DWT) for the generation of complex synthetic aperture radar (SAR) images at an arbitrary number of dyadic scales of resolution. The method is computationally efficient and is free from significant system-imposed limitations present in traditional subaperture-based multiresolution image formation. Problems due to aliasing associated with biorthogonal decomposition of the complex signals are addressed. The lifting scheme of DWT is adapted to handle complex signal approximations and employed to further enhance the computational efficiency. Multiresolution SAR images formed by the proposed method are presented.