WorldWideScience

Sample records for au-rich signature motif

  1. Network motifs provide signatures that characterize metabolism†

    OpenAIRE

    Shellman, Erin R.; Burant, Charles F.; Schnell, Santiago

    2013-01-01

    Motifs are repeating patterns that determine the local properties of networks. In this work, we characterized all 3-node motifs using enzyme commission numbers of the International Union of Biochemistry and Molecular Biology to show that motif abundance is related to biochemical function. Further, we present a comparative analysis of motif distributions in the metabolic networks of 21 species across six kingdoms of life. We found the distribution of motif abundances to be similar between spec...

  2. Spectroscopic Signatures and Structural Motifs of Dopamine: a Computational Study

    Science.gov (United States)

    Srivastava, Santosh Kumar; Singh, Vipin Bahadur

    2016-06-01

    Dopamine (DA) is an essential neurotransmitter in the central nervous system and it plays integral role in numerous brain functions including behaviour, cognition, emotion, working memory and associated learning. In the present work the conformational landscapes of neutral and protonated dopamine have been investigated in the gas phase and in aqueous solution by MP2 and DFT (M06-2X, ωB97X-D, B3LYP and B3LYP-D3) methods. Twenty lowest energy structures of neutral DA were subjected to geometry optimization and the gauche conformer, GIa, was found to be the lowest gas phase structure at the each level of theory in agreement with the experimental rotational spectroscopy. All folded gauche conformers (GI) where lone electron pair of the NH2 group is directed towards the π system of the aromatic ring ( 'non up' ) are found more stable in the gas phase. While in aqueous solution, all those gauche conformers (GII) where lone electron pair of the NH2 group is directed opposite from the π system of the aromatic ring ('up' structures) are stabilized significantly.Nine lowest energy structures, protonated at the amino group, are optimized at the same MP2/aug-cc-pVDZ level of theory. In the most stable gauche structures, g-1 and g+1, mainly electrostatic cation - π interaction is further stabilized by significant dispersion forces as predicted by the substantial differences between the DFT and dispersion corrected DFT-D3 calculations. In aqueous environment the intra-molecular cation- π distance in g-1 and g+1 isomers, slightly increases compared to the gas phase and the magnitude of the cation- π interaction is reduced relative to the gas phase, because solvation of the cation decreases its interaction energy with the π face of aromatic system. The IR intensity of the bound N-H+ stretching mode provides characteristic 'IR spectroscopic signatures' which can reflect the strength of cation- π interaction energy. The CC2 lowest lying S1 ( 1ππ* ) excited state of neutral

  3. Evolution of the ferric reductase domain (FRD) superfamily: modularity, functional diversification, and signature motifs.

    Science.gov (United States)

    Zhang, Xuezhi; Krause, Karl-Heinz; Xenarios, Ioannis; Soldati, Thierry; Boeckmann, Brigitte

    2013-01-01

    A heme-containing transmembrane ferric reductase domain (FRD) is found in bacterial and eukaryotic protein families, including ferric reductases (FRE), and NADPH oxidases (NOX). The aim of this study was to understand the phylogeny of the FRD superfamily. Bacteria contain FRD proteins consisting only of the ferric reductase domain, such as YedZ and short bFRE proteins. Full length FRE and NOX enzymes are mostly found in eukaryotic cells and all possess a dehydrogenase domain, allowing them to catalyze electron transfer from cytosolic NADPH to extracellular metal ions (FRE) or oxygen (NOX). Metazoa possess YedZ-related STEAP proteins, possibly derived from bacteria through horizontal gene transfer. Phylogenetic analyses suggests that FRE enzymes appeared early in evolution, followed by a transition towards EF-hand containing NOX enzymes (NOX5- and DUOX-like). An ancestral gene of the NOX(1-4) family probably lost the EF-hands and new regulatory mechanisms of increasing complexity evolved in this clade. Two signature motifs were identified: NOX enzymes are distinguished from FRE enzymes through a four amino acid motif spanning from transmembrane domain 3 (TM3) to TM4, and YedZ/STEAP proteins are identified by the replacement of the first canonical heme-spanning histidine by a highly conserved arginine. The FRD superfamily most likely originated in bacteria.

  4. The functional glycosyltransferase signature sequence of the human beta 1,3-glucuronosyltransferase is a XDD motif.

    Science.gov (United States)

    Gulberti, Sandrine; Fournel-Gigleux, Sylvie; Mulliert, Guillermo; Aubry, André; Netter, Patrick; Magdalou, Jacques; Ouzzine, Mohamed

    2003-08-22

    The human beta 1,3-glucuronosyltransferase I (GlcAT-I) is the key enzyme responsible for the completion of glycosaminoglycan-protein linkage tetrasaccharide of proteoglycans (GlcA beta 1,3Gal beta 1,3Gal beta 1,4Xyl beta 1-O-serine). We have investigated the role of aspartate residues Asp194-Asp195-Asp196 corresponding to the glycosyltransferase DXD signature motif, in GlcAT-I function by UDP binding experiments, kinetic analyses, and site-directed mutagenesis. We presented the first evidence that Mn2+ is not only essential for GlcAT-I activity but is also required for cosubstrate binding. In agreement, kinetic studies were consistent with a metal-activated enzyme model whereby activation probably occurs via binding of a Mn2+.UDP-GlcA complex to the enzyme. Mutational analysis showed that the Asp194-Asp195-Asp196 motif is a major element of the UDP/Mn2+ binding site. Furthermore, determination of the individual role of each aspartate showed that substitution of Asp195 as well as Asp196 to alanine strongly impaired GlcAT-I activity, whereas Asp194 replacement produced only a moderate alteration of the enzyme activity. These findings along with molecular modeling and three-dimensional structure comparison of the GlcAT-I catalytic center with that of the Bacillus subtilis glycosyltransferase SpsA provided evidence that the interactions of Asp195 with the ribose moiety of UDP and of Asp196 with the metal cation Mn2+ were crucial for GlcAT-I function. Altogether, these results indicated that, similarly to the SpsA enzyme, the nucleotide binding site of GlcAT-I contains a XDD motif rather than a DXD motif.

  5. Requirement for asparagine in the aquaporin NPA sequence signature motifs for cation exclusion

    DEFF Research Database (Denmark)

    Wree, Dorothea; Wu, Binghua; Zeuthen, Thomas

    2011-01-01

    Two highly conserved NPA motifs are a hallmark of the aquaporin (AQP) family. The NPA triplets form N-terminal helix capping structures with the Asn side chains located in the centre of the water or solute-conducting channel, and are considered to play an important role in AQP selectivity. Although...... another AQP selectivity filter site, the aromatic/Arg (ar/R) constriction, has been well characterized by mutational analysis, experimental data concerning the NPA region--in particular, the Asn position--is missing. Here, we report on the cloning and mutational analysis of a novel aquaglyceroporin...

  6. Signature motifs identify an Acinetobacter Cif virulence factor with epoxide hydrolase activity.

    Science.gov (United States)

    Bahl, Christopher D; Hvorecny, Kelli L; Bridges, Andrew A; Ballok, Alicia E; Bomberger, Jennifer M; Cady, Kyle C; O'Toole, George A; Madden, Dean R

    2014-03-14

    Endocytic recycling of the cystic fibrosis transmembrane conductance regulator (CFTR) is blocked by the CFTR inhibitory factor (Cif). Originally discovered in Pseudomonas aeruginosa, Cif is a secreted epoxide hydrolase that is transcriptionally regulated by CifR, an epoxide-sensitive repressor. In this report, we investigate a homologous protein found in strains of the emerging nosocomial pathogens Acinetobacter nosocomialis and Acinetobacter baumannii ("aCif"). Like Cif, aCif is an epoxide hydrolase that carries an N-terminal secretion signal and can be purified from culture supernatants. When applied directly to polarized airway epithelial cells, mature aCif triggers a reduction in CFTR abundance at the apical membrane. Biochemical and crystallographic studies reveal a dimeric assembly with a stereochemically conserved active site, confirming our motif-based identification of candidate Cif-like pathogenic EH sequences. Furthermore, cif expression is transcriptionally repressed by a CifR homolog ("aCifR") and is induced in the presence of epoxides. Overall, this Acinetobacter protein recapitulates the essential attributes of the Pseudomonas Cif system and thus may facilitate airway colonization in nosocomial lung infections.

