926 resultados para Domain representation in OWL
Resumo:
File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.
Resumo:
The competitive industrial context compels companies to speed-up every new product design. In order to keep designing products that meet the needs of the end user, a human centered concurrent product design methodology has been proposed. Its setting up is complicated by the difficulties of collaboration between experts involved inthe design process. In order to ease this collaboration, we propose the use of virtual reality as an intermediate design representation in the form of light and specialized immersive convergence support applications. In this paper, we present the As Soon As Possible (ASAP) methodology making possible the development of these tools while ensuring their usefulness and usability. The relevance oft his approach is validated by an industrial use case through the design of an ergonomic-style convergence support tool.
Resumo:
Traditionally, ontologies describe knowledge representation in a denotational, formalized, and deductive way. In addition, in this paper, we propose a semiotic, inductive, and approximate approach to ontology creation. We define a conceptual framework, a semantics extraction algorithm, and a first proof of concept applying the algorithm to a small set of Wikipedia documents. Intended as an extension to the prevailing top-down ontologies, we introduce an inductive fuzzy grassroots ontology, which organizes itself organically from existing natural language Web content. Using inductive and approximate reasoning to reflect the natural way in which knowledge is processed, the ontology’s bottom-up build process creates emergent semantics learned from the Web. By this means, the ontology acts as a hub for computing with words described in natural language. For Web users, the structural semantics are visualized as inductive fuzzy cognitive maps, allowing an initial form of intelligence amplification. Eventually, we present an implementation of our inductive fuzzy grassroots ontology Thus,this paper contributes an algorithm for the extraction of fuzzy grassroots ontologies from Web data by inductive fuzzy classification.
Resumo:
A statistical mechanics view leads to the conclusion that polar molecules allowed to populate a degree of freedom for orientational disorder in a condensed phase thermalize into a bi-polar state featuring zero net polarity. In cases of orientational disorder polar order of condensed molecular matter can only exist in corresponding sectors of opposite average polarities. Channel type inclusion compounds, single component molecular crystals, solid solutions, optically anomalous crystals, inorganic ionic crystals, biomimetic crystals and biological tissues investigated by scanning pyroelectric and phase sensitive second harmonic generation microscopy all showed domains of opposite polarities in their final grown state. For reported polar molecular crystal structures it is assumed that kinetic hindrance along one direction of the polar axis is preventing the formation of a bi-polar state, thus allowing for a kinetically controlled mono-domain state. In this review we summarize theoretical and experimental findings leading to far reaching conclusions on the polar state of solid molecular matter. “… no stationary state … of a system has an electrical dipole moment.” P. W. Anderson, Science, 1972, 177, 393.
Resumo:
A wealth of genetic associations for cardiovascular and metabolic phenotypes in humans has been accumulating over the last decade, in particular a large number of loci derived from recent genome wide association studies (GWAS). True complex disease-associated loci often exert modest effects, so their delineation currently requires integration of diverse phenotypic data from large studies to ensure robust meta-analyses. We have designed a gene-centric 50 K single nucleotide polymorphism (SNP) array to assess potentially relevant loci across a range of cardiovascular, metabolic and inflammatory syndromes. The array utilizes a "cosmopolitan" tagging approach to capture the genetic diversity across approximately 2,000 loci in populations represented in the HapMap and SeattleSNPs projects. The array content is informed by GWAS of vascular and inflammatory disease, expression quantitative trait loci implicated in atherosclerosis, pathway based approaches and comprehensive literature searching. The custom flexibility of the array platform facilitated interrogation of loci at differing stringencies, according to a gene prioritization strategy that allows saturation of high priority loci with a greater density of markers than the existing GWAS tools, particularly in African HapMap samples. We also demonstrate that the IBC array can be used to complement GWAS, increasing coverage in high priority CVD-related loci across all major HapMap populations. DNA from over 200,000 extensively phenotyped individuals will be genotyped with this array with a significant portion of the generated data being released into the academic domain facilitating in silico replication attempts, analyses of rare variants and cross-cohort meta-analyses in diverse populations. These datasets will also facilitate more robust secondary analyses, such as explorations with alternative genetic models, epistasis and gene-environment interactions.
