898 resultados para control the coil voltage
Resumo:
The pattern of expression of the pro$\alpha$2(I) collagen gene is highly tissue-specific in adult mice and shows its strongest expression in bones, tendons, and skin. Transgenic mice were generated harboring promoter fragments of the mouse pro$\alpha$2(I) collagen gene linked to the Escherichia coli $\beta$-galactosidase or firefly luciferase genes to examine the activity of these promoters during development. A region of the mouse pro$\alpha$2(I) collagen promoter between $-$2000 and +54 exhibited a pattern of $\beta$-galactosidase activity during embryonic development that corresponded to the expression pattern of the endogenous pro$\alpha$2(I) collagen gene as determined by in situ hybridization. A similar pattern of activity was also observed with much smaller promoter fragments containing either 500 or 350 bp of upstream sequence relative to the start of transcription. Embryonic regions expressing high levels of $\beta$-galactosidase activity included the valves of the developing heart, sclerotomes, meninges, limb buds, connective tissue fascia between muscle fibers, osteoblasts, tendon, periosteum, dermis, and peritoneal membranes. The pattern of $\beta$-galactosidase activity was similar to the extracellular immunohistochemical localization of transforming growth factor-$\beta$1 (TGF-$\beta$1). The $-$315 to $-$284 region of the pro$\alpha$2(I) collagen promoter was previously shown to mediate the stimulatory effects of TGF-$\beta$1 on the pro$\alpha$2(I) collagen promoter in DNA transfection experiments with cultured fibroblasts. A construct containing this sequence tandemly repeated 5$\sp\prime$ to both a very short $\alpha$2(I) collagen promoter ($-$40 to +54) and a heterologous minimal promoter showed preferential activity in tail and skin of 4-week old transgenic mice. The pattern of expression mimics that of the $-$350 to +54 pro$\alpha$2(I) collagen promoter linked to a luciferase reporter gene in transgenic mice. ^
Resumo:
The immunoglobulin (Ig) molecule is composed of two identical heavy chains and two identical light chains (H2L2). Transport of this heteromeric complex is dependent on the correct assembly of the component parts, which is controlled, in part, by the association of incompletely assembled Ig heavy chains with the endoplasmic reticulum (ER) chaperone, BiP. Although other heavy chain-constant domains interact transiently with BiP, in the absence of light chain synthesis, BiP binds stably to the first constant domain (CH1) of the heavy chain, causing it to be retained in the ER. Using a simplified two-domain Ig heavy chain (VH-CH1), we have determined why BiP remains bound to free heavy chains and how light chains facilitate their transport. We found that in the absence of light chain expression, the CH1 domain neither folds nor forms its intradomain disulfide bond and therefore remains a substrate for BiP. In vivo, light chains are required to facilitate both the folding of the CH1 domain and the release of BiP. In contrast, the addition of ATP to isolated BiP–heavy chain complexes in vitro causes the release of BiP and allows the CH1 domain to fold in the absence of light chains. Therefore, light chains are not intrinsically essential for CH1 domain folding, but play a critical role in removing BiP from the CH1 domain, thereby allowing it to fold and Ig assembly to proceed. These data suggest that the assembly of multimeric protein complexes in the ER is not strictly dependent on the proper folding of individual subunits; rather, assembly can drive the complete folding of protein subunits.
Resumo:
Progesterone-induced meiotic maturation of Xenopus oocytes requires the synthesis of new proteins, such as Mos and cyclin B. Synthesis of Mos is thought to be necessary and sufficient for meiotic maturation; however, it has recently been proposed that newly synthesized proteins binding to p34cdc2 could be involved in a signaling pathway that triggers the activation of maturation-promoting factor. We focused our attention on cyclin B proteins because they are synthesized in response to progesterone, they bind to p34cdc2, and their microinjection into resting oocytes induces meiotic maturation. We investigated cyclin B accumulation in response to progesterone in the absence of maturation-promoting factor–induced feedback. We report here that the cdk inhibitor p21cip1, when microinjected into immature Xenopus oocytes, blocks germinal vesicle breakdown induced by progesterone, by maturation-promoting factor transfer, or by injection of okadaic acid. After microinjection of p21cip1, progesterone fails to induce the activation of MAPK or p34cdc2, and Mos does not accumulate. In contrast, the level of cyclin B1 increases normally in a manner dependent on down-regulation of cAMP-dependent protein kinase but independent of cap-ribose methylation of mRNA.
Resumo:
Trimolecular interactions between the T cell antigen receptor and MHC/peptide complexes, together with costimulatory molecules and cytokines, control the initial activation of naïve T cells and determine whether the helper precursor cell differentiates into either T helper (TH)1 or TH2 effector cells. We now present evidence that regulatory CD8+ T cells provide another level of control of TH phenotype during further evolution of immune responses. These regulatory CD8+ T cells are induced by antigen-triggered CD4+ TH1 cells during T cell vaccination and, in vitro, distinguish mature TH1 from TH2 cells in a T cell antigen receptor Vβ-specific and Qa-1-restricted manner. In vivo, protection from experimental autoimmune encephalomyelitis (EAE) induced by T cell vaccination depends on CD8+ T cells, and myelin basic protein-reactive TH1 Vβ8+ clones, but not TH2 Vβ8+ clones, used as vaccine T cells, protect animals from subsequent induction of EAE. Moreover, in vivo depletion of CD8+ T cells during the first episode of EAE results in skewing of the TH phenotype toward TH1 upon secondary myelin basic protein stimulation. These data provide evidence that CD8+ T cells control autoimmune responses, in part, by regulating the TH phenotype of self-reactive CD4+ T cells.