  7. Identification of a signature motif for the eIF4a3-SECIS interaction.

    Science.gov (United States)

    Budiman, Michael E; Bubenik, Jodi L; Driscoll, Donna M

    2011-09-01

    eIF4a3, a DEAD-box protein family member, is a component of the exon junction complex which assembles on spliced mRNAs. The protein also acts as a transcript-selective translational repressor of selenoprotein synthesis during selenium deficiency. Selenocysteine (Sec) incorporation into selenoproteins requires a Sec Insertion Sequence (SECIS) element in the 3' untranslated region. During selenium deficiency, eIF4a3 binds SECIS elements from non-essential selenoproteins, preventing Sec insertion. We identified a molecular signature for the eIF4a3-SECIS interaction using RNA gel shifts, surface plasmon resonance and enzymatic foot printing. Our results support a two-site interaction model, where eIF4a3 binds the internal and apical loops of the SECIS. Additionally, the stability of the complex requires uridine in the SECIS core. In terms of protein requirements, the two globular domains of eIF4a3, which are connected by a linker, are both critical for SECIS binding. Compared to full-length eIF4a3, the two domains in trans bind with a lower association rate but notably, the uridine is no longer important for complex stability. These results provide insight into how eIF4a3 discriminates among SECIS elements and represses translation.

  8. The nuclear-cytoplasmic shuttling of virion host shutoff RNase is enabled by pUL47 and an embedded nuclear export signal and defines the sites of degradation of AU-rich and stable cellular mRNAs.

    Science.gov (United States)

    Shu, Minfeng; Taddeo, Brunella; Roizman, Bernard

    2013-12-01

    The herpes simplex virus host shutoff RNase (VHS-RNase) is the major early block of host responses to infection. VHS-RNase is introduced into cells during infection and selectively degrades stable mRNAs made before infection and the normally short-lived AU-rich stress response mRNAs induced by sensors of innate immunity. Through its interactions with pUL47, another tegument protein, it spares from degradation viral mRNAs. Analyses of embedded motifs revealed that VHS-RNase contains a nuclear export signal (NES) but not a nuclear localization signal. To reconcile the potential nuclear localization with earlier studies showing that VHS-RNase degrades mRNAs in polyribosomes, we constructed a mutant in which NES was ablated. Comparison of the mutant and wild-type VHS-RNases revealed the following. (i) On infection, VHS-RNase is transported to the nucleus, but only the wild-type protein shuttles between the nucleus and cytoplasm. (ii) Both VHS-RNases localized in the cytoplasm following transfection. On cotransfection with pUL47, a fraction of VHS-RNase was translocated to the nucleus, suggesting that pUL47 may enable nuclear localization of VHS-RNase. (iii) In infected cells, VHS-RNase lacking NES degraded the short-lived AU-rich mRNAs but not the stable mRNAs. In transfected cells, both wild-type and NES mutant VHS-RNases effectively degraded cellular mRNAs. Our results suggest that the stable mRNAs are degraded in the cytoplasm, whereas the AU-rich mRNAs may be degraded in both cellular compartments. The selective sparing of viral mRNAs may take place during the nuclear phase in the course of interaction of pUL47, VHS-RNase, and nascent viral mRNAs.

  9. The cholesterol-dependent cytolysin signature motif: a critical element in the allosteric pathway that couples membrane binding to pore assembly.

    Directory of Open Access Journals (Sweden)

    Kelley J Dowd

    Full Text Available The cholesterol-dependent cytolysins (CDCs constitute a family of pore-forming toxins that contribute to the pathogenesis of a large number of Gram-positive bacterial pathogens.The most highly conserved region in the primary structure of the CDCs is the signature undecapeptide sequence (ECTGLAWEWWR. The CDC pore forming mechanism is highly sensitive to changes in its structure, yet its contribution to the molecular mechanism of the CDCs has remained enigmatic. Using a combination of fluorescence spectroscopic methods we provide evidence that shows the undecapeptide motif of the archetype CDC, perfringolysin O (PFO, is a key structural element in the allosteric coupling of the cholesterol-mediated membrane binding in domain 4 (D4 to distal structural changes in domain 3 (D3 that are required for the formation of the oligomeric pore complex. Loss of the undecapeptide function prevents all measurable D3 structural transitions, the intermolecular interaction of membrane bound monomers and the assembly of the oligomeric pore complex. We further show that this pathway does not exist in intermedilysin (ILY, a CDC that exhibits a divergent undecapeptide and that has evolved to use human CD59 rather than cholesterol as its receptor. These studies show for the first time that the undecapeptide of the cholesterol-binding CDCs forms a critical element of the allosteric pathway that controls the assembly of the pore complex.

  10. The p53 target Wig-1 regulates p53 mRNA stability through an AU-rich element

    DEFF Research Database (Denmark)

    Vilborg, Anna; Glahder, Jacob-Andreas Harald; Wilhelm, Margareta T

    2009-01-01

    The p53 target gene Wig-1 encodes a double-stranded-RNA-binding zinc finger protein. We show here that Wig-1 binds to p53 mRNA and stabilizes it through an AU-rich element (ARE) in the 3' UTR of the p53 mRNA. This effect is mirrored by enhanced p53 protein levels in both unstressed cells and cells...... exposed to p53-activating stress agents. Thus, the p53 target Wig-1 is a previously undescribed ARE-regulating protein that acts as a positive feedback regulator of p53, with implications both for the steady-state levels of p53 and for the p53 stress response. Our data reveal a previously undescribed link...

  11. seeMotif: exploring and visualizing sequence motifs in 3D structures

    OpenAIRE

    2009-01-01

    Sequence motifs are important in the study of molecular biology. Motif discovery tools efficiently deliver many function related signatures of proteins and largely facilitate sequence annotation. As increasing numbers of motifs are detected experimentally or predicted computationally, characterizing the functional roles of motifs and identifying the potential synergetic relationships between them are important next steps. A good way to investigate novel motifs is to utilize the abundant 3D st...

  12. Functional significance for a heterogenous ribonucleoprotein A18 signature RNA motif in the 3'-untranslated region of ataxia telangiectasia mutated and Rad3-related (ATR) transcript.

    Science.gov (United States)

    Yang, Ruiqing; Zhan, Ming; Nalabothula, Narasimha Rao; Yang, Qingyuan; Indig, Fred E; Carrier, France

    2010-03-19

    The predominantly nuclear heterogenous ribonucleoprotein A18 (hnRNP A18) translocates to the cytosol in response to cellular stress and increases translation by specifically binding to the 3'-untranslated region (UTR) of several mRNA transcripts and the eukaryotic initiation factor 4G. Here, we identified a 51-nucleotide motif that is present 11.49 times more often in the 3'-UTR of hnRNP A18 mRNA targets than in the UniGene data base. This motif was identified by computational analysis of primary sequences and secondary structures of hnRNP A18 mRNA targets against the unaligned sequences. Band shift analyses indicate that the motif is sufficient to confer binding to hnRNP A18. A search of the entire UniGene data base indicates that the hnRNP A18 motif is also present in the 3'-UTR of the ataxia telangiectasia mutated and Rad3-related (ATR) mRNA. Validation of the predicted hnRNP A18 motif is provided by amplification of endogenous ATR transcript on polysomal fractions immunoprecipitated with hnRNP A18. Moreover, overexpression of hnRNP A18 results in increased ATR protein levels and increased phosphorylation of Chk1, a preferred ATR substrate, in response to UV radiation. In addition, our data indicate that inhibition of casein kinase II or GSK3beta significantly reduced hnRNP A18 cytosolic translocation in response to UV radiation. To our knowledge, this constitutes the first demonstration of a post-transcriptional regulatory mechanism for ATR activity. hnRNP A18 could thus become a new target to trigger ATR activity as back-up stress response mechanisms to functionally compensate for absent or defective responders.

  13. Hitchcock's Motifs

    NARCIS (Netherlands)

    Walker, Michael

    2005-01-01

    Among the abundant Alfred Hitchcock literature, Hitchcock's Motifs has found a fresh angle. Starting from recurring objects, settings, character-types and events, Michael Walker tracks some forty motifs, themes and clusters across the whole of Hitchcock's oeuvre, including not only all his 52 extant

  14. Signature motifs of GDP polyribonucleotidyltransferase, a non-segmented negative strand RNA viral mRNA capping enzyme, domain in the L protein are required for covalent enzyme-pRNA intermediate formation.

    Science.gov (United States)

    Neubauer, Julie; Ogino, Minako; Green, Todd J; Ogino, Tomoaki

    2016-01-01

    The unconventional mRNA capping enzyme (GDP polyribonucleotidyltransferase, PRNTase; block V) domain in RNA polymerase L proteins of non-segmented negative strand (NNS) RNA viruses (e.g. rabies, measles, Ebola) contains five collinear sequence elements, Rx(3)Wx(3-8)ΦxGxζx(P/A) (motif A; Φ, hydrophobic; ζ, hydrophilic), (Y/W)ΦGSxT (motif B), W (motif C), HR (motif D) and ζxxΦx(F/Y)QxxΦ (motif E). We performed site-directed mutagenesis of the L protein of vesicular stomatitis virus (VSV, a prototypic NNS RNA virus) to examine participation of these motifs in mRNA capping. Similar to the catalytic residues in motif D, G1100 in motif A, T1157 in motif B, W1188 in motif C, and F1269 and Q1270 in motif E were found to be essential or important for the PRNTase activity in the step of the covalent L-pRNA intermediate formation, but not for the GTPase activity that generates GDP (pRNA acceptor). Cap defective mutations in these residues induced termination of mRNA synthesis at position +40 followed by aberrant stop-start transcription, and abolished virus gene expression in host cells. These results suggest that the conserved motifs constitute the active site of the PRNTase domain and the L-pRNA intermediate formation followed by the cap formation is essential for successful synthesis of full-length mRNAs.