Resumo:
The molecular mechanisms controlling bone extracellular matrix (ECM) deposition by differentiated osteoblasts in postnatal life, called hereafter bone formation, are unknown. This contrasts with the growing knowledge about the genetic control of osteoblast differentiation during embryonic development. Cbfa1, a transcriptional activator of osteoblast differentiation during embryonic development, is also expressed in differentiated osteoblasts postnatally. The perinatal lethality occurring in Cbfa1-deficient mice has prevented so far the study of its function after birth. To determine if Cbfa1 plays a role during bone formation we generated transgenic mice overexpressing Cbfa1 DNA-binding domain (DeltaCbfa1) in differentiated osteoblasts only postnatally. DeltaCbfa1 has a higher affinity for DNA than Cbfa1 itself, has no transcriptional activity on its own, and can act in a dominant-negative manner in DNA cotransfection assays. DeltaCbfa1-expressing mice have a normal skeleton at birth but develop an osteopenic phenotype thereafter. Dynamic histomorphometric studies show that this phenotype is caused by a major decrease in the bone formation rate in the face of a normal number of osteoblasts thus indicating that once osteoblasts are differentiated Cbfa1 regulates their function. Molecular analyses reveal that the expression of the genes expressed in osteoblasts and encoding bone ECM proteins is nearly abolished in transgenic mice, and ex vivo assays demonstrated that DeltaCbfa1-expressing osteoblasts were less active than wild-type osteoblasts. We also show that Cbfa1 regulates positively the activity of its own promoter, which has the highest affinity Cbfa1-binding sites characterized. This study demonstrates that beyond its differentiation function Cbfa1 is the first transcriptional activator of bone formation identified to date and illustrates that developmentally important genes control physiological processes postnatally.
Resumo:
Aniridia (AN) is a congenital, panocular disorder of the eye characterized by the complete or partial absence of the iris. The disease can occur in both the sporadic and familial forms which, in the latter case, is inherited as an autosomal dominant trait with high penetrance. The objective of this study was to isolate and characterize the genes involved in AN and Sey, and thereby to gain a better understanding of the molecular basis of the two disorders.^ Using a positional cloning strategy, I have approached and cloned from the AN locus in human chromosomal band 11p13 a cDNA that is deleted in two patients with AN. The deletions in these patients overlap by about 70 kb and encompass the 3$\sp\prime$ end of the cDNA. This cDNA detects a 2.7 kb mRNA encoded by a transcription unit estimated to span approximately 50 kb of genomic DNA. The message is specifically expressed in all tissues affected in all forms of AN, namely within the presumptive iris, lens, neuroretina, the superficial layers of the cornea, the olfactory bulbs, and the cerebellum. Sequence analysis of the AN cDNA revealed a number of motifs characteristic of certain transcription factors. Chief among these are the presence of the paired domain, the homeodomain, and a carboxy-terminal domain rich in serine, threonine and proline residues. The overall structure shows high homology to the Drosophila segmentation gene paired and members of the murine Pax family of developmental control genes.^ Utilizing a conserved human genomic DNA sequence as probe, I was able to isolate an embryonic murine cDNA which is over 92% homologous in nucleotide sequence and virtually identical at the amino acid level to the human AN cDNA. The expression pattern of the murine gene is the same as that in man, supporting the conclusion that it probably corresponds to the Sey gene. Its specific expression in the neuroectodermal component of the eye, in glioblastomas, but not in the neural crest-derived PC12 pheochromocytoma cell line, suggests that a defect in neuroectodermal rather mesodermal development might be the common etiological factor underlying AN and Sey. ^
Resumo:
Stylonychia lemnae is a classical model single-celled eukaryote, and a quintessential ciliate typified by dimorphic nuclei: A small, germline micronucleus and a massive, vegetative macronucleus. The genome within Stylonychia's macronucleus has a very unusual architecture, comprised variably and highly amplified "nanochromosomes," each usually encoding a single gene with a minimal amount of surrounding noncoding DNA. As only a tiny fraction of the Stylonychia genes has been sequenced, and to promote research using this organism, we sequenced its macronuclear genome. We report the analysis of the 50.2-Mb draft S. lemnae macronuclear genome assembly, containing in excess of 16,000 complete nanochromosomes, assembled as less than 20,000 contigs. We found considerable conservation of fundamental genomic properties between S. lemnae and its close relative, Oxytricha trifallax, including nanochromosomal gene synteny, alternative fragmentation, and copy number. Protein domain searches in Stylonychia revealed two new telomere-binding protein homologs and the presence of linker histones. Among the diverse histone variants of S. lemnae and O. trifallax, we found divergent, coexpressed variants corresponding to four of the five core nucleosomal proteins (H1.2, H2A.6, H2B.4, and H3.7) suggesting that these ciliates may possess specialized nucleosomes involved in genome processing during nuclear differentiation. The assembly of the S. lemnae macronuclear genome demonstrates that largely complete, well-assembled highly fragmented genomes of similar size and complexity may be produced from one library and lane of Illumina HiSeq 2000 shotgun sequencing. The provision of the S. lemnae macronuclear genome sets the stage for future detailed experimental studies of chromatin-mediated, RNA-guided developmental genome rearrangements.
