1000 resultados para myotoxin II, Atropoides nummifer
Resumo:
RNA polymerase III (Pol III) as well as Pol II (35S) promoters are able to drive hairpin RNA (hpRNA) expression and induce target gene silencing in plants. siRNAs of 21 nt are the predominant species in a 35S Pol II line, whereas 24- and/or 22-nucleotide (nt) siRNAs are produced by a Pol III line. The 35S line accumulated the loop of the hpRNA, in contrast to full-length hpRNA in the Pol III line. These suggest that Pol II and Pol III-transcribed hpRNAs are processed by different pathways. One Pol III transgene produced only 24-nt siRNAs but silenced the target gene efficiently, indicating that the 24-nt siRNAs can direct mRNA degradation; specific cleavage was confirmed by 59 rapid amplification of cDNA ends (RACE). Both Pol II- and Pol III-directed hpRNA transgenes induced cytosine methylation in the target DNA. The extent of methylation is not correlated with the level of 21-nt siRNAs, suggesting that they are not effective inducers of DNA methylation. The promoter of a U6 transgene was significantly methylated, whereas the promoter of the endogenous U6 gene was almost free of cytosine methylation, suggesting that endogenous sequences are more resistant to de novo DNA methylation than are transgene constructs. Published by Cold Spring Harbor Laboratory Press. Copyright © 2008 RNA Society.
Resumo:
A suite of plant expression vectors (pPLEX), constructed from the gene regulation signals from subterranean clover stunt virus (SCSV) genome, has previously been used in dicot transformation for a variety of applications in plant biotechnology. To assess their use for the transformation of monocots, a number of modifications were made to the basic vector series and assessed in rice. In their unmodified forms, the SCSV promoters directed low levels of gene expression, however, insertion of an intron between the promoter and the transgene open reading frame (analogous to the rice actin and maize ubiquitin promoter systems) increased transgene expression 50-fold. The expression patterns from the intron-modified SCSV (segments 4 and 7) promoters were very similar to those directed by the actin or ubiquitin promoters. All promoter systems investigated directed expression that appeared to be constitutive within leaf tissue, and localised to the epidermal and vascular tissues of the root. The pPLEX vectors described here are an important counterpart to the dicot pPLEX series and have the potential to be useful in monocot research and biotechnology.
Resumo:
Statistical methodology was applied to a survey of time-course incidence of four viruses (alfalfa mosaic virus, clover yellow vein virus, subterranean clover mottle virus and subterranean clover red leaf virus) in improved pastures in southern regions of Australia. -from Authors
Resumo:
In the companion paper, a fourth-order element formulation in an updated Lagrangian formulation was presented to handle geometric non-linearities. The formulation of the present paper extends this to include material non-linearity by proposing a refined plastic hinge approach to analyse large steel framed structures with many members, for which contemporary algorithms based on the plastic zone approach can be problematic computationally. This concept is an advancement of conventional plastic hinge approaches, as the refined plastic hinge technique allows for gradual yielding, being recognized as distributed plasticity across the element section, a condition of full plasticity, as well as including strain hardening. It is founded on interaction yield surfaces specified analytically in terms of force resultants, and achieves accurate and rapid convergence for large frames for which geometric and material non-linearity are significant. The solutions are shown to be efficacious in terms of a balance of accuracy and computational expediency. In addition to the numerical efficiency, the present versatile approach is able to capture different kinds of material and geometric non-linearities on general applications of steel structures, and thereby it offers an efficacious and accurate means of assessing non-linear behaviour of the structures for engineering practice.
Resumo:
Level design is often characterised as “where the rubber hits the road” in game development. It is a core area of games design, alongside design of game rules and narrative. However, there is a lack of literature dedicated to documenting teaching games design, let alone the more specialised topic of level design. Furthermore, there is a lack of formal frameworks for best practice in level design, as professional game developers often rely on intuition and previous experience. As a result, there is little for games design teachers to draw on when presented with the opportunity to teach a level design unit. In this paper, we discuss the design and implementation of a games level design unit in which students use the StarCraft II Galaxy Editor. We report on two cycles of an action research project, reflecting upon our experiences with respect to student feedback and peer review, and outlining our plans for improving the unit in years to come.
Resumo:
A natural single-crystal specimen of the kröhnkite from Chuquicamata, Chile, with the general formula Na2Cu(SO4)2 · 2H2O, was investigated by Raman and infrared spectroscopy. The mineral kröhnkite is found in many parts of the world's arid areas. Kröhnkite crystallizes in the monoclinic crystal system with point group 2/m and space group P21/c. It is an uncommon secondary mineral formed in the oxidized zone of copper deposits, typically in very arid climates. The Raman spectrum of kröhnkite dominated by a very sharp intense band at 992 cm−1 is assigned to the ν1 symmetric stretching mode and Raman bands at 1046, 1049, 1138, 1164, and 1177 cm−1 are assigned to the ν3 antisymmetric stretching vibrations. The infrared spectrum shows an intense band at 992 cm−1. The Raman bands at 569, 582, 612, 634, 642, 655, and 660 cm−1 are assigned to the ν4 bending modes. Three Raman bands observed at 429, 445, and 463 cm−1 are attributed to the ν2 bending modes. The observation that three or four bands are seen in the ν4 region of kröhnkite is attributed to the reduction of symmetry to C2v or less.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
The present study focused on simulating a trajectory point towards the end of the first experimental heatshield of the FIRE II vehicle, at a total flight time of 1639.53s. Scale replicas were sized according to binary scaling and instrumented with thermocouples for testing in the X1 expansion tube, located at The University of Queensland. Correlation of flight to experimental data was achieved through the separation, and independent treatment of the heat modes. Preliminary investigation indicates that the absolute value of radiant surface flux is conserved between two binary scaled models, whereas convective heat transfer increases with the length scale. This difference in the scaling techniques result in the overall contribution of radiative heat transfer diminishing to less than 1% in expansion tubes from a flight value of approximately 9-17%. From empirical correlation's it has been shown that the St √Re number decreases, under special circumstances, in expansion tubes by the percentage radiation present on the flight vehicle. Results obtained in this study give a strong indication that the relative radiative heat transfer contribution in the expansion tube tests is less than that in flight, supporting the analysis that the absolute value remains constant with binary scaling.