  15. The association of Alu repeats with the generation of potential AU-rich elements (ARE at 3' untranslated regions.

    Directory of Open Access Journals (Sweden)

    Bhak Jonghwa

    2004-12-01

    Full Text Available Abstract Background A significant portion (about 8% in the human genome of mammalian mRNA sequences contains AU (Adenine and Uracil rich elements or AREs at their 3' untranslated regions (UTR. These mRNA sequences are usually stable. However, an increasing number of observations have been made of unstable species, possibly depending on certain elements such as Alu repeats. ARE motifs are repeats of the tetramer AUUU and a monomer A at the end of the repeats ((AUUUnA. The importance of AREs in biology is that they make certain mRNA unstable. Proto-oncogene, such as c-fos, c-myc, and c-jun in humans, are associated with AREs. Although it has been known that the increased number of ARE motifs caused the decrease of the half-life of mRNA containing ARE repeats, the exact mechanism is as of yet unknown. We analyzed the occurrences of AREs and Alu and propose a possible mechanism for how human mRNA could acquire and keep AREs at its 3' UTR originating from Alu repeats. Results Interspersed in the human genome, Alu repeats occupy 5% of the 3' UTR of mRNA sequences. Alu has poly-adenine (poly-A regions at its end, which lead to poly-thymine (poly-T regions at the end of its complementary Alu. It has been found that AREs are present at the poly-T regions. From the 3' UTR of the NCBI's reference mRNA sequence database, we found nearly 40% (38.5% of ARE (Class I were associated with Alu sequences (Table 1 within one mismatch allowance in ARE sequences. Other ARE classes had statistically significant associations as well. This is far from a random occurrence given their limited quantity. At each ARE class, random distribution was simulated 1,000 times, and it was shown that there is a special relationship between ARE patterns and the Alu repeats. Table 1 Defined ARE classes. (Symbol marks are used in this study instead of full sequences. Symbol ARE sequence Class I (AUUU5A AUUUAUUUAUUUAUUUAUUUA Class II (AUUU4A AUUUAUUUAUUUAUUUA Class III U(AUUU3AU

  16. Impaired on/off regulation of TNF biosynthesis in mice lacking TNF AU-rich elements: implications for joint and gut-associated immunopathologies.

    Science.gov (United States)

    Kontoyiannis, D; Pasparakis, M; Pizarro, T T; Cominelli, F; Kollias, G

    1999-03-01

    We addressed the impact of deleting TNF AU-rich elements (ARE) from the mouse genome on the regulation of TNF biosynthesis and the physiology of the host. Absence of the ARE affected mechanisms responsible for TNF mRNA destabilization and translational repression in hemopoietic and stromal cells. In stimulated conditions, TNF ARE were required both for the alleviation and reinforcement of message destabilization and translational silencing. Moreover, the mutant mRNA was no longer responsive to translational modulation by the p38 and JNK kinases, demonstrating that TNF ARE are targets for these signals. Development of two specific pathologies in mutant mice, i.e., chronic inflammatory arthritis and Crohn's-like inflammatory bowel disease, suggests that defective function of ARE may be etiopathogenic for the development of analogous human pathologies.

  17. Ore-forming mechanism for the Xiaoxinancha Au-rich Cu deposit in Yanbian, Jilin Province, China: Evidence from noble gas isotope geochemistry of fluid inclusions in minerals

    Institute of Scientific and Technical Information of China (English)

    SUN JingGui; ZHAO JunKang; CHEN JunQiang; KEISUKE Nagao; HIROCHiKA Sumino; SHEN Kun; MEN LanJing; CHEN Lei

    2008-01-01

    The Xiaoxinancha Au-rich copper deposit is one of important Au-Cu deposits along the continental margin in Eastern China. The deposit consists of two sections: the Beishan mine (North), composed of altered rocks with veinlet-dissemination sulfides and melnicovite-dominated sulfide-quartz veins, and the Nanshan mine (South), composed of pyrrhotite-dominated sulfide-quartz veins and pure sulfide veins. The isotope compositions of noble gases extracted from fluid inclusions in ore minerals, i.e. ratios of 3He/4He, 20Ne/22Ne and 40Ar/36Ar are in the ranges of 4.45-0.08 Ra, 10.2-8.8 and 306-430, respectively. Fluid inclusions in minerals from the Nanshan mine have higher 3He/4He and 20Ne/22Ne ratios whereas those from the Beishan mine have lower 3He/4He ratios. The analysis of origin, and evolution of the ore fluids and its relations with the ore-forming stages and the ages of mineralization suggests that the initial hydrothermal fluids probably come from the melts generated by partial melting of oceanic crust with the participation of fluids from the mantle (mantle-plume type)/aesthenosphere. This also corresponds to the continental margin settings during the subduction of Izanagi ocaneic plate towards the palaeo-Asian continent (123-102 Ma). The veinlet-dissemination ore bodies of the Beishan mine were formed through replacement and crystallization of the mixed fluids generated by mixing of the ascending high-temperature boiling fluid with young crustal fluid whereas the melnicovite-dominated sulfide-quartz veins were formed subsequently by filling of the high-temperature ore fluid in fissures. Pyrrhotite-dominated sulfide-quartz veins in the Nanshan mine were formed by filling-deposition- crystallization of the moderate-temperature ore fluids and the pure sulfide veins were formed later by filling-deposition-crystallization of ore substance-rich fluids after boiling of the moderate-temperature ore fluids. The metallogenic dynamic processes can be summarized as: (1

  18. Deletion of AU-rich elements within the Bcl2 3'UTR reduces protein expression and B cell survival in vivo.

    Directory of Open Access Journals (Sweden)

    Manuel D Díaz-Muñoz

    Full Text Available Post-transcriptional mRNA regulation by RNA binding proteins (RBPs associated with AU-rich elements (AREs present in the 3' untranslated region (3'UTR of specific mRNAs modulates transcript stability and translation in eukaryotic cells. Here we have functionally characterised the importance of the AREs present within the Bcl2 3'UTR in order to maintain Bcl2 expression. Gene targeting deletion of 300 nucleotides of the Bcl2 3'UTR rich in AREs diminishes Bcl2 mRNA stability and protein levels in primary B cells, decreasing cell lifespan. Generation of chimeric mice indicates that Bcl2-ARE∆/∆ B cells have an intrinsic competitive disadvantage compared to wild type cells. Biochemical assays and predictions using a bioinformatics approach show that several RBPs bind to the Bcl2 AREs, including AUF1 and HuR proteins. Altogether, association of RBPs to Bcl2 AREs contributes to Bcl2 protein expression by stabilizing Bcl2 mRNA and promotes B cell maintenance.

  19. Downregulation of the AU-rich RNA-binding protein ZFP36 in chronic HBV patients: implications for anti-inflammatory therapy.

    Directory of Open Access Journals (Sweden)

    Wen-Jing Jin

    Full Text Available Inflammation caused by chronic hepatitis B virus (HBV infection is associated with the development of cirrhosis and hepatocellular carcinoma; however, the mechanisms by which HBV infection induces inflammation and inflammatory cytokine production remain largely unknown. We analyzed the gene expression patterns of lymphocytes from chronic HBV-infected patients and found that the expression of ZFP36, an AU-rich element (ARE-binding protein, was dramatically reduced in CD4(+ and CD8(+ T lymphocytes from chronic HBV patients. ZFP36 expression was also reduced in CD14(+ monocytes and in total PBMCs from chronic HBV patients. To investigate the functional consequences of reduced ZFP36 expression, we knocked down ZFP36 in PBMCs from healthy donors using siRNA. siRNA-mediated silencing of ZFP36 resulted in dramatically increased expression of multiple inflammatory cytokines, most of which were also increased in the plasma of chronic HBV patients. Furthermore, we found that IL-8 and RANTES induced ZFP36 downregulation, and this effect was mediated through protein kinase C. Importantly, we found that HBsAg stimulated PBMCs to express IL-8 and RANTES, resulting in decreased ZFP36 expression. Our results suggest that an inflammatory feedback loop involving HBsAg, ZFP36, and inflammatory cytokines may play a critical role in the pathogenesis of chronic HBV and further indicate that ZFP36 may be an important target for anti-inflammatory therapy during chronic HBV infection.

