885 resultados para Observer attack


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Acute intermittent porphyria (AIP, MIM #176000) is an inherited metabolic disease due to a partial deficiency of the third enzyme, hydroxymethylbilane synthase (HMBS, EC: 4.3.1.8), in the haem biosynthesis. Neurological symptoms during an acute attack, which is the major manifestation of AIP, are variable and relatively rare, but may endanger a patient's life. In the present study, 12 Russian and two Finnish AIP patients with severe neurological manifestations during an acute attack were studied prospectively from 1995 to 2006. Autonomic neuropathy manifested as abdominal pain (88%), tachycardia (94%), hypertension (75%) and constipation (88%). The most common neurological sign was acute motor peripheral neuropathy (PNP, 81%) often associated with neuropathic sensory loss (54%) and CNS involvement (85%). Despite heterogeneity of the neurological manifestations in our patients with acute porphyria, the major pattern of PNP associated with abdominal pain, dysautonomia, CNS involvement and mild hepatopathy could be demonstrated. If more strict inclusion criteria for biochemical abnormalities (>10-fold increase in excretion of urinary PBG) are applied, neurological manifestations in an acute attack are probably more homogeneous than described previously, which suggests that some of the neurological patients described previously may not have acute porphyria but rather secondary porphyrinuria. Screening for acute porphyria using urinary PBG is useful in a selected group of neurological patients with acute PNP or encephalopathy and seizures associated with pain and dysautonomia. Clinical manifestations and the outcome of acute attacks were used as a basis for developing a 30-score scale of the severity of an acute attack. This scale can easily be used in clinical practice and to standardise the outcome of an attack. Degree of muscle weakness scored by MRC, prolonged mechanical ventilation, bulbar paralysis, impairment of consciousness and hyponatraemia were important signs of a poor prognosis. Arrhythmia was less important and autonomic dysfunction, severity of pain and mental symptoms did not affect the outcome. The delay in the diagnosis and repeated administrations of precipitating factors were the main cause of proceeding of an acute attack into pareses and severe CNS involvement and a fatal outcome in two patients. Nerve conduction studies and needle EMG were performed in eleven AIP patients during an acute attack and/or in remission. Nine patients had severe PNP and two patients had an acute encephalopathy but no clinically evident PNP. In addition to axonopathy, features suggestive of demyelination could be demonstrated in patients with severe PNP during an acute attack. PNP with a moderate muscle weakness was mainly pure axonal. Sensory involvement was common in acute PNP and could be subclinical. Decreased conduction velocities with normal amplitudes of evoked potentials during acute attacks with no clinically evident PNP indicated subclinical polyneuropathy. Reversible symmetrical lesions comparable with posterior reversible encephalopathy syndrome (PRES) were revealed in two patients' brain CT or MRI during an acute attack. In other five patients brain MRI during or soon after the symptoms was normal. The frequency of reversible brain oedema in AIP is probably under-estimated since it may be short-lasting and often indistinguishable on CT or MRI. In the present study, nine different mutations were identified in the HMBS gene in 11 unrelated Russian AIP patients from North Western Russia and their 32 relatives. AIP was diagnosed in nine symptom-free relatives. The majority of the mutations were family-specific and confirmed allelic heterogeneity also among Russian AIP patients. Three mutations, c.825+5G>C, c.825+3_825+6del and c.770T>C, were novel. Six mutations, c.77G>A (p.R26H), c.517C>T (p.R173W), c.583C>T (p.R195C), c.673C>T (p.R225X), c.739T>C (p.C247R) and c.748G>C (p.E250A), have previously been identified in AIP patients from Western and other Eastern European populations. The effects of novel mutations were studied by amplification and sequencing of the reverse-transcribed total RNA obtained from the patients' lymphoblastoid or fibroblast cell lines. The mutations c.825+5G>C and c.770T>C resulted in varyable amounts of abnormal transcripts, r.822_825del (p.C275fsX2) and [r.770u>c, r.652_771del, r.613_771del (p.L257P, p.G218_L257del, p.I205_L257del)]. All mutations demonstrated low residual activities (0.1-1.3 %) when expressed in COS-1 cells confirming the causality of the mutations and the enzymatic defect of the disease. The clinical outcome, prognosis and correlation between the HMBS genotype and phenotype were studied in 143 Finnish and Russian AIP patients with ten mutations (c.33G>T, c.97delA, InsAlu333, p.R149X, p.R167W, p.R173W, p.R173Q, p.R225G, p.R225X, c.1073delA) and more than six patients in each group. The patients were selected from the pool of 287 Finnish AIP patients presented in a Finnish Porphyria Register (1966-2003) and 23 Russian AIP patients (diagnosed 1995-2003). Patients with the p.R167W and p.R225G mutations showed lower penetrance (19% and 11%) and the recurrence rate (33% and 0%) in comparison to the patients with other mutations (range 36 to 67% and 0 to 66%, respectively), as well as milder biochemical abnormalities [urinary porphobilinogen 47±10 vs. 163±21 mol/L, p<0.001; uroporphyrin 130±40 vs. 942±183 nmol/L, p<0.001] suggesting a milder form of AIP in these patients. Erythrocyte HMBS activity did not correlate with the porphobilinogen excretion in remission or the clinical of the disease. In all AIP severity patients, normal PBG excretion predicted freedom from acute attacks. Urinary PBG excretion together with gender, age at the time of diagnosis and mutation type could predict the likelihood of acute attacks in AIP patients.