Resumo:
Piperonylic acid (PA) is a natural molecule bearing a methylenedioxy function that closely mimics the structure of trans-cinnamic acid. The CYP73A subfamily of plant P450s catalyzes trans-cinnamic acid 4-hydroxylation, the second step of the general phenylpropanoid pathway. We show that when incubated in vitro with yeast-expressed CYP73A1, PA behaves as a potent mechanism-based and quasi-irreversible inactivator of trans-cinnamate 4-hydroxylase. Inactivation requires NADPH, is time dependent and saturable (KI = 17 μm, kinact = 0.064 min−1), and results from the formation of a stable metabolite-P450 complex absorbing at 427 nm. The formation of this complex is reversible with substrate or other strong ligands of the enzyme. In plant microsomes PA seems to selectively inactivate the CYP73A P450 subpopulation. It does not form detectable complexes with other recombinant plant P450 enzymes. In vivo PA induces a sharp decrease in 4-coumaric acid concomitant to cinnamic acid accumulation in an elicited tobacco (Nicotiana tabacum) cell suspension. It also strongly decreases the formation of scopoletin in tobacco leaves infected with tobacco mosaic virus.
Resumo:
Cover title.
Resumo:
Proteins of the p120 family have been implicated in the regulation of cadherin-based cell adhesion, but their relative importance in this process and their mechanism of action have remained less clear. Three papers in this issue suggest that p120 plays a key role in maintaining normal levels of cadherin in mammalian cells, and that it may do so by regulating cadherin trafficking.
Resumo:
As long as governmental institutions have existed, efforts have been undertaken to reform them. This research examines a particular strategy, coercive controls, exercised through a particular instrument, executive orders, by a singular reformer, the president of the United States. The presidents studied-- Johnson, Nixon, Ford, Carter, Reagan, Bush, and Clinton--are those whose campaigns for office were characterized to varying degrees as against Washington bureaucracy and for executive reform. Executive order issuance is assessed through an examination of key factors for each president including political party affiliation, levels of political capital, and legislative experience. A classification typology is used to identify the topical dimensions and levels of coerciveness. The portrayal of the federal government is analyzed through examination of public, media, and presidential attention. The results show that executive orders are significant management tools for the president. Executive orders also represent an important component of the transition plans for incoming administrations. The findings indicate that overall, while executive orders have not increased in the aggregate, they are more intrusive and significant. When the factors of political party affiliation, political capital, and legislative experience are examined, it reveals a strong relationship between executive orders and previous executive experience, specifically presidents who served as a state governor prior to winning national election as president. Presidents Carter, Reagan, and Clinton (all former governors) have the highest percent of executive orders focusing on the federal bureaucracy. Additionally, the highest percent of forceful orders were issued by former governors (41.0%) as compared to their presidential counterparts who have not served as governors (19.9%). Secondly, political party affiliation is an important, but not significant, predictor for the use of executive orders. Thirdly, management strategies that provide the president with the greatest level of autonomy--executive orders--redefine the concept of presidential power and autonomous action. Interviews of elite government officials and political observers support the idea that executive orders can provide the president with a successful management strategy, requiring less expenditure of political resources, less risk to political capital, and a way of achieving objectives without depending on an unresponsive Congress. ^
Resumo:
In his study - File Control: The Heart Of Business Computer Management - William G. O'Brien, Assistant Professor, The School of Hospitality Management at Florida International University, initially informs you: “Even though computers are an everyday part of the hospitality industry, many managers lack the knowledge and experience to control and protect the files in these systems. The author offers guidelines which can minimize or prevent damage to the business as a whole.” Our author initially opens this study with some anecdotal instances illustrating the failure of hospitality managers to exercise due caution with regard to computer supported information systems inside their restaurants and hotels. “Of the three components that make up any business computer system (data files, programs, and hard-ware), it is files that are most important, perhaps irreplaceable, to the business,” O’Brien informs you. O’Brien breaks down the noun, files, into two distinct categories. They are, the files of extrinsic value, and its counterpart the files of intrinsic value. An example of extrinsic value files would be a restaurant’s wine inventory. “As sales are made and new shipments are received, the computer updates the file,” says O’Brien. “This information might come directly from a point-of-sale terminal or might be entered manually by an employee,” he further explains. On the intrinsic side of the equation, O’Brien wants you to know that the information itself is the valuable part of this type of file. Its value is over and above the file’s informational purpose as a pragmatic business tool, as it is in inventory control. “The information is money in the legal sense For instance, figures moved about in banking system computers do not represent dollars; they are dollars,” O’Brien explains. “If the record of a dollar amount is erased from all computer files, then that money ceases to exist,” he warns. This type of information can also be bought and sold, such as it is in customer lists to advertisers. Files must be protected O’Brien stresses. “File security requires a systematic approach,” he discloses. O’Brien goes on to explain important elements to consider when evaluating file information. File back-up is also an important factor to think about, along with file storage/safety concerns. “Sooner or later, every property will have its fire, flood, careless mistake, or disgruntled employee,” O’Brien closes. “…good file control can minimize or prevent damage to the business as a whole.”