  20. CTLA-8, cloned from an activated T cell, bearing AU-rich messenger RNA instability sequences, and homologous to a herpesvirus saimiri gene.

    Science.gov (United States)

    Rouvier, E; Luciani, M F; Mattéi, M G; Denizot, F; Golstein, P

    1993-06-15

    To detect novel molecules involved in immune functions, a subtracted cDNA library between closely related murine lymphoid cells was prepared using improved technology. Differential screening of this library yielded several clones with a very restricted tissue specificity, including one that we named CTLA-8. CTLA-8 transcripts could be detected only in T cell hybridoma clones related to the one used to prepare the library. Southern blots showed that the CTLA-8 gene was single copy in mice, rats, and humans. By radioactive in situ hybridization, the CTLA-8 gene was mapped at a single site on mouse chromosome 1A and human chromosome 2q31, in a known interspecific syntenic region. The CTLA-8 cDNA sequence indicated the presence, in the 3'-untranslated region of the mRNA, of AU-rich repeats previously found in the mRNA of various cytokines, growth factors, and oncogenes. The CTLA-8 cDNA contained an open reading frame encoding a putative protein of 150 amino acids. This protein was 57% homologous to the putative protein encoded by the ORF13 gene of herpesvirus Saimiri, a T lymphotropic virus. These findings are discussed in the context of other genes of this herpesvirus homologous to known immunologically active molecules. More generally, CTLA-8 may belong to the growing set of virus-captured functionally important cellular genes related to the immune system or to cell death and cell survival.

  1. CTLA-8, cloned from an activated T cell, bearing AU-rich messenger RNA instability sequences, and homologous to a herpesvirus Saimiri gene

    Energy Technology Data Exchange (ETDEWEB)

    Rouvier, E.; Luciani, M.F.; Golstein, P. (Centre d' Immunologie INSERM-CNRS de Marseille-Luminy, Marseille (France)); Mattei, M.G. (INSERM U242, Marseille (France)); Denizot, F. (Centre de Sequencage d' ADN, Marseille (France))

    1993-06-15

    To detect novel molecules involved in immune functions, a subtracted cDNA library between closely related murine lymphoid cells was prepared using improved technology. Differential screening of this library yielded several clones with a very restricted tissue specificity, including one that was named CTLA-8. CTLA-8 transcripts could be detected only in T cell hybridoma clones related to the one used to prepare the library. Southern blots showed that the CTLA-8 gene was single copy in mice, rats, and humans. By radioactive in situ hybridization, the CTLA-8 gene was mapped at a single site on mouse chromosome 1A and human chromosome 2q31, in a known interspecific syntenic region. The CTLA-8 cDNA sequence indicated the presence, in the 3'-untranslated region of the mRNA, of AU-rich repeats previously found in the mRNA of various cytokines, growth factors, and oncogenes. The CTLA-8 cDNA contained an open reading frame encoding a putative protein of 150 amino acids. This protein was 57% homologous to the putative protein encoded by the ORF13 gene of herpesvirus Saimiri, a T lymphotropic virus. These findings are discussed in the context of other genes of this herpesvirus homologous to known immunologically active molecules. More generally, CTLA-8 may belong to the growing set of virus-captured functionally important cellular genes related to the immune system or to cell death and cell survival. 69 refs., 5 figs.

  2. seeMotif: exploring and visualizing sequence motifs in 3D structures.

    Science.gov (United States)

    Chang, Darby Tien-Hao; Chien, Ting-Ying; Chen, Chien-Yu

    2009-07-01

    Sequence motifs are important in the study of molecular biology. Motif discovery tools efficiently deliver many function related signatures of proteins and largely facilitate sequence annotation. As increasing numbers of motifs are detected experimentally or predicted computationally, characterizing the functional roles of motifs and identifying the potential synergetic relationships between them are important next steps. A good way to investigate novel motifs is to utilize the abundant 3D structures that have also been accumulated at an astounding rate in recent years. This article reports the development of the web service seeMotif, which provides users with an interactive interface for visualizing sequence motifs on protein structures from the Protein Data Bank (PDB). Researchers can quickly see the locations and conformation of multiple motifs among a number of related structures simultaneously. Considering the fact that PDB sequences are usually shorter than those in sequence databases and/or may have missing residues, seeMotif has two complementary approaches for selecting structures and mapping motifs to protein chains in structures. As more and more structures belonging to previously uncharacterized protein families become available, combining sequence and structure information gives good opportunities to facilitate understanding of protein functions in large-scale genome projects. Available at: http://seemotif.csie.ntu.edu.tw,http://seemotif.ee.ncku.edu.tw or http://seemotif.csbb.ntu.edu.tw.

  3. Saturated fatty acids induce post-transcriptional regulation of HAMP mRNA via AU-rich element-binding protein, human antigen R (HuR).

    Science.gov (United States)

    Lu, Sizhao; Mott, Justin L; Harrison-Findik, Duygu Dee

    2015-10-02

    Iron is implicated in fatty liver disease pathogenesis. The human hepcidin gene, HAMP, is the master switch of iron metabolism. The aim of this study is to investigate the regulation of HAMP expression by fatty acids in HepG2 cells. For these studies, both saturated fatty acids (palmitic acid (PA) and stearic acid (SA)) and unsaturated fatty acid (oleic acid (OA)) were used. PA and, to a lesser extent, SA, but not OA, up-regulated HAMP mRNA levels, as determined by real-time PCR. To understand whether PA regulates HAMP mRNA at the transcriptional or post-transcriptional level, the transcription inhibitor actinomycin D was employed. PA-mediated induction of HAMP mRNA expression was not blocked by actinomycin D. Furthermore, PA activated HAMP 3'-UTR, but not promoter, activity, as shown by reporter assays. HAMP 3'-UTR harbors a single AU-rich element (ARE). Mutation of this ARE abolished the effect of PA, suggesting the involvement of ARE-binding proteins. The ARE-binding protein human antigen R (HuR) stabilizes mRNA through direct interaction with AREs on 3'-UTR. HuR is regulated by phosphorylation-mediated nucleo-cytoplasmic shuttling. PA activated this process. The binding of HuR to HAMP mRNA was also induced by PA in HepG2 cells. Silencing of HuR by siRNA abolished PA-mediated up-regulation of HAMP mRNA levels. PKC is known to phosphorylate HuR. Staurosporine, a broad-spectrum PKC inhibitor, inhibited both PA-mediated translocation of HuR and induction of HAMP expression. Similarly, rottlerin, a novel class PKC inhibitor, abrogated PA-mediated up-regulation of HAMP expression. In conclusion, lipids mediate post-transcriptional regulation of HAMP throughPKC- and HuR-dependent mechanisms.

  4. The Motif Tracking Algorithm

    CERN Document Server

    Wilson, William; Aickelin, Uwe; 10.1007/s11633.008.0032.0

    2010-01-01

    The search for patterns or motifs in data represents a problem area of key interest to finance and economic researchers. In this paper we introduce the Motif Tracking Algorithm, a novel immune inspired pattern identification tool that is able to identify unknown motifs of a non specified length which repeat within time series data. The power of the algorithm comes from the fact that it uses a small number of parameters with minimal assumptions regarding the data being examined or the underlying motifs. Our interest lies in applying the algorithm to financial time series data to identify unknown patterns that exist. The algorithm is tested using three separate data sets. Particular suitability to financial data is shown by applying it to oil price data. In all cases the algorithm identifies the presence of a motif population in a fast and efficient manner due to the utilisation of an intuitive symbolic representation. The resulting population of motifs is shown to have considerable potential value for other ap...

  5. The Motif Tracking Algorithm

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The search for patterns or motifs in data represents a problem area of key interest to finance and economic researchers. In this paper, we introduce the motif tracking algorithm (MTA), a novel immune inspired (IS) pattern identification tool that is able to identify unknown motifs of a non specified length which repeat within time series data. The power of the algorithm comes from the fact that it uses a small number of parameters with minimal assumptions regarding the data being examined or the underlying motifs. Our interest lies in applying the algorithm to financial time series data to identify unknown patterns that exist. The algorithm is tested using three separate data sets. Particular suitability to financial data is shown by applying it to oil price data. In all cases, the algorithm identifies the presence of a motif population in a fast and efficient manner due to the utilization of an intuitive symbolic representation.The resulting population of motifs is shown to have considerable potential value for other applications such as forecasting and algorithm seeding.