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An adaptive drug delivery design is presented in this paper using neural networks for effective treatment of infectious diseases. The generic mathematical model used describes the coupled evolution of concentration of pathogens, plasma cells, antibodies and a numerical value that indicates the relative characteristic of a damaged organ due to the disease under the influence of external drugs. From a system theoretic point of view, the external drugs can be interpreted as control inputs, which can be designed based on control theoretic concepts. In this study, assuming a set of nominal parameters in the mathematical model, first a nonlinear controller (drug administration) is designed based on the principle of dynamic inversion. This nominal drug administration plan was found to be effective in curing "nominal model patients" (patients whose immunological dynamics conform to the mathematical model used for the control design exactly. However, it was found to be ineffective in curing "realistic model patients" (patients whose immunological dynamics may have off-nominal parameter values and possibly unwanted inputs) in general. Hence, to make the drug delivery dosage design more effective for realistic model patients, a model-following adaptive control design is carried out next by taking the help of neural networks, that are trained online. Simulation studies indicate that the adaptive controller proposed in this paper holds promise in killing the invading pathogens and healing the damaged organ even in the presence of parameter uncertainties and continued pathogen attack. Note that the computational requirements for computing the control are very minimal and all associated computations (including the training of neural networks) can be carried out online. However it assumes that the required diagnosis process can be carried out at a sufficient faster rate so that all the states are available for control computation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

CTRU, a public key cryptosystem was proposed by Gaborit, Ohler and Sole. It is analogue of NTRU, the ring of integers replaced by the ring of polynomials $\mathbb{F}_2[T]$ . It attracted attention as the attacks based on either LLL algorithm or the Chinese Remainder Theorem are avoided on it, which is most common on NTRU. In this paper we presents a polynomial-time algorithm that breaks CTRU for all recommended parameter choices that were derived to make CTRU secure against popov normal form attack. The paper shows if we ascertain the constraints for perfect decryption then either plaintext or private key can be achieved by polynomial time linear algebra attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A nonlinear suboptimal guidance scheme is developed for the reentry phase of the reusable launch vehicles. A recently developed methodology, named as model predictive static programming (MPSP), is implemented which combines the philosophies of nonlinear model predictive control theory and approximate dynamic programming. This technique provides a finite time nonlinear suboptimal guidance law which leads to a rapid solution of the guidance history update. It does not have to suffer from computational difficulties and can be implemented online. The system dynamics is propagated through the flight corridor to the end of the reentry phase considering energy as independent variable and angle of attack as the active control variable. All the terminal constraints are satisfied. Among the path constraints, the normal load is found to be very constrictive. Hence, an extra effort has been made to keep the normal load within a specified limit and monitoring its sensitivity to the perturbation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Experiments are carried out with air as the test gas to obtain the surface convective heating rate on a missile shaped body flying at hypersonic speeds. The effect of fins on the surface heating rates of missile frustum is also investigated. The tests are performed in a hypersonic shock tunnel at stagnation enthalpy of 2 MJ/kg and zero degree angle of attack. The experiments are conducted at flow Mach number of 5.75 and 8 with an effective test time of 1 ms. The measured stagnation-point heat-transfer data compares well with the theoretical value estimated using Fay and Riddell expression. The measured heat-transfer rate with fin configuration is slightly higher than that of model without fin. The normalized values of experimentally measured heat transfer rate and Stanton number compare well with the numerically estimated results. (C) 2009 Elsevier Inc. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The brain's functional network exhibits many features facilitating functional specialization, integration, and robustness to attack. Using graph theory to characterize brain networks, studies demonstrate their small-world, modular, and "rich-club" properties, with deviations reported in many common neuropathological conditions. Here we estimate the heritability of five widely used graph theoretical metrics (mean clustering coefficient (γ), modularity (Q), rich-club coefficient (ϕnorm), global efficiency (λ), small-worldness (σ)) over a range of connection densities (k=5-25%) in a large cohort of twins (N=592, 84 MZ and 89 DZ twin pairs, 246 single twins, age 23±2.5). We also considered the effects of global signal regression (GSR). We found that the graph metrics were moderately influenced by genetic factors h2 (γ=47-59%, Q=38-59%, ϕnorm=0-29%, λ=52-64%, σ=51-59%) at lower connection densities (≤15%), and when global signal regression was implemented, heritability estimates decreased substantially h2 (γ=0-26%, Q=0-28%, ϕnorm=0%, λ=23-30%, σ=0-27%). Distinct network features were phenotypically correlated (|r|=0.15-0.81), and γ, Q, and λ were found to be influenced by overlapping genetic factors. Our findings suggest that these metrics may be potential endophenotypes for psychiatric disease and suitable for genetic association studies, but that genetic effects must be interpreted with respect to methodological choices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Speech has both auditory and visual components (heard speech sounds and seen articulatory gestures). During all perception, selective attention facilitates efficient information processing and enables concentration on high-priority stimuli. Auditory and visual sensory systems interact at multiple processing levels during speech perception and, further, the classical motor speech regions seem also to participate in speech perception. Auditory, visual, and motor-articulatory processes may thus work in parallel during speech perception, their use possibly depending on the information available and the individual characteristics of the observer. Because of their subtle speech perception difficulties possibly stemming from disturbances at elemental levels of sensory processing, dyslexic readers may rely more on motor-articulatory speech perception strategies than do fluent readers. This thesis aimed to investigate the neural mechanisms of speech perception and selective attention in fluent and dyslexic readers. We conducted four functional magnetic resonance imaging experiments, during which subjects perceived articulatory gestures, speech sounds, and other auditory and visual stimuli. Gradient echo-planar images depicting blood oxygenation level-dependent contrast were acquired during stimulus presentation to indirectly measure brain hemodynamic activation. Lip-reading activated the primary auditory cortex, and selective attention to visual speech gestures enhanced activity within the left secondary auditory cortex. Attention to non-speech sounds enhanced auditory cortex activity bilaterally; this effect showed modulation by sound presentation rate. A comparison between fluent and dyslexic readers' brain hemodynamic activity during audiovisual speech perception revealed stronger activation of predominantly motor speech areas in dyslexic readers during a contrast test that allowed exploration of the processing of phonetic features extracted from auditory and visual speech. The results show that visual speech perception modulates hemodynamic activity within auditory cortex areas once considered unimodal, and suggest that the left secondary auditory cortex specifically participates in extracting the linguistic content of seen articulatory gestures. They are strong evidence for the importance of attention as a modulator of auditory cortex function during both sound processing and visual speech perception, and point out the nature of attention as an interactive process (influenced by stimulus-driven effects). Further, they suggest heightened reliance on motor-articulatory and visual speech perception strategies among dyslexic readers, possibly compensating for their auditory speech perception difficulties.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An efficient and statistically robust solution for the identification of asteroids among numerous sets of astrometry is presented. In particular, numerical methods have been developed for the short-term identification of asteroids at discovery, and for the long-term identification of scarcely observed asteroids over apparitions, a task which has been lacking a robust method until now. The methods are based on the solid foundation of statistical orbital inversion properly taking into account the observational uncertainties, which allows for the detection of practically all correct identifications. Through the use of dimensionality-reduction techniques and efficient data structures, the exact methods have a loglinear, that is, O(nlog(n)), computational complexity, where n is the number of included observation sets. The methods developed are thus suitable for future large-scale surveys which anticipate a substantial increase in the astrometric data rate. Due to the discontinuous nature of asteroid astrometry, separate sets of astrometry must be linked to a common asteroid from the very first discovery detections onwards. The reason for the discontinuity in the observed positions is the rotation of the observer with the Earth as well as the motion of the asteroid and the observer about the Sun. Therefore, the aim of identification is to find a set of orbital elements that reproduce the observed positions with residuals similar to the inevitable observational uncertainty. Unless the astrometric observation sets are linked, the corresponding asteroid is eventually lost as the uncertainty of the predicted positions grows too large to allow successful follow-up. Whereas the presented identification theory and the numerical comparison algorithm are generally applicable, that is, also in fields other than astronomy (e.g., in the identification of space debris), the numerical methods developed for asteroid identification can immediately be applied to all objects on heliocentric orbits with negligible effects due to non-gravitational forces in the time frame of the analysis. The methods developed have been successfully applied to various identification problems. Simulations have shown that the methods developed are able to find virtually all correct linkages despite challenges such as numerous scarce observation sets, astrometric uncertainty, numerous objects confined to a limited region on the celestial sphere, long linking intervals, and substantial parallaxes. Tens of previously unknown main-belt asteroids have been identified with the short-term method in a preliminary study to locate asteroids among numerous unidentified sets of single-night astrometry of moving objects, and scarce astrometry obtained nearly simultaneously with Earth-based and space-based telescopes has been successfully linked despite a substantial parallax. Using the long-term method, thousands of realistic 3-linkages typically spanning several apparitions have so far been found among designated observation sets each spanning less than 48 hours.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Body Area Network (BAN) is an emerging technology that focuses on monitoring physiological data in, on and around the human body. BAN technology permits wearable and implanted sensors to collect vital data about the human body and transmit it to other nodes via low-energy communication. In this paper, we investigate interactions in terms of data flows between parties involved in BANs under four different scenarios targeting outdoor and indoor medical environments: hospital, home, emergency and open areas. Based on these scenarios, we identify data flow requirements between BAN elements such as sensors and control units (CUs) and parties involved in BANs such as the patient, doctors, nurses and relatives. Identified requirements are used to generate BAN data flow models. Petri Nets (PNs) are used as the formal modelling language. We check the validity of the models and compare them with the existing related work. Finally, using the models, we identify communication and security requirements based on the most common active and passive attack scenarios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Serine hydroxymethyltransferase (SHMT) belongs to the alpha-family of pyridoxal 5'-phosphate-dependent enzymes and catalyzes the reversible conversion of L-Ser and etrahydrofolate to Gly and 5,10-methylene tetrahydrofolate. 5,10-Methylene tetrahydrofolate serves as a source of one-carbon fragment in many biological processes. SHMT also catalyzes the tetrahydrofolate-independent conversion of L-allo-Thr to Gly and acetaldehyde. The crystal structure of Bacillus stearothermophilus SHMT (bsSHMT) suggested that E53 interacts with the substrate, L-Ser and etrahydrofolate. To elucidate the role of E53, it was mutated to Q and structural and biochemical studies were carried out with the mutant enzyme. The internal aldimine structure of E53QbsSHMT was similar to that of the except for significant changes at Q53, Y60 and Y61. The wild-type enzyme, carboxyl of Gly and side chain of L-Ser were in two conformations in the respective external aldimine structures. The mutant enzyme was completely inactive for tetrahydrofolate-depen dent cleavage of L-Ser, whereas there was a 1.5-fold increase in the rate of tetrahydrofolate-independent reaction with L-allo-Thr. The results obtained from these studies suggest that E53 plays an essential role in tetrahydrofolate/5-formyl tetrahydrofolate binding and in the proper positioning of C beta of L-Ser for direct attack by N5 of tetrahydrofolate. Most interestingly, the structure of the complex obtained by cocrystallization of E53QbsSHMT with Gly and 5-formyl tetrahydrofolate revealed the gem-diamine form of pyridoxal 5'-phosphate bound to Gly and active site Lys. However, density for 5-formyl tetrahydrofolate was not observed. Gly carboxylate was in a single conformation, whereas pyridoxal 5'-phosphate had two distinct conformations. The differences between the structures of this complex and Gly external aldimine suggest that the changes induced by initial binding of 5-formyl tetrahydrofolate are retained even though 5-formyl tetrahydrofolate is absent in the final structure. Spectral studies carried out with this mutant enzyme also suggest that 5-formyl tetrahydrofolate binds to the E53QbsSHMT-Gly complex forming a quinonoid intermediate and falls off within 4 h of dialysis, leaving behind the mutant enzyme in the gemdiamine form. This is the first report to provide direct evidence for enzyme memory based on the crystal structure of enzyme complexes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The doctoral thesis deals with Finnish and foreign expert s analyses of Finland s military strategic position and defence capability, dating back to the early years of the Cold War. Finland s military high command prepared assessments of the country s strategic position and of the capability of the Defence Forces as grounds for defence planning. Since Finland was located on the Cold War dividing line, the foreign powers were also monitoring the development of Finland s situation. The research carried out had access to the armed forces internal assessments, as well as to analyses prepared by the military intelligence services of Sweden, Britain and the United States. One of the working hypotheses was that after the WWII the ability military leadership to estimate the security political needs of the country and the organisation of its defence was severely weakened so that the dangers of the international development were not perceived and the gradual erosion of defence capability was partly unnoticed. This hypothesis proved to be wrong. Even if the Finnish military intelligence was much weaker than during the war, it was able to provide the military leadership with information of the international military development for the most part. The military leadership was also fully aware of the weakening of the defence capability of the country. They faced the difficult task of making the country s political leadership, i.e. President Paasikivi and the government, also understand the gravity of the situation. Only in the last years of his term in office Paasikivi started to believe the warnings of the military. According to another hypothesis, outside observers considered the Finnish armed forces to primarily act as reinforcements for the Soviet Red Army, and they believed that, in the event of a full-scale war, the Finns would not have been able or even willing to resist a Soviet invasion of Sweden and Norway through Finland. The study confirmed that this was approximately the view the Swedes, the British and the Americans had of the Finnish forces. Western and Swedish intelligence assessments did not show confidence in Finland s defence ability and the country was regarded almost as a Soviet satellite. Finland s strategic position was, however, considered slightly different from that of the Soviet-occupied Eastern European countries. Finland had been forced to become part of the Soviet sphere of interest and security system and this was sealed by the Finno-Soviet Treaty of Friendship, Cooperation, and Mutual Assistance in 1948. Finland had little importance to the military interests of the Western powers. In Sweden s defence planning, however, Finland played a significant role as an alarm bell of a possible Soviet surprise attack, as well as defensive frontline and buffer zone.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

According to certain arguments, computation is observer-relative either in the sense that many physical systems implement many computations (Hilary Putnam), or in the sense that almost all physical systems implement all computations (John Searle). If sound, these arguments have a potentially devastating consequence for the computational theory of mind: if arbitrary physical systems can be seen to implement arbitrary computations, the notion of computation seems to lose all explanatory power as far as brains and minds are concerned. David Chalmers and B. Jack Copeland have attempted to counter these relativist arguments by placing certain constraints on the definition of implementation. In this thesis, I examine their proposals and find both wanting in some respects. During the course of this examination, I give a formal definition of the class of combinatorial-state automata , upon which Chalmers s account of implementation is based. I show that this definition implies two theorems (one an observation due to Curtis Brown) concerning the computational power of combinatorial-state automata, theorems which speak against founding the theory of implementation upon this formalism. Toward the end of the thesis, I sketch a definition of the implementation of Turing machines in dynamical systems, and offer this as an alternative to Chalmers s and Copeland s accounts of implementation. I demonstrate that the definition does not imply Searle s claim for the universal implementation of computations. However, the definition may support claims that are weaker than Searle s, yet still troubling to the computationalist. There remains a kernel of relativity in implementation at any rate, since the interpretation of physical systems seems itself to be an observer-relative matter, to some degree at least. This observation helps clarify the role the notion of computation can play in cognitive science. Specifically, I will argue that the notion should be conceived as an instrumental rather than as a fundamental or foundational one.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The enzyme nicotinamide amidase (nicotinamide amidohydrolase) was purified 57-fold from Aspergillus niger. The purified preparation was specific towards its substrate nicotinamide and did not deamidate NADP, NAD, NMN, N′-methyl nicotinamide, asparagine, glutamine, benzamide, α-naphthaleneamide and indoleacetamide. The asparagine, glutamine, benzamide, α-naphthaleneamide and indoleacetamide.vThe optimum pH was found to be 7.5. Temperature optimum was 40°. It had a Km value of 6.504 · 10−4 M towards nicotinamide. The enzyme exhibited Mg2+ ion requirement for its optimum activity. NAD-glycohydrolase (EC 3.2.2.5) was purified 109-fold from the mold. A. niger. The enzyme preparation was active only towards NAD and NADP and did not attack NMN, N′-methylnicotinamide and NADH. The Km value for NAD was found to be 7.693 · 10−6 M. The enzyme did not require any metal ion for its activity. It is suggested that A. niger will serve a better source for a large scale preparation of NAD-glycohydrolase than the Neurospora mold. The biological role of both NAD-glycohydrolase and nicotinamide amidase in the regulation of cellular NAD level has been discussed. It is, further, observed that NAD did not exert its feedback control on nicotinamide amidase at least in A. niger.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Enchanted by Sources. Henry Biaudet, Liisi Karttunen and Finnish Historical Research in Rome in the Early Twentieth Century This study traces the scholarly endeavours of Henry Biaudet (1870 1915) and Liisi Karttunen (1880 1957) and "La mission historique finlandaise à Rome" which they founded in 1909. They are forgotten in Finnish historiography, but remain internationally renowned for their contribution to the nunciature studies. By investigating their historical work on the Counter- Reformation era, their roles in the scientific communities of Helsinki and Rome as well as the intersection of politics and science in their scholarly practices the study explores the nature of historical research in general at the turn of the twentieth century. The work covers fields such as historiography, university history and the political use of history. Methodologically the research is based on the analysis and contextualization of published and unpublished sources (e.g. correspondences, university records, scholarly publications and reviews in academic journals). Henry Biaudet criticized the previous research on the Nordic Counter-Reformation for its narrow national scope and sources. He sought out a new approach, including the use of sources in archives all over Europe and the inclusion of the Catholic viewpoint. Accordingly, Biaudet and Karttunen searched for records in archives in Southern Europe. Their unorthodox interpretations were denounced in Finland since the picture they gave of late sixteenth-century Sweden was too different from the national narrative. Moreover, Finnish national identity was firmly rooted in Protestantism, and questioning the benevolence of the Reformation and its main actors was considered as an attack not only against historical truth but also national values. The comparison between Biaudet s and Karttunen s arguments and the accepted narrative in Finland shows how traditional interpretations of the Nordic Reformation were influenced by the Lutheran ethos and European anticlerical rhetoric. Historians have recently paid substantial attention to the political use of history, usually focusing on politicized constructions of the national past. This study shows how research that met the criteria of modern historiography also served political purposes. Conducting research in an international community of historians and publishing ambitious scholarly studies that interested an international audience were ways to create a positive image of Finland abroad. These were not uniquely Finnish ideas but rather ideas shared by the international community of historians in Rome. In this context, scientific pursuits were given a clear political meaning. This enhances our understanding of nineteenth-century historiography being firmly rooted between science and politics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Direct contact mechanism in bioleaching implies prior mineral adhesion of Acidithiobacillus ferrooxidans and subsequent enzymatic attack.Prior bacterial adaptation to sulfide mineral substrates influences bacterial ferrous ion oxidation rates. It is highly beneficial to understand major biooxidation mechanisms with reference to solution- and mineral-grown cells in order to optimize bioleaching reactions. For A. ferrooxidans grown in the presence of solid substrates such as sulfur, pyrite and chalcopyrite, bacterial adhesion is required for its enzymatic machinery to come into close contact for mineral dissolution.But when grown in solution substrate such as ferrous ions and thiosulfate, such an adhesion machinery is not required for substrate utilization. Proteinaceous compounds were observed on the surface of sulfur-grown cells. Such an induction of relatively hydrophobic proteins and down regulation of exposed polysaccharides leads to changes in cell surface chemistry. Sulfur-grown and pyrite- and chalcopyrite-grown bacterial cells were found to be more efficient in the bioleaching of chalcopyrite than those grown in the presence of ferrous ions and thiosulfate. (C) 2010 Elsevier B.V. All rights reserved.