Resumo:
Recent research in cognitive sciences shows a growing interest in spatial-numerical associations. The horizontal SNARC (spatial-numerical association of response codes) effect is defined by faster left-sided responses to small numbers and faster right-sided responses to large numbers in a parity judgment task. In this study we investigated whether there is also a SNARC effect for upper and lower responses. The grounded cognition approach suggests that the universal experience of "more is up" serves as a robust frame of reference for vertical number representation. In line with this view, lower hand responses to small numbers were faster than to large numbers (Experiment 1). Interestingly, the vertical SNARC effect reversed when the lower responses were given by foot instead of the hand (Experiments 2, 3, and 4). We found faster upper (hand) responses to small numbers and faster lower (foot) responses to large numbers. Additional experiments showed that spatial factors cannot account for the reversal of the vertical SNARC effect (Experiments 4 and 5). Our results question the view of "more is up" as a robust frame of reference for spatial-numerical associations. We discuss our results within a hierarchical framework of numerical cognition and point to a possible link between effectors and number representation.
Resumo:
The copines, named and first described by Creutz et al. (1998), comprise a two C2 domain-containing protein family that can aggregate phosphatidylserine membranes in a calcium-dependent manner. Although no enzymatic function has been attributed to copines, their carboxyl terminus shows homology to the A domain found in integrins that allows binding of magnesium ions. The secondary structure of A domains resembles a Rossmann fold, which can bind dinucleotides and is present in a number of intracellular enzymes. Due to a crossreacting activity of Mik b 1, an antibody to the IL-2R b chain, we were able to serendipitously clone human copine III (CIII). CIII is 65% identical to copine I (CI) and the 5 kb CIII transcript is expressed ubiquitously as determined by a multitissue Northern blot. A polyclonal antibody generated against the carboxyl terminus of CIII recognized CIII in immunoblots and immunoprecipitations. Phosphorylation of CIII was observed on serine and threonine residues, as determined by phosphoamino acid analysis. ^ Experiments were designed to determine whether or not any enzymatic activity, specifically kinase activity, was intrinsic to or associated with CIII. In vitro and in gel kinase assays were performed using transfected HA-tagged CI and CIII, immunoprecipitated endogenous CIII and purified endogenous CIII. The exogenous substrate MBP was phosphorylated in all in vitro kinase assays containing CIII protein purification and column chromatography expertise with me. ^
Resumo:
CEACAM1-L is an adhesion molecule that suppress the growth of prostate, breast, colon and endometrial tumors. In this study we defined the domain involved in CEACAM1-L tumor suppression activity. DU145 prostate cancer cells were infected with recombinant adenoviruses containing various CEACAM1-L mutant genes, and the effects of the mutant proteins on the growth of DU145 cells were assessed in a nude-mice xenograft model. We found that expression of the CEACAM1-L cytoplasm domain alone led to growth suppression of DU145 cells. These results suggest that the cytoplasmic domain of CEACAM1-L is necessary and sufficient for its growth-suppressive function. ^ The cytoplasmic domain of CEACAM1-L is presumed to be involved in a signaling pathway resulting in the suppression of tumor cell growth. It was not clear whether post-translational modification of CEACAM1-L is required for tumor suppressor function, therefore the importance of phosphorylation in growth-inhibitory signaling pathway was investigated. Full-length CEACAM1-L was found to be phosphorylated in vivo in both tyrosine and serine residues. Mutation of tyrosine 488 to phenylalanine did not abolish the tumor-suppressive activity of CEACAM1-L while mutation of serine 503 to alanine abolished the growth-inhibitory activity. In addition, mutation of serine 503 to aspartic acid produced tumor-suppressive activity similar to that of the wild-type CEACAM1-L. These results suggested that only phosphorylation at serine 503 is essential for CEACAM1-L's growth-inhibitory function in vivo. ^ Phosphorylation of CEACAM1-L may lead to its interaction with molecules in CEACAM1-L's signaling pathway. In the last part of this