  6. Crystal Structure of the N-Terminal RNA Recognition Motif of mRNA Decay Regulator AUF1

    Directory of Open Access Journals (Sweden)

    Young Jun Choi

    2016-01-01

    Full Text Available AU-rich element binding/degradation factor 1 (AUF1 plays a role in destabilizing mRNAs by forming complexes with AU-rich elements (ARE in the 3′-untranslated regions. Multiple AUF1-ARE complexes regulate the translation of encoded products related to the cell cycle, apoptosis, and inflammation. AUF1 contains two tandem RNA recognition motifs (RRM and a Gln- (Q- rich domain in their C-terminal region. To observe how the two RRMs are involved in recognizing ARE, we obtained the AUF1-p37 protein covering the two RRMs. However, only N-terminal RRM (RRM1 was crystallized and its structure was determined at 1.7 Å resolution. It appears that the RRM1 and RRM2 separated before crystallization. To demonstrate which factors affect the separate RRM1-2, we performed limited proteolysis using trypsin. The results indicated that the intact proteins were cleaved by unknown proteases that were associated with them prior to crystallization. In comparison with each of the monomers, the conformations of the β2-β3 loops were highly variable. Furthermore, a comparison with the RRM1-2 structures of HuR and hnRNP A1 revealed that a dimer of RRM1 could be one of the possible conformations of RRM1-2. Our data may provide a guidance for further structural investigations of AUF1 tandem RRM repeat and its mode of ARE binding.

  7. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios i

  8. Visibility graph motifs

    CERN Document Server

    Iacovacci, Jacopo

    2015-01-01

    Visibility algorithms transform time series into graphs and encode dynamical information in their topology, paving the way for graph-theoretical time series analysis as well as building a bridge between nonlinear dynamics and network science. In this work we introduce and study the concept of visibility graph motifs, smaller substructures that appear with characteristic frequencies. We develop a theory to compute in an exact way the motif profiles associated to general classes of deterministic and stochastic dynamics. We find that this simple property is indeed a highly informative and computationally efficient feature capable to distinguish among different dynamics and robust against noise contamination. We finally confirm that it can be used in practice to perform unsupervised learning, by extracting motif profiles from experimental heart-rate series and being able, accordingly, to disentangle meditative from other relaxation states. Applications of this general theory include the automatic classification a...

  9. 1-t-motifs

    CERN Document Server

    Taelman, Lenny

    2009-01-01

    We show that the module of rational points on an abelian t-module E is canonically isomorphic with the module Ext^1(M_E, K[t]) of extensions of the trivial t-motif K[t] by the t-motif M_E associated with E. This generalizes prior results of Anderson and Thakur and of Papanikolas and Ramachandran. In case E is uniformizable then we show that this extension module is canonically isomorphic with the corresponding extension module of Pink-Hodge structures. This situation is formally very similar to Deligne's theory of 1-motifs and we have tried to build up the theory in a way that makes this analogy as clear as possible.

  10. MHC motif viewer

    DEFF Research Database (Denmark)

    Rapin, Nicolas Philippe Jean-Pierre; Hoof, Ilka; Lund, Ole

    2008-01-01

    . Algorithms that predict which peptides MHC molecules bind have recently been developed and cover many different alleles, but the utility of these algorithms is hampered by the lack of tools for browsing and comparing the specificity of these molecules. We have, therefore, developed a web server, MHC motif...... viewer, that allows the display of the likely binding motif for all human class I proteins of the loci HLA A, B, C, and E and for MHC class I molecules from chimpanzee (Pan troglodytes), rhesus monkey (Macaca mulatta), and mouse (Mus musculus). Furthermore, it covers all HLA-DR protein sequences...

  11. The MHC motif viewer

    DEFF Research Database (Denmark)

    Rapin, Nicolas Philippe Jean-Pierre; Hoof, Ilka; Lund, Ole

    2010-01-01

    of peptides, and knowledge of their binding specificities is important for understanding differences in the immune response between individuals. Algorithms predicting which peptides bind a given MHC molecule have recently been developed with high prediction accuracy. The utility of these algorithms...... is hampered by the lack of tools for browsing and comparing specificity of these molecules. We have developed a Web server, MHC Motif Viewer, which allows the display of the binding motif for MHC class I proteins for human, chimpanzee, rhesus monkey, mouse, and swine, as well as HLA-DR protein sequences...

  12. [Personal motif in art].

    Science.gov (United States)

    Gerevich, József

    2015-01-01

    One of the basic questions of the art psychology is whether a personal motif is to be found behind works of art and if so, how openly or indirectly it appears in the work itself. Analysis of examples and documents from the fine arts and literature allow us to conclude that the personal motif that can be identified by the viewer through symbols, at times easily at others with more difficulty, gives an emotional plus to the artistic product. The personal motif may be found in traumatic experiences, in communication to the model or with other emotionally important persons (mourning, disappointment, revenge, hatred, rivalry, revolt etc.), in self-searching, or self-analysis. The emotions are expressed in artistic activity either directly or indirectly. The intention nourished by the artist's identity (Kunstwollen) may stand in the way of spontaneous self-expression, channelling it into hidden paths. Under the influence of certain circumstances, the artist may arouse in the viewer, consciously or unconsciously, an illusionary, misleading image of himself. An examination of the personal motif is one of the important research areas of art therapy.

  13. Ore-forming mechanism for the Xiaoxinancha Au-rich Cu deposit in Yanbian,Jilin Province,China:Evidence from noble gas isotope geochemistry of fluid inclusions in minerals

    Institute of Scientific and Technical Information of China (English)

    KEISUKE; Nagao; HIROCHIKA; Sumino

    2008-01-01

    The Xiaoxinancha Au-rich copper deposit is one of important Au-Cu deposits along the continental margin in Eastern China. The deposit consists of two sections: the Beishan mine (North), composed of altered rocks with veinlet-dissemination sulfides and melnicovite-dominated sulfide-quartz veins, and the Nanshan mine (South), composed of pyrrhotite-dominated sulfide-quartz veins and pure sulfide veins. The isotope compositions of noble gases extracted from fluid inclusions in ore minerals, i.e. ratios of 3He/4He, 20Ne/22Ne and40Ar/36Ar are in the ranges of 4.45―0.08 Ra, 10.2―8.8 and 306―430, respectively. Fluid inclusions in minerals from the Nanshan mine have higher 3He/4He and 20Ne/22Ne ratios whereas those from the Beishan mine have lower 3He/4He ratios. The analysis of origin, and evolution of the ore fluids and its relations with the ore-forming stages and the ages of mineralization suggests that the initial hydrothermal fluids probably come from the melts generated by partial melting of oceanic crust with the participation of fluids from the mantle (mantle-plume type)/aesthenosphere. This also corresponds to the continental margin settings during the subduction of Izanagi ocaneic plate towards the palaeo-Asian continent (123―102 Ma). The veinlet-dissemination ore bodies of the Beishan mine were formed through replacement and crystallization of the mixed fluids generated by mixing of the ascending high-temperature boiling fluid with young crustal fluid whereas the melnicovite-dominated sulfide-quartz veins were formed subsequently by filling of the high-temperature ore fluid in fissures. Pyrrhotite-dominated sulfide-quartz veins in the Nanshan mine were formed by filling-deposition-crystallization of the moderate-temperature ore fluids and the pure sulfide veins were formed later by filling-deposition-crystallization of ore substance-rich fluids after boiling of the moderate-temperature ore fluids. The metallogenic dynamic processes can be summarized as

  14. CERTIFICATELESS SIGNATURE AND BLIND SIGNATURE

    Institute of Scientific and Technical Information of China (English)

    Zhang Lei; Zhang Futai

    2008-01-01

    Certificateless public key cryptography is a new paradigm introduced by AI-Riyami and Paterson. It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-based Public Key Cryptography (ID-PKC). Due to the advantages of the certificateless public key cryptography,a new efficient certificateless pairing-based signature scheme is presented,which has some advantages over previous constructions in computational cost. Based on this new signature scheme,a certificateless blind signature scheme is proposed. The security of our schemes is proven based on the hardness of computational Diffie-Hellman problem.

  15. Network motifs in music sequences

    CERN Document Server

    Zanette, Damian H

    2010-01-01

    In this note, I summarize ongoing research on motif distribution in networks built up out of symbolic sequences of Western musical origin. Their motif significance profiles exhibit remarkable consistency over different styles and periods, and define a class that cannot be identified with any of the four "superfamilies" to which most real networks seem to belong. Networks from music sequences possess an unusual abundance of bidirectional connections, due to the inherent reversibility of short musical note patterns. This property contributes to motif significance from both local and large-scale features of musical structure.

  16. Classification of signature-only signature models

    Institute of Scientific and Technical Information of China (English)

    CAO ZhengJun; LIU MuLan

    2008-01-01

    We introduce a set of criterions for classifying signature-only signature models. By the criterions, we classify signature models into 5 basic types and 69 general classes. Theoretically, 21141 kinds of signature models can be derived by appro-priately combining different general classes. The result comprises almost existing signature models. It will be helpful for exploring new signature models. To the best of our knowledge, it is the first time for investigation of the problem of classifica-tion of signature-only signature models.

