937 resultados para MACROMOLECULAR CHAINS


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the structure of the hydrated quinolinium salt of ferron (8-hydroxy-7-iodoquinoline-5-sulfonic acid), C9H7N+ C9H5INO4S- . 0.8H2O, the quinolinium cation is fully disordered over two sites (occupancy factors 0.63 and 0.37) lying essentially within a common plane and with the ferron anions form pi-pi-associated stacks down the b axis (minimum ring centroid separation = 3.462(6)Ang.]. The cations and anions are linked into chains extending along c through hydroxyl O-H...O and quinolinium N-H...O hydrogen bonds to sulfonate O-atom acceptors which are also involved in water O-H...O hydrogen-bonding interactions down b giving a two-dimensional network structure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the next great challenges of cell biology is the determination of the enormous number of protein structures encoded in genomes. In recent years, advances in electron cryo-microscopy and high-resolution single particle analysis have developed to the point where they now provide a methodology for high resolution structure determination. Using this approach, images of randomly oriented single particles are aligned computationally to reconstruct 3-D structures of proteins and even whole viruses. One of the limiting factors in obtaining high-resolution reconstructions is obtaining a large enough representative dataset ($>100,000$ particles). Traditionally particles have been manually picked which is an extremely labour intensive process. The problem is made especially difficult by the low signal-to-noise ratio of the images. This paper describes the development of automatic particle picking software, which has been tested with both negatively stained and cryo-electron micrographs. This algorithm has been shown to be capable of selecting most of the particles, with few false positives. Further work will involve extending the software to detect differently shaped and oriented particles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Molecular dynamics simulations were carried out on single chain models of linear low-density polyethylene in vacuum to study the effects of branch length, branch content, and branch distribution on the polymer’s crystalline structure at 300 K. The trans/gauche (t/g) ratios of the backbones of the modeled molecules were calculated and utilized to characterize their degree of crystallinity. The results show that the t/g ratio decreases with increasing branch content regardless of branch length and branch distribution, indicating that branch content is the key molecular parameter that controls the degree of crystallinity. Although t/g ratios of the models with the same branch content vary, they are of secondary importance. However, our data suggests that branch distribution (regular or random) has a significant effect on the degree of crystallinity for models containing 10 hexyl branches/1,000 backbone carbons. The fractions of branches that resided in the equilibrium crystalline structures of the models were also calculated. On average, 9.8% and 2.5% of the branches were found in the crystallites of the molecules with ethyl and hexyl branches while C13 NMR experiments showed that the respective probabilities of branch inclusion for ethyl and hexyl branches are 10% and 6% [Hosoda et al., Polymer 1990, 31, 1999–2005]. However, the degree of branch inclusion seems to be insensitive to the branch content and branch distribution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Modern applications comprise multiple components, such as browser plug-ins, often of unknown provenance and quality. Statistics show that failure of such components accounts for a high percentage of software faults. Enabling isolation of such fine-grained components is therefore necessary to increase the robustness and resilience of security-critical and safety-critical computer systems. In this paper, we evaluate whether such fine-grained components can be sandboxed through the use of the hardware virtualization support available in modern Intel and AMD processors. We compare the performance and functionality of such an approach to two previous software based approaches. The results demonstrate that hardware isolation minimizes the difficulties encountered with software based approaches, while also reducing the size of the trusted computing base, thus increasing confidence in the solution's correctness. We also show that our relatively simple implementation has equivalent run-time performance, with overheads of less than 34%, does not require custom tool chains and provides enhanced functionality over software-only approaches, confirming that hardware virtualization technology is a viable mechanism for fine-grained component isolation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ubiquitination involves the attachment of ubiquitin (Ub) to lysine residues on substrate proteins or itself, which can result in protein monoubiquitination or polyubiquitination. Polyubiquitination through different lysines (seven) or the N-terminus of Ub can generate different protein-Ub structures. These include monoubiquitinated proteins, polyubiqutinated proteins with homotypic chains through a particular lysine on Ub or mixed polyubiquitin chains generated by polymerization through different Ub lysines. The ability of the ubiquitination pathway to generate different protein-Ub structures provides versatility of this pathway to target proteins to different fates. Protein ubiquitination is catalyzed by Ub-conjugating and Ub-ligase enzymes, with different combinations of these enzymes specifying the type of Ub modification on protein substrates. How Ub-conjugating and Ub-ligase enzymes generate this structural diversity is not clearly understood. In the current review, we discuss mechanisms utilized by the Ub-conjugating and Ub-ligase enzymes to generate structural diversity during protein ubiquitination, with a focus on recent mechanistic insights into protein monoubiquitination and polyubiquitination.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Thin-sectioned samples mounted on glass slides with common petrographic epoxies cannot be easily removed (for subsequent ion-milling) by standard methods such as heating or dissolution in solvents. A method for the removal of such samples using a radio frequency (RF) generated oxygen plasma has been investigated for a number of typical petrographic and ceramic thin sections. Sample integrity and thickness were critical factors that determined the etching rate of adhesive and the survivability of the sample. Several tests were performed on a variety of materials in order to estimate possible heating or oxidation damage from the plasma. Temperatures in the plasma chamber remained below 138°C and weight changes in mineral powders etched for 76 hr were less than ±4%. A crystal of optical grade calcite showed no apparent surface damage after 48 hr of etching. Any damage from the oxygen plasma is apparently confined to the surface of the sample, and is removed during the ion-milling stage of transmission electron microscopy (TEM) sample preparation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The effects of electron irradiation on NiO-containing solid solution systems are described. Partially hydrated NiO solid solutions, e. g. , NiO-MgO, undergo surface reduction to Ni metal after examination by TEM. This surface layer results in the formation of Moire interference patterns.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The assembly of retroviruses such as HIV-1 is driven by oligomerization of their major structural protein, Gag. Gag is a multidomain polyprotein including three conserved folded domains: MA (matrix), CA (capsid) and NC (nucleocapsid)(1). Assembly of an infectious virion proceeds in two stages(2). In the first stage, Gag oligomerization into a hexameric protein lattice leads to the formation of an incomplete, roughly spherical protein shell that buds through the plasma membrane of the infected cell to release an enveloped immature virus particle. In the second stage, cleavage of Gag by the viral protease leads to rearrangement of the particle interior, converting the non-infectious immature virus particle into a mature infectious virion. The immature Gag shell acts as the pivotal intermediate in assembly and is a potential target for anti-retroviral drugs both in inhibiting virus assembly and in disrupting virus maturation(3). However, detailed structural information on the immature Gag shell has not previously been available. For this reason it is unclear what protein conformations and interfaces mediate the interactions between domains and therefore the assembly of retrovirus particles, and what structural transitions are associated with retrovirus maturation. Here we solve the structure of the immature retroviral Gag shell from Mason-Pfizer monkey virus by combining cryo-electron microscopy and tomography. The 8-angstrom resolution structure permits the derivation of a pseudo-atomic model of CA in the immature retrovirus, which defines the protein interfaces mediating retrovirus assembly. We show that transition of an immature retrovirus into its mature infectious form involves marked rotations and translations of CA domains, that the roles of the amino-terminal and carboxy-terminal domains of CA in assembling the immature and mature hexameric lattices are exchanged, and that the CA interactions that stabilize the immature and mature viruses are almost completely distinct.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Transport between compartments of eukaryotic cells is mediated by coated vesicles. The archetypal protein coats COPI, COPII, and clathrin are conserved from yeast to human. Structural studies of COPII and clathrin coats assembled in vitro without membranes suggest that coat components assemble regular cages with the same set of interactions between components. Detailed three-dimensional structures of coated membrane vesicles have not been obtained. Here, we solved the structures of individual COPI-coated membrane vesicles by cryoelectron tomography and subtomogram averaging of in vitro reconstituted budding reactions. The coat protein complex, coatomer, was observed to adopt alternative conformations to change the number of other coatomers with which it interacts and to form vesicles with variable sizes and shapes. This represents a fundamentally different basis for vesicle coat assembly.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ebola virus is a highly pathogenic filovirus causing severe hemorrhagic fever with high mortality rates. It assembles heterogenous, filamentous, enveloped virus particles containing a negative-sense, single-stranded RNA genome packaged within a helical nucleocapsid (NC). We have used cryo-electron microscopy and tomography to visualize Ebola virus particles, as well as Ebola virus-like particles, in three dimensions in a near-native state. The NC within the virion forms a left-handed helix with an inner nucleoprotein layer decorated with protruding arms composed of VP24 and VP35. A comparison with the closely related Marburg virus shows that the N-terminal region of nucleoprotein defines the inner diameter of the Ebola virus NC, whereas the RNA genome defines its length. Binding of the nucleoprotein to RNA can assemble a loosely coiled NC-like structure; the loose coil can be condensed by binding of the viral matrix protein VP40 to the C terminus of the nucleoprotein, and rigidified by binding of VP24 and VP35 to alternate copies of the nucleoprotein. Four proteins (NP, VP24, VP35, and VP40) are necessary and sufficient to mediate assembly of an NC with structure, symmetry, variability, and flexibility indistinguishable from that in Ebola virus particles released from infected cells. Together these data provide a structural and architectural description of Ebola virus and define the roles of viral proteins in its structure and assembly

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several major human pathogens, including the filoviruses, paramyxoviruses, and rhabdoviruses, package their single-stranded RNA genomes within helical nucleocapsids, which bud through the plasma membrane of the infected cell to release enveloped virions. The virions are often heterogeneous in shape, which makes it difficult to study their structure and assembly mechanisms. We have applied cryo-electron tomography and sub-tomogram averaging methods to derive structures of Marburg virus, a highly pathogenic filovirus, both after release and during assembly within infected cells. The data demonstrate the potential of cryo-electron tomography methods to derive detailed structural information for intermediate steps in biological pathways within intact cells. We describe the location and arrangement of the viral proteins within the virion. We show that the N-terminal domain of the nucleoprotein contains the minimal assembly determinants for a helical nucleocapsid with variable number of proteins per turn. Lobes protruding from alternate interfaces between each nucleoprotein are formed by the C-terminal domain of the nucleoprotein, together with viral proteins VP24 and VP35. Each nucleoprotein packages six RNA bases. The nucleocapsid interacts in an unusual, flexible "Velcro-like" manner with the viral matrix protein VP40. Determination of the structures of assembly intermediates showed that the nucleocapsid has a defined orientation during transport and budding. Together the data show striking architectural homology between the nucleocapsid helix of rhabdoviruses and filoviruses, but unexpected, fundamental differences in the mechanisms by which the nucleocapsids are then assembled together with matrix proteins and initiate membrane envelopment to release infectious virions, suggesting that the viruses have evolved different solutions to these conserved assembly steps.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The convergence of corporate social responsibility (CSR) and corporate governance has immense impact on the participants in global supply chains. The global buyers and retailers tend to incorporate CSR in all stages of product manufacturing within their supply chains. The incorporated CSR thus creates the difficulty to small- and medium-sized manufacturing enterprises (SMEs). Incompetence in standardized CSR practices is an important issue that causes SMEs either losing their scope to access global market directly or serving as subcontractors to large enterprises. This article explores this issue by focusing on Bangladeshi SMEs under the CSR requirement of the important global buyer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Encompasses the whole BPM lifecycle, including process identification, modelling, analysis, redesign, automation and monitoring Class-tested textbook complemented with additional teaching material on the accompanying website Covers both relevant conceptual background, industrial standards and actionable skills Business Process Management (BPM) is the art and science of how work should be performed in an organization in order to ensure consistent outputs and to take advantage of improvement opportunities, e.g. reducing costs, execution times or error rates. Importantly, BPM is not about improving the way individual activities are performed, but rather about managing entire chains of events, activities and decisions that ultimately produce added value for an organization and its customers. This textbook encompasses the entire BPM lifecycle, from process identification to process monitoring, covering along the way process modelling, analysis, redesign and automation. Concepts, methods and tools from business management, computer science and industrial engineering are blended into one comprehensive and inter-disciplinary approach. The presentation is illustrated using the BPMN industry standard defined by the Object Management Group and widely endorsed by practitioners and vendors worldwide. In addition to explaining the relevant conceptual background, the book provides dozens of examples, more than 100 hands-on exercises – many with solutions – as well as numerous suggestions for further reading. The textbook is the result of many years of combined teaching experience of the authors, both at the undergraduate and graduate levels as well as in the context of professional training. Students and professionals from both business management and computer science will benefit from the step-by-step style of the textbook and its focus on fundamental concepts and proven methods. Lecturers will appreciate the class-tested format and the additional teaching material available on the accompanying website fundamentals-of-bpm.org.