study we demonstrate that CEACAM1 is able to interact with the adapter protein p66Shc. p66Shc was found to be co-immunoprecipitated with full length CEACAM1-L but not with CEACAM1-L lacking its cytoplasmic tail. Additionally this interaction occurred in the absence of the tyrosine phosphorylation of CEACAM1-L. These results suggest that p66Shc is able to interact with the cytoplasmic domain of CEACAM1-L and this interaction does not require tyrosine phosphorylation. ^ In conclusion, this study suggests that CEACAM1-L signals tumor suppression through its cytoplasmic domain by initially becoming phosphorylated on serine 503. Additionally, the interaction with p66Shc may be involved in CEACAM1-L's signaling pathway. ^
Resumo:
In eukaryotic cells, the ESCRTs (endosomal sorting complexes required for transport) machinery is required for cellular processes such as endosomal sorting, retroviral budding and cytokinesis. The ALG-2 interacting protein Alix is a modular adaptor protein that is critically involved in these ESCRTs-associated cellular processes and consists of an N-terminal Bro1 domain, a middle V domain and C-terminal Pro-rich domain (PRD). In these cellular processes, Alix interacts with the ESCRT-III component CHMP4 at the Bro1 domain, with HIV-1 p6 Gag or EIAV p9Gag at the V domain, and with the ESCRT-I component TSG101 at the Pro-rich domain. Here we demonstrate that the N-terminal Bro1 domain forms an intramolecular interaction with C-terminal PRD within Alix. This Bro1-PRD intramolecular interaction forms a closed conformation of Alix that autoinhibits Alix interaction with all of these partner proteins. Moreover, the binding of Ca2+-activated ALG-2 to the PRD of Alix relieves the autoinhibitory intramolecular interaction, resulting in an open conformation of Alix which is able to interact with all of these partner proteins. The partner proteins bound to Alix in turn maintain Alix in the open conformation after ALG-2 dissociation with Alix. Consistent with the effect of Ca2+-activated ALG-2 on opening/activating Alix in these ESCRTs-associated functions, ALG-2 overexpression accelerates EGF-induced degradation of EGFR in an Alix-dependent manner. These findings discover an intrinsic autoinhibitory mechanism of Alix and a two-step process to activate/open Alix and then keep Alix active/open. This study has solved long-standing issues on the regulations of Alix in ESCRTs-associated functions and the role of ALG-2-Alix interaction, and may serve as the structural basis for further studies about Alix regulations. ^
Resumo:
The findings presented in this dissertation detail the complex interaction between BBK32 and fibronectin and describe novel consequences of the interaction. BBK32 is a fibronectin-binding protein on Borrelia burgdorferi, the causative agent of Lyme disease. We found that BBK32 contains multiple fibronectin-binding motifs, recognizing the fibronectin N-terminal domain (NTD) and the gelatin binding domain (GBD) in an anti-parallel order, where corresponding sites in BBK32 and fibronectin are aligned so that there is a one-to-one interaction between the proteins. While characterizing this interaction, we discovered that binding of BBK32 to the GBD inhibits the migration stimulating factor's (MSF) motogenic activity. In the presence of BBK32, endothelial cells do not migrate in response to increasing concentrations of MSF or the GBD. MSF is found under wound healing conditions, and inhibition of its activity may allow the tick-transmitted spirochetes to delay wound healing and to establish an infection. ^ Biophysical structural studies, designed to identify a mechanism of interaction, revealed that BBK32 binding to the NTD leads to the unfolding of plasma fibronectin, which exposes α5β1 integrin recognition motifs. Binding assays demonstrate that the BBK32-NTD interaction enhances the plasma fibronectin-α5β1 integrin interaction, which may allow B. burgdorferi to invade host cells, and thereby evade the host immune system. ^ We also determined that BBK32 binds fibronectin F3 modules, which leads to plasma fibronectin aggregation and induction of superfibronectin. The resulting superfibronectin is conformationally distinct from plasma and cellular fibronectin, and can inhibit endothelial cell proliferation. BBK32's active superfibronectin-forming motif has been located to a region between residues 160 and 175, which contains two sequence motifs that are also found in anastellin, the only other known superfibronectin-inducing protein. ^ A potential consequence of BBK32-induced superfibronectin formation was identified. BBK32-induced superfibronectin formation results in the exposure of α4β1 integrin recognition sequences in fibronectin. The α4β1 integrin is required for leukocyte transendothelial cell migration. BBK32-induced superfibronectin inhibits this activity. The inhibition of leukocyte recruitment to the infection site may slow the activity of the host immune system, and permit the spirochetes to establish an infection. ^
Resumo:
Glycoprotein (GP) Ib-IX complex, the second most abundant receptor expressed on the platelet surface, plays critical roles in haemostasis and thrombosis by binding to its ligand, von Willebrand factor (vWF). Defect or malfunction of the complex leads to severe bleeding disorders, heart attack or stroke. Comprised of three type I transmembrane subunits—GPIbα, GPIbβ and GPIX, efficient expression of the GPIb-IX complex requires all three subunits, as evident from genetic mutations identified in the patients and reproduced in transfected Chinese hamster ovary (CHO) cells. However, how the subunits are assembled together and how the complex function is regulated is not fully clear. By probing the interactions among the three subunits in transfected cells, we have demonstrated that the transmembrane domains of the three subunits interact with one another, facilitating formation of the two membrane-proximal disulfide bonds between GPIbα and GPIbβ. We have also identified the interface between extracellular domains of GPIbβ and GPIX, and provided evidence suggesting a direct interaction between extracellular domains of GPIbα and GPIX. All of these interactions are not only critical for correct assembly and consequently efficient expression of the GPIb-IX complex on the cell surface, but also for its function, such as the proper ligand binding, since removing the two inter-subunit disulfide bonds significantly hampers vWF binding to the complex under both static and physiological flow conditions. The two inter-subunit disulfide bonds are also critical for regulating the ectodomain shedding of GPIbα by the GPIbβ cytoplasmic domain. Mutations in the juxtamembrane region of the GPIbβ cytoplasmic domain deregulate GPIbα shedding, and such deregulation is further enhanced when the two inter-subunit disulfide bonds are removed. In summary, we have established the overall organization of the GPIb-IX complex, and the importance of proper organization on its function. ^
Resumo:
Although long distance running clearly has benefits--as witnessed by its popularity--it also has risks of injury and death. Little is known, however, about the prevalence of potentially dangerous training habits in long distance runners, although anecdotal information suggests that many runners have erroneous beliefs about risks and benefits of marathon running. We conducted a cross-sectional survey to estimate the prevalence of 19 potentially dangerous training habits (risky behaviors) among marathon runners. A 66-item self-administered questionnaire was mailed to a stratified random sample of runners who finished of the 1992 Houston-Tenneco Marathon and were 21-71 years of age. Responses were obtained from 508 runners (83%) with approximately equal representation in four age-gender groups: men $<$40 years, men $\ge$40 years, women $<$40 years, and women $\ge$40 years.^ Prevalences of risky behaviors were high. 50% or more ran in dangerously hot and humid conditions, did not cool down or stretch after running, did not wear proper running gear, or ran when injured or ill; 25-49% did not warm up, ran on dangerous surfaces, did not drink sufficient water during training, increased weekly mileage too quickly, and ran during lightning storms; 10-24% ran daily, ran in areas with high pollution, ran in the same direction as traffic, did hard runs frequently, ran more than 60 miles per week, or ran against the advice of a physician.^ Positive associations were found between the practice of risky behaviors and self-reported prevalence of musculoskeletal injuries, heat-related injuries, noncompliance with recommendations for preventive health examinations, and noncompliance with positive health habits.^ These results indicate that many marathon runners engage in training habits that may increase risk of substantial injury or illness. Further studies are needed to explore the association of risky training behaviors on the incidence of injuries, and to determine reasons for noncompliance with recommendations from sports medicine specialists. ^