  17. Motif Yggdrasil: sampling sequence motifs from a tree mixture model.

    Science.gov (United States)

    Andersson, Samuel A; Lagergren, Jens

    2007-06-01

    In phylogenetic foot-printing, putative regulatory elements are found in upstream regions of orthologous genes by searching for common motifs. Motifs in different upstream sequences are subject to mutations along the edges of the corresponding phylogenetic tree, consequently taking advantage of the tree in the motif search is an appealing idea. We describe the Motif Yggdrasil sampler; the first Gibbs sampler based on a general tree that uses unaligned sequences. Previous tree-based Gibbs samplers have assumed a star-shaped tree or partially aligned upstream regions. We give a probabilistic model (MY model) describing upstream sequences with regulatory elements and build a Gibbs sampler with respect to this model. The model allows toggling, i.e., the restriction of a position to a subset of nucleotides, but does not require aligned sequences nor edge lengths, which may be difficult to come by. We apply the collapsing technique to eliminate the need to sample nuisance parameters, and give a derivation of the predictive update formula. We show that the MY model improves the modeling of difficult motif instances and that the use of the tree achieves a substantial increase in nucleotide level correlation coefficient both for synthetic data and 37 bacterial lexA genes. We investigate the sensitivity to errors in the tree and show that using random trees MY sampler still has a performance similar to the original version.

  18. RING PROXY SIGNATURES

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of potential signers. The paper also constructs the first concrete ring proxy signature scheme based on the provably secure Schnorr's signatures and two ID-based ring proxy signature schemes. The security analysis is provided as well.

  19. Mutational analysis of the SDD sequence motif of a PRRSV RNA-dependent RNA polymerase.

    Science.gov (United States)

    Zhou, Yan; Zheng, Haihong; Gao, Fei; Tian, Debin; Yuan, Shishan

    2011-09-01

    The subgenomic mRNA transcription and genomic replication of the porcine reproductive and respiratory syndrome virus (PRRSV) are directed by the viral replicase. The replicase is expressed in the form of two polyproteins and is subsequently processed into smaller nonstructural proteins (nsps). nsp9, containing the viral replicase, has characteristic sequence motifs conserved among the RNA-dependent RNA polymerases (RdRp) of positive-strand (PS) RNA viruses. To test whether the conserved SDD motif can tolerate other conserved motifs of RNA viruses and the influence of every residue on RdRp catalytic activity, many amino acids substitutions were introduced into it. Only one nsp9 substitution, of serine by glycine (S3050G), could rescue mutant viruses. The rescued virus was genetically stable. Alteration of either aspartate residue was not tolerated, destroyed the polymerase activity, and abolished virus transcription, but did not eliminate virus replication. We also found that the SDD motif was essentially invariant for the signature sequence of PRRSV RdRp. It could not accommodate other conserved motifs found in other RNA viral polymerases, except the GDD motif, which is conserved in all the other PS RNA viruses. These findings indicated that nidoviruses are evolutionarily related to other PS RNA viruses. Our studies support the idea that the two aspartate residues of the SDD motif are critical and essential for PRRSV transcription and represent a sequence variant of the GDD motif in PS RNA viruses.

  20. Reference: TCA1MOTIF [PLACE

    Lifescience Database Archive (English)

    Full Text Available TCA1MOTIF Goldsbrough AP, Albrecht H, Stratford R Salicylic acid-inducible binding ...of a tobacco nuclear protein to a 10 bp sequence which is highly conserved amongst stress-inducible genes. Plant J 3:563-571 (1993) PubMed: 8220463; ...

  1. Main: TCA1MOTIF [PLACE

    Lifescience Database Archive (English)

    Full Text Available TCA1MOTIF S000159 17-May-1998 (last modified) kehi TCA-1 (tobacco nuclear protein 1...) binding site; Related to salicylic acid-inducible expression of many genes; Found in barley beta-1,3-gluca...nase and over 30 different plant genes which are known to be induced by one or more forms of stress; A similar sequence (TCA... et al., 1997); SA; salicylic acid; stress; TCA-1; barley (Hordeum vulgare); tobacco (Nicotiana tabacum); TCATCTTCTT ...

  2. Comprehensive discovery of DNA motifs in 349 human cells and tissues reveals new features of motifs.

    Science.gov (United States)

    Zheng, Yiyu; Li, Xiaoman; Hu, Haiyan

    2015-01-01

    Comprehensive motif discovery under experimental conditions is critical for the global understanding of gene regulation. To generate a nearly complete list of human DNA motifs under given conditions, we employed a novel approach to de novo discover significant co-occurring DNA motifs in 349 human DNase I hypersensitive site datasets. We predicted 845 to 1325 motifs in each dataset, for a total of 2684 non-redundant motifs. These 2684 motifs contained 54.02 to 75.95% of the known motifs in seven large collections including TRANSFAC. In each dataset, we also discovered 43 663 to 2 013 288 motif modules, groups of motifs with their binding sites co-occurring in a significant number of short DNA regions. Compared with known interacting transcription factors in eight resources, the predicted motif modules on average included 84.23% of known interacting motifs. We further showed new features of the predicted motifs, such as motifs enriched in proximal regions rarely overlapped with motifs enriched in distal regions, motifs enriched in 5' distal regions were often enriched in 3' distal regions, etc. Finally, we observed that the 2684 predicted motifs classified the cell or tissue types of the datasets with an accuracy of 81.29%. The resources generated in this study are available at http://server.cs.ucf.edu/predrem/.

  3. E1DS: catalytic site prediction based on 1D signatures of concurrent conservation

    OpenAIRE

    2008-01-01

    Large-scale automatic annotation of protein sequences remains challenging in postgenomics era. E1DS is designed for annotating enzyme sequences based on a repository of 1D signatures. The employed sequence signatures are derived using a novel pattern mining approach that discovers long motifs consisted of several sequential blocks (conserved segments). Each of the sequential blocks is considerably conserved among the protein members of an EC group. Moreover, a signature includes at least thre...

  4. Mutations at the Signature Sequence of CFTR Create a Cd2+-gated Chloride Channel

    OpenAIRE

    Wang, Xiaohui; Bompadre, Silvia G.; Li, Min; Hwang, Tzyh-Chang

    2009-01-01

    The canonical sequence LSGGQ, also known as the signature sequence, defines the adenosine triphosphate (ATP)-binding cassette transporter superfamily. Crystallographic studies reveal that the signature sequence, together with the Walker A and Walker B motifs, forms the ATP-binding pocket upon dimerization of the two nucleotide-binding domains (NBDs) in a head-to-tail configuration. The importance of the signature sequence is attested by the fact that a glycine to aspartate mutation (i.e., G55...

  5. Statistical tests to compare motif count exceptionalities

    Directory of Open Access Journals (Sweden)

    Vandewalle Vincent

    2007-03-01

    Full Text Available Abstract Background Finding over- or under-represented motifs in biological sequences is now a common task in genomics. Thanks to p-value calculation for motif counts, exceptional motifs are identified and represent candidate functional motifs. The present work addresses the related question of comparing the exceptionality of one motif in two different sequences. Just comparing the motif count p-values in each sequence is indeed not sufficient to decide if this motif is significantly more exceptional in one sequence compared to the other one. A statistical test is required. Results We develop and analyze two statistical tests, an exact binomial one and an asymptotic likelihood ratio test, to decide whether the exceptionality of a given motif is equivalent or significantly different in two sequences of interest. For that purpose, motif occurrences are modeled by Poisson processes, with a special care for overlapping motifs. Both tests can take the sequence compositions into account. As an illustration, we compare the octamer exceptionalities in the Escherichia coli K-12 backbone versus variable strain-specific loops. Conclusion The exact binomial test is particularly adapted for small counts. For large counts, we advise to use the likelihood ratio test which is asymptotic but strongly correlated with the exact binomial test and very simple to use.

  6. rMotifGen: random motif generator for DNA and protein sequences

    Directory of Open Access Journals (Sweden)

    Hardin C Timothy

    2007-08-01

    Full Text Available Abstract Background Detection of short, subtle conserved motif regions within a set of related DNA or amino acid sequences can lead to discoveries about important regulatory domains such as transcription factor and DNA binding sites as well as conserved protein domains. In order to help assess motif detection algorithms on motifs with varying properties and levels of conservation, we have developed a computational tool, rMotifGen, with the sole purpose of generating a number of random DNA or protein sequences containing short sequence motifs. Each motif consensus can be user-defined, randomly generated, or created from a position-specific scoring matrix (PSSM. Insertions and mutations within these motifs are created according to user-defined parameters and substitution matrices. The resulting sequences can be helpful in mutational simulations and in testing the limits of motif detection algorithms. Results Two implementations of rMotifGen have been created, one providing a graphical user interface (GUI for random motif construction, and the other serving as a command line interface. The second implementation has the added advantages of platform independence and being able to be called in a batch mode. rMotifGen was used to construct sample sets of sequences containing DNA motifs and amino acid motifs that were then tested against the Gibbs sampler and MEME packages. Conclusion rMotifGen provides an efficient and convenient method for creating random DNA or amino acid sequences with a variable number of motifs, where the instance of each motif can be incorporated using a position-specific scoring matrix (PSSM or by creating an instance mutated from its corresponding consensus using an evolutionary model based on substitution matrices. rMotifGen is freely available at: http://bioinformatics.louisville.edu/brg/rMotifGen/.

  7. Efficient Threshold Signature Scheme

    Directory of Open Access Journals (Sweden)

    Sattar J Aboud

    2012-01-01

    Full Text Available In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length of the RSA signature modulus. Also, the signing process of the proposed scheme is more efficient in terms of time complexity and interaction.

  8. About group digital signatures

    Directory of Open Access Journals (Sweden)

    Adriana Cristina Enache

    2012-09-01

    Full Text Available

    Group signatures try to combine security (no framing, no cheating and privacy(anonymity, unlinkability.A group digital signature is a digital signature with enhanced privacy features that allows members of a given group to anonymously sign messages on behalf of the group, producing a group signature. However, in the case of dispute the identity of the signature's originator can be revealed by a designated entity (group manager. The present paper describes the main concepts about group signatures, along with a brief state of the art and shows a personal cryptographic library implemented in Java that includes two group signatures.

  9. Quantum threshold group signature

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signature is a solution to this problem. Generally speaking, as an authority which can be trusted by all members does not exist, a threshold signature scheme without a trusted party appears more attractive. Following some ideas of the classical Shamir’s threshold signature scheme, a quantum threshold group signature one is proposed. In the proposed scheme, only t or more of n persons in the group can generate the group signature and any t-1 or fewer ones cannot do that. In the verification phase, any t or more of n signature receivers can verify the message and any t-1 or fewer receivers cannot verify the validity of the signature.

  10. MSDmotif: exploring protein sites and motifs

    Directory of Open Access Journals (Sweden)

    Henrick Kim

    2008-07-01

    Full Text Available Abstract Background Protein structures have conserved features – motifs, which have a sufficient influence on the protein function. These motifs can be found in sequence as well as in 3D space. Understanding of these fragments is essential for 3D structure prediction, modelling and drug-design. The Protein Data Bank (PDB is the source of this information however present search tools have limited 3D options to integrate protein sequence with its 3D structure. Results We describe here a web application for querying the PDB for ligands, binding sites, small 3D structural and sequence motifs and the underlying database. Novel algorithms for chemical fragments, 3D motifs, ϕ/ψ sequences, super-secondary structure motifs and for small 3D structural motif associations searches are incorporated. The interface provides functionality for visualization, search criteria creation, sequence and 3D multiple alignment options. MSDmotif is an integrated system where a results page is also a search form. A set of motif statistics is available for analysis. This set includes molecule and motif binding statistics, distribution of motif sequences, occurrence of an amino-acid within a motif, correlation of amino-acids side-chain charges within a motif and Ramachandran plots for each residue. The binding statistics are presented in association with properties that include a ligand fragment library. Access is also provided through the distributed Annotation System (DAS protocol. An additional entry point facilitates XML requests with XML responses. Conclusion MSDmotif is unique by combining chemical, sequence and 3D data in a single search engine with a range of search and visualisation options. It provides multiple views of data found in the PDB archive for exploring protein structures.

  11. Assessment of composite motif discovery methods

    Directory of Open Access Journals (Sweden)

    Johansen Jostein

    2008-02-01

    Full Text Available Abstract Background Computational discovery of regulatory elements is an important area of bioinformatics research and more than a hundred motif discovery methods have been published. Traditionally, most of these methods have addressed the problem of single motif discovery – discovering binding motifs for individual transcription factors. In higher organisms, however, transcription factors usually act in combination with nearby bound factors to induce specific regulatory behaviours. Hence, recent focus has shifted from single motifs to the discovery of sets of motifs bound by multiple cooperating transcription factors, so called composite motifs or cis-regulatory modules. Given the large number and diversity of methods available, independent assessment of methods becomes important. Although there have been several benchmark studies of single motif discovery, no similar studies have previously been conducted concerning composite motif discovery. Results We have developed a benchmarking framework for composite motif discovery and used it to evaluate the performance of eight published module discovery tools. Benchmark datasets were constructed based on real genomic sequences containing experimentally verified regulatory modules, and the module discovery programs were asked to predict both the locations of these modules and to specify the single motifs involved. To aid the programs in their search, we provided position weight matrices corresponding to the binding motifs of the transcription factors involved. In addition, selections of decoy matrices were mixed with the genuine matrices on one dataset to test the response of programs to varying levels of noise. Conclusion Although some of the methods tested tended to score somewhat better than others overall, there were still large variations between individual datasets and no single method performed consistently better than the rest in all situations. The variation in performance on individual

  12. Fitness for synchronization of network motifs

    DEFF Research Database (Denmark)

    Vega, Y.M.; Vázquez-Prada, M.; Pacheco, A.F.

    2004-01-01

    We study the synchronization of Kuramoto's oscillators in small parts of networks known as motifs. We first report on the system dynamics for the case of a scale-free network and show the existence of a non-trivial critical point. We compute the probability that network motifs synchronize, and fi...

  13. Helix-packing motifs in membrane proteins.

    Science.gov (United States)

    Walters, R F S; DeGrado, W F

    2006-09-12

    The fold of a helical membrane protein is largely determined by interactions between membrane-imbedded helices. To elucidate recurring helix-helix interaction motifs, we dissected the crystallographic structures of membrane proteins into a library of interacting helical pairs. The pairs were clustered according to their three-dimensional similarity (rmsd universe of common transmembrane helix-pairing motifs is relatively simple. The largest cluster, which comprises 29% of the library members, consists of an antiparallel motif with left-handed packing angles, and it is frequently stabilized by packing of small side chains occurring every seven residues in the sequence. Right-handed parallel and antiparallel structures show a similar tendency to segregate small residues to the helix-helix interface but spaced at four-residue intervals. Position-specific sequence propensities were derived for the most populated motifs. These structural and sequential motifs should be quite useful for the design and structural prediction of membrane proteins.

  14. Generalized Group Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The concept of generalized group signature scheme will bepresent. Based on the generalized secret sharing scheme proposed by Lin and Ha rn, a non-interactive approach is designed for realizing such generalized group signature scheme. Using the new scheme, the authorized subsets of the group in w hich the group member can cooperate to produce the valid signature for any messa ge can be randomly specified

  15. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  16. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  17. VARUN: discovering extensible motifs under saturation constraints.

    Science.gov (United States)

    Apostolico, Alberto; Comin, Matteo; Parida, Laxmi

    2010-01-01

    The discovery of motifs in biosequences is frequently torn between the rigidity of the model on one hand and the abundance of candidates on the other hand. In particular, motifs that include wild cards or "don't cares" escalate exponentially with their number, and this gets only worse if a don't care is allowed to stretch up to some prescribed maximum length. In this paper, a notion of extensible motif in a sequence is introduced and studied, which tightly combines the structure of the motif pattern, as described by its syntactic specification, with the statistical measure of its occurrence count. It is shown that a combination of appropriate saturation conditions and the monotonicity of probabilistic scores over regions of constant frequency afford us significant parsimony in the generation and testing of candidate overrepresented motifs. A suite of software programs called Varun is described, implementing the discovery of extensible motifs of the type considered. The merits of the method are then documented by results obtained in a variety of experiments primarily targeting protein sequence families. Of equal importance seems the fact that the sets of all surprising motifs returned in each experiment are extracted faster and come in much more manageable sizes than would be obtained in the absence of saturation constraints.

  18. Detecting Motifs in System Call Sequences

    CERN Document Server

    Wilson, William O; Aickelin, Uwe

    2010-01-01

    The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pattern identification tool that is able to identify unknown motifs which repeat within time series data. The power of the algorithm is derived from its use of a small number of parameters with minimal assumptions. The algorithm searches from a completely neutral perspective that is independent of the data being analysed, and the underlying motifs. In this paper the motif tracking algorithm is applied to the search for patterns within sequences of low level system calls between the Linux kernel and the operating system's user space. The MTA is able to compress data found in large system call data sets to a limited number of motifs which summarise that data. The motifs provide a resource from which a profile of executed processes can be built. The potential for these profiles and new implications for security research are highlighted. A...

  19. Sephardic signature in haplogroup T mitochondrial DNA.

    Science.gov (United States)

    Bedford, Felice L

    2012-04-01

    A rare combination of mutations within mitochondrial DNA subhaplogroup T2e is identified as affiliated with Sephardic Jews, a group that has received relatively little attention. Four investigations were pursued: Search of the motif in 250 000 control region records across 8 databases, comparison of frequencies of T subhaplogroups (T1, T2b, T2c, T2e, T4, T(*)) across 11 diverse populations, creation of a phylogenic median-joining network from public T2e control region entries, and analysis of one Sephardic mitochondrial full genomic sequence with the motif. It was found that the rare motif belonged only to Sephardic descendents (Turkey, Bulgaria), to inhabitants of North American regions known for secret Spanish-Jewish colonization, or were consistent with Sephardic ancestry. The incidence of subhaplogroup T2e decreased from the Western Arabian Peninsula to Italy to Spain and into Western Europe. The ratio of sister subhaplogroups T2e to T2b was found to vary 40-fold across populations from a low in the British Isles to a high in Saudi Arabia with the ratio in Sephardim more similar to Saudi Arabia, Egypt, and Italy than to hosts Spain and Portugal. Coding region mutations of 2308G and 14499T may locate the Sephardic signature within T2e, but additional samples and reworking of current T2e phylogenetic branch structure is needed. The Sephardic Turkish community has a less pronounced founder effect than some Ashkenazi groups considered singly (eg, Polish), but other comparisons of interest await comparable averaging. Registries of signatures will benefit the study of populations with a large number of smaller-size founders.

  20. A Conserved GPG-Motif in the HIV-1 Nef Core Is Required for Principal Nef-Activities.

    Directory of Open Access Journals (Sweden)

    Marta Martínez-Bonet

    Full Text Available To find out new determinants required for Nef activity we performed a functional alanine scanning analysis along a discrete but highly conserved region at the core of HIV-1 Nef. We identified the GPG-motif, located at the 121-137 region of HIV-1 NL4.3 Nef, as a novel protein signature strictly required for the p56Lck dependent Nef-induced CD4-downregulation in T-cells. Since the Nef-GPG motif was dispensable for CD4-downregulation in HeLa-CD4 cells, Nef/AP-1 interaction and Nef-dependent effects on Tf-R trafficking, the observed effects on CD4 downregulation cannot be attributed to structure constraints or to alterations on general protein trafficking. Besides, we found that the GPG-motif was also required for Nef-dependent inhibition of ring actin re-organization upon TCR triggering and MHCI downregulation, suggesting that the GPG-motif could actively cooperate with the Nef PxxP motif for these HIV-1 Nef-related effects. Finally, we observed that the Nef-GPG motif was required for optimal infectivity of those viruses produced in T-cells. According to these findings, we propose the conserved GPG-motif in HIV-1 Nef as functional region required for HIV-1 infectivity and therefore with a potential interest for the interference of Nef activity during HIV-1 infection.

  1. Hunting Motifs in Situla Art

    Directory of Open Access Journals (Sweden)

    Andrej Preložnik

    2013-07-01

    Full Text Available Situla art developed as an echo of the toreutic style which had spread from the Near East through the Phoenicians, Greeks and Etruscans as far as the Veneti, Raeti, Histri, and their eastern neighbours in the region of Dolenjska (Lower Carniola. An Early Iron Age phenomenon (c. 600—300 BC, it rep- resents the major and most arresting form of the contemporary visual arts in an area stretching from the foot of the Apennines in the south to the Drava and Sava rivers in the east. Indeed, individual pieces have found their way across the Alpine passes and all the way north to the Danube. In the world and art of the situlae, a prominent role is accorded to ani- mals. They are displayed in numerous representations of human activities on artefacts crafted in the classic situla style – that is, between the late 6th  and early 5th centuries BC – as passive participants (e.g. in pageants or in harness or as an active element of the situla narrative. The most typical example of the latter is the hunting scene. Today we know at least four objects decorat- ed exclusively with hunting themes, and a number of situlae and other larger vessels where hunting scenes are embedded in composite narratives. All this suggests a popularity unparallelled by any other genre. Clearly recognisable are various hunting techniques and weapons, each associated with a particu- lar type of game (Fig. 1. The chase of a stag with javelin, horse and hound is depicted on the long- familiar and repeatedly published fibula of Zagorje (Fig. 2. It displays a hound mauling the stag’s back and a hunter on horseback pursuing a hind, her neck already pierced by the javelin. To judge by the (so far unnoticed shaft end un- der the stag’s muzzle, the hunter would have been brandishing a second jave- lin as well, like the warrior of the Vače fibula or the rider of the Nesactium situla, presumably himself a hunter. Many parallels to his motif are known from Greece, Etruria, and

  2. Automated classification of RNA 3D motifs and the RNA 3D Motif Atlas.

    Science.gov (United States)

    Petrov, Anton I; Zirbel, Craig L; Leontis, Neocles B

    2013-10-01

    The analysis of atomic-resolution RNA three-dimensional (3D) structures reveals that many internal and hairpin loops are modular, recurrent, and structured by conserved non-Watson-Crick base pairs. Structurally similar loops define RNA 3D motifs that are conserved in homologous RNA molecules, but can also occur at nonhomologous sites in diverse RNAs, and which often vary in sequence. To further our understanding of RNA motif structure and sequence variability and to provide a useful resource for structure modeling and prediction, we present a new method for automated classification of internal and hairpin loop RNA 3D motifs and a new online database called the RNA 3D Motif Atlas. To classify the motif instances, a representative set of internal and hairpin loops is automatically extracted from a nonredundant list of RNA-containing PDB files. Their structures are compared geometrically, all-against-all, using the FR3D program suite. The loops are clustered into motif groups, taking into account geometric similarity and structural annotations and making allowance for a variable number of bulged bases. The automated procedure that we have implemented identifies all hairpin and internal loop motifs previously described in the literature. All motif instances and motif groups are assigned unique and stable identifiers and are made available in the RNA 3D Motif Atlas (http://rna.bgsu.edu/motifs), which is automatically updated every four weeks. The RNA 3D Motif Atlas provides an interactive user interface for exploring motif diversity and tools for programmatic data access.

  3. Revocable Ring Signature

    Institute of Scientific and Technical Information of China (English)

    Dennis Y. W. Liu; Joseph K. Liu; Yi Mu; Willy Susilo; Duncan S. Wong

    2007-01-01

    Group signature allows the anonymity of a real signer in a group to be revoked by a trusted party called group manager. It also gives the group manager the absolute power of controlling the formation of the group. Ring signature, on the other hand, does not allow anyone to revoke the signer anonymity, while allowing the real signer to forma group (also known as a ring) arbitrarily without being controlled by any other party. In this paper, we propose a new variant for ring signature, called Revocable Ring Signature. The signature allows a real signer to form a ring arbitrarily while allowing a set of authorities to revoke the anonymity of the real signer. This new variant inherits the desirable properties from both group signature and ring signature in such a way that the real signer will be responsible for what it has signed as the anonymity is revocable by authorities while the real signer still has the freedom on ring formation. We provide a formal security model for revocable ring signature and propose an efficient construction which is proven secure under our security model.

  4. Technology of Electronic Signatur

    OpenAIRE

    2004-01-01

    An electronic signature uses a hash of message and an asymetrical algorithm of encryption for its generation. During verification of message on receiver side the hash of original message must be identical with the hash of received message. Electronic message is secured autentization of author and integrity of transmission date. By electronic signature it is possible to sign everything what is in digital form.

  5. Dissection of thousands of cell type-specific enhancers identifies dinucleotide repeat motifs as general enhancer features.

    Science.gov (United States)

    Yáñez-Cuna, J Omar; Arnold, Cosmas D; Stampfel, Gerald; Boryń, Lukasz M; Gerlach, Daniel; Rath, Martina; Stark, Alexander

    2014-07-01

    Gene expression is determined by genomic elements called enhancers, which contain short motifs bound by different transcription factors (TFs). However, how enhancer sequences and TF motifs relate to enhancer activity is unknown, and general sequence requirements for enhancers or comprehensive sets of important enhancer sequence elements have remained elusive. Here, we computationally dissect thousands of functional enhancer sequences from three different Drosophila cell lines. We find that the enhancers display distinct cis-regulatory sequence signatures, which are predictive of the enhancers' cell type-specific or broad activities. These signatures contain transcription factor motifs and a novel class of enhancer sequence elements, dinucleotide repeat motifs (DRMs). DRMs are highly enriched in enhancers, particularly in enhancers that are broadly active across different cell types. We experimentally validate the importance of the identified TF motifs and DRMs for enhancer function and show that they can be sufficient to create an active enhancer de novo from a nonfunctional sequence. The function of DRMs as a novel class of general enhancer features that are also enriched in human regulatory regions might explain their implication in several diseases and provides important insights into gene regulation.

  6. Chaotic motifs in gene regulatory networks.

    Science.gov (United States)

    Zhang, Zhaoyang; Ye, Weiming; Qian, Yu; Zheng, Zhigang; Huang, Xuhui; