937 resultados para Sh3 Domain
Resumo:
The PilZ protein was originally identified as necessary for type IV pilus (T4P) biogenesis. Since then, a large and diverse family of bacterial PilZ homology domains have been identified, some of which have been implicated in signaling pathways that control important processes, including motility, virulence and biofilm formation. Furthermore, many PilZ homology domains, though not PilZ itself, have been shown to bind the important bacterial second messenger bis(3`-> 5`)cyclic diGMP (c-diGMP). The crystal structures of the PilZ orthologs from Xanthomonas axonopodis pv Citri (PilZ(XAC1133), this work) and from Xanthomonas campestris pv campestris (XC1028) present significant structural differences to other PilZ homologs that explain its failure to bind c-diGMP. NMR analysis of PilZ(XAC1133) shows that these structural differences are maintained in solution. In spite of their emerging importance in bacterial signaling, the means by which NZ proteins regulate specific processes is not clear. In this study, we show that PilZ(XAC1133) binds to PilB, an ATPase required for TV polymerization, and to the EAL domain of FiMX(XAC2398), which regulates TV biogenesis and localization in other bacterial species. These interactions were confirmed in NMR, two-hybrid and far-Western blot assays and are the first interactions observed between any PilZ domain and a target protein. While we were unable to detect phosphodiesterase activity for FimXX(AC2398) in vitro, we show that it binds c-diGMP both in the presence and in the absence of PilZ(XAC1133). Site-directed mutagenesis studies for conserved and exposed residues suggest that PilZ(XAC1133) interactions with FimX(XAC2398) and PilB(XAC3239) are mediated through a hydrophobic surface and an unstructured C-terminal extension conserved only in PilZ orthologs. The FimX-PilZ-PilB interactions involve a full set of ""degenerate"" GGDEF, EAL and PilZ domains and provide the first evidence of the means by which PilZ orthologs and FimX interact directly with the TP4 machinery. (C) 2009 Elsevier Ltd. All rights reserved.
Resumo:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.
Resumo:
First-order temporal logic is a concise and powerful notation, with many potential applications in both Computer Science and Artificial Intelligence. While the full logic is highly complex, recent work on monodic first-order temporal logics has identified important enumerable and even decidable fragments. In this paper, we develop a clausal resolution method for the monodic fragment of first-order temporal logic over expanding domains. We first define a normal form for monodic formulae and then introduce novel resolution calculi that can be applied to formulae in this normal form. We state correctness and completeness results for the method. We illustrate the method on a comprehensive example. The method is based on classical first-order resolution and can, thus, be efficiently implemented.
Resumo:
In the domain of aerospace aftermarkets, which often has long supply chains that feed into the maintenance of aircraft, contracts are used to establish agreements between aircraft operators and maintenance suppliers. However, violations at the bottom of the supply chain (part suppliers) can easily cascade to the top (aircraft operators), making it difficult to determine the source of the violation, and seek to address it. In this context, we have developed a global monitoring architecture that ensures the detection of norm violations and generates explanations for the origin of violations. In this paper, we describe the implementation and deployment of a global monitor in the aerospace domain of [8] and show how it generates explanations for violations within the maintenance supply chain. We show how these explanations can be used not only to detect violations at runtime, but also to uncover potential problems in contracts before their deployment, thus improving them.
Resumo:
In industrial polymer and synthetic rubber production facilities, workers are exposed to 1,3-butadiene. This compound is converted in vivo to 1,2,3,4-diepoxybutane (DEB) and has been linked to increased incidences of cancer in these individuals. Carcinogenesis has been attributed to formation of DEB induced DNA interstrand cross-links. Previous studies have demonstrated that DEB cross-links deoxyguanosine residues within 5'-GNC sequences in synthetic DNA, in restriction fragments, and in defined sequence nucleosomes. The current study utilized the polymerase chain reaction (PCR) to examine DEB damage frequencies within nuclear genes, found within "open" regions of chromatin, as compared to regions of unexpressed sequence that reside in tightly packed, "closed" chromatin, to more closely model DEB reactivity in vivo. These initial studies have been performed in chicken liver homogenates. Preliminarily, we have found a dose-dependent DEB lesion-forming response within "open" chromatin. DEB appears to have little-to-no effect upon regions of "closed" chromatin.
Resumo:
Diepoxybutane (DEB), a known industrial carcinogen, reacts with DNA primarily at the N7 position of deoxyguanosine residues and creates interstrand cross-links at the sequence 5'-GNC. Since N7-N7 cross-links cause DNA to fragment upon heating, quantative polymerase chain reaction (QPCR) is being used in this experiment to measure the amount of DEB damage (lesion frequency) with three different targets-mitochondrial (unpackaged), open chromatin region, and closed chromatin region. Initial measurements of DEB damage within these three targets were not consistent because the template DNA was not the limiting reagent in the PCR. Follow-up PCR trials using a limiting amount of DNA are still in progress although initial experimentation looks promising. Sequencing of these three targets to confirm the primer targets has only been successfully performed for the closed chromatin target and does not match the sequence from NIH used to design that primer pair. Further sequencing trials need to be conducted on all three targets to assure that a mitochondrial, open chromatin, and closed chromatin region are actually being amplified in this experimental series.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
In this work, a boundary element formulation to analyse plates reinforced by rectangular beams, with columns defined in the domain is proposed. The model is based on Kirchhoff hypothesis and the beams are not required to be displayed over the plate surface, therefore eccentricity effects are taken into account. The presented boundary element method formulation is derived by applying the reciprocity theorem to zoned plates, where beams are treated as thin sub-regions with larger rigidities. The integral representations derived for this complex structural element consider the bending and stretching effects of both structural elements working together. The standard equilibrium and compatibility conditions along interface are naturally imposed, being the bending tractions eliminated along interfaces. The in-plane tractions and the bending and in-plane displacements are approximated along the beam width, reducing the number of degrees of freedom. The columns are introduced into the formulation by considering domain points where tractions can be prescribed. Some examples are then shown to illustrate the accuracy of the formulation, comparing the obtained results with other numerical solutions.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)