1000 resultados para actomyosin complex


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since it has not been possible to crystallize the actomyosin complex, the x-ray structures of the individual proteins together with data obtained by fiber diffraction and electron microscopy have been used to build detailed models of filamentous actin (f-actin) and the actomyosin rigor complex. In the f-actin model, a single monomer uses 10 surface loops and two alpha-helices to make sometimes complicated interactions with its four neighbors. In the myosin molecule, both the essential and regulatory light chains show considerable structural homology to calmodulin. General principles are evident in their mode of attachment to the target alpha-helix of the myosin heavy chain. The essential light chain also makes contacts with other parts of the heavy chain and with the regulatory light chain. The actomyosin rigor interface is extensive, involving interaction of a single myosin head with regions on two adjacent actin monomers. A number of hydrophobic residues on the apposing faces of actin and myosin contribute to the main binding site. This site is flanked on three sides by charged myosin surface loops that form predominantly ionic interactions with adjacent regions of actin. Hydrogen bonding is likely to play a significant role in actin-actin and actin-myosin interactions since many of the contacts involve loops. The model building approach used with actomyosin is applicable to other multicomponent assemblies of biological interest and is a powerful method for revealing molecular interactions and providing insights into the mode of action of the assemblies.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Le complexe actomyosine, formé de l’association de la myosine II avec les filaments d’actine, stabilise le cytosquelette d’actine et génère la contraction cellulaire nécessaire à plusieurs processus comme la motilité et l’apoptose dans les cellules non-musculaires. La myosine II est un hexamère formé d’une paire de chaînes lourdes (MHCs) et de deux paires de chaînes légères MLC20 et MLC17. La régulation de l’activité de la myosine II, c'est-à-dire son interaction avec les filaments d’actine, est directement liée à l’état de phosphorylation des MLC20, mais il reste beaucoup à découvrir sur l’implication des MHCs. Il existe trois isoformes de MHCs de myosine II, MHCIIA, MHCIIB et MHCIIC qui possèdent des fonctions à la fois communes et distinctes. Notre but est de mettre en évidence les différences de fonction entre les isoformes de myosine II, au niveau structurale, dans la stabilisation du cytosquelette d’actine, et au niveau de leur activité contractile, dans la génération des forces de tension. Nous nous sommes intéressés au rôle des isoformes des MHCs dans l’activité du complexe actomyosine qui est sollicité durant le processus de contraction cellulaire de l’apoptose. Dans quatre lignées cellulaires différentes, le traitement conjoint au TNFα et à la cycloheximide causait la contraction et le rétrécissement des cellules suivi de leur détachement du support de culture. Par Western blot, nous avons confirmé que la phosphorylation des MLC20 est augmentée suite au clivage de ROCK1 par la caspase-3, permettant ainsi l’interaction entre la myosine II et les filaments d’actine et par conséquent, la contraction des cellules apoptotiques. Cette contraction est bloquée par l’inhibition des caspases et de ROCK1. MHCIIA est dégradée suite à l’activation de la caspase-3 alors que MHCIIB n’est pas affectée. En utilisant une lignée cellulaire déficiente en MHCIIB, ou MHCIIB (-/-), nous avons observé que la contraction et le détachement cellulaires durant l’induction de l’apoptose se produisaient moins rapidement que dans la lignée de type sauvage (Wt) ce qui suggère que l’isoforme B est impliquée dans la contraction des cellules apoptotiques. Parallèlement, la kinase atypique PKCζ, qui phosphoryle MHCIIB et non MHCIIA, est activée durant l’apoptose. PKCζ joue un rôle important puisque son inhibition bloque la contraction des cellules apoptotiques. Par la suite, nous nous sommes intéressés à la modulation de la morphologie cellulaire par la myosine II. Les fibroblastes MHCIIB (-/-), présentent un large lamellipode dont la formation semble dû uniquement à l’absence de l’isoforme MHCIIB, alors que les fibroblastes Wt ont une morphologie cellulaire étoilée. La formation du lamellipode dans les fibroblastes MHCIIB (-/-) est caractérisée par l’association de la cortactine avec la membrane plasmique. L’observation en microscopie confocale nous indique que MHCIIA interagit avec la cortactine dans les fibroblastes Wt mais très peu dans les fibroblastes MHCIIB (-/-). Le bFGF active la voie des MAP kinases dans les fibroblastes Wt et MHCIIB (-/-) et induit des extensions cellulaires aberrantes dans les fibroblastes MHCIIB (-/-). Nos résultats montrent que l’implication de l’isoforme B de la myosine II dans la modulation de la morphologie cellulaire. L’ensemble de nos résultats participe à distinguer la fonction structurale et contractile de chacune des isoformes de myosine II dans la physiologie cellulaire.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Dissertation presented to obtain the Ph.D degree in Molecular Medicine

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The application of spectroscopy to the study of contaminants in soils is important. Among the many contaminants is arsenic, which is highly labile and may leach to non-contaminated areas. Minerals of arsenate may form depending upon the availability of specific cations for example calcium and iron. Such minerals include carminite, pharmacosiderite and talmessite. Each of these arsenate minerals can be identified by its characteristic Raman spectrum enabling identification.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.