Resumo:
As a sequel to a paper that dealt with the analysis of two-way quantitative data in large germplasm collections, this paper presents analytical methods appropriate for two-way data matrices consisting of mixed data types, namely, ordered multicategory and quantitative data types. While various pattern analysis techniques have been identified as suitable for analysis of the mixed data types which occur in germplasm collections, the clustering and ordination methods used often can not deal explicitly with the computational consequences of large data sets (i.e. greater than 5000 accessions) with incomplete information. However, it is shown that the ordination technique of principal component analysis and the mixture maximum likelihood method of clustering can be employed to achieve such analyses. Germplasm evaluation data for 11436 accessions of groundnut (Arachis hypogaea L.) from the International Research Institute of the Semi-Arid Tropics, Andhra Pradesh, India were examined. Data for nine quantitative descriptors measured in the post-rainy season and five ordered multicategory descriptors were used. Pattern analysis results generally indicated that the accessions could be distinguished into four regions along the continuum of growth habit (or plant erectness). Interpretation of accession membership in these regions was found to be consistent with taxonomic information, such as subspecies. Each growth habit region contained accessions from three of the most common groundnut botanical varieties. This implies that within each of the habit types there is the full range of expression for the other descriptors used in the analysis. Using these types of insights, the patterns of variability in germplasm collections can provide scientists with valuable information for their plant improvement programs.
Resumo:
Macrophonics II presents new Australian work emerging from the leading edge of performance interface research. The program addresses the emerging dialogue between traditional media and emerging digital media, as well as dialogues across a broad range of musical traditions. Recent technological developments are causing a complete reevaluation of the relationships between media and genres in art, and Macrophonics II presents a cross-section of responses to this situation. Works in the program foreground an approach to performance that integrates sensors with novel performance control devices, and/or examine how machines can be made musical in performance. The program presents works by Australian artists Donna Hewitt, Julian Knowles and Wade Marynowsky, with choreography by Avril Huddy and dance performance by Lizzie and Zaimon Vilmanis. From sensor-based microphones and guitars, through performance a/v, to post-rock dronescapes, movement inspired works and experimental electronica, Macrophonics II provides a broad and engaging survey of new performance approaches in mediatised environments. Initial R&D for the work was supported by a range of institutions internationally, including the Australia Council for the Arts, Arts Queensland, STEIM (Holland) and the Nes Artist Residency (Iceland).
Resumo:
The mechanisms and the reaction products for the oxidation of sulfide ions in the presence of pyrite have been established. When the leach solution contains free sulfide ions, oxidation occurs via electron transfer from the sulfide ion to dissolved oxygen on the pyrite mineral surface, with polysulfides being formed as an intermediate oxidation product. In the absence of cyanide, the polysulfides are further oxidised to thiosulfate, whilst with cyanide present, thiocyanate and sulfite are also formed from the reaction of polysulfides with cyanide and dissolved oxygen. Polysulfide chain length has been shown to affect the final reaction products of polysulfide oxidation by dissolved oxygen. The rate of pyrite catalysed sulfide ion oxidation was found to be slower in cyanide solutions compared to cyanide free solutions. Mixed potential measurements indicated that the reduction of oxygen at the pyrite surface is hindered in the presence of cyanide. The presence of sulfide ions was also found to activate the pyrite surface, increasing its rate of oxidation by oxygen. This effect was particularly evident in the presence of cyanide; in the presence of sulfide the increase in total sulfur from pyrite oxidation was 2.3 mM in 7 h, compared to an increase of <1 mM in the absence of sulfide over 24 h.
Resumo:
RNA polymerase II (pol II) transcription termination requires co‐transcriptional recognition of a functional polyadenylation signal, but the molecular mechanisms that transduce this signal to pol II remain unclear. We show that Yhh1p/Cft1p, the yeast homologue of the mammalian AAUAAA interacting protein CPSF 160, is an RNA‐binding protein and provide evidence that it participates in poly(A) site recognition. Interestingly, RNA binding is mediated by a central domain composed of predicted β‐propeller‐forming repeats, which occurs in proteins of diverse cellular functions. We also found that Yhh1p/Cft1p bound specifically to the phosphorylated C‐terminal domain (CTD) of pol II in vitro and in a two‐hybrid test in vivo. Furthermore, transcriptional run‐on analysis demonstrated that yhh1 mutants were defective in transcription termination, suggesting that Yhh1p/Cft1p functions in the coupling of transcription and 3′‐end formation. We propose that direct interactions of Yhh1p/Cft1p with both the RNA transcript and the CTD are required to communicate poly(A) site recognition to elongating pol II to initiate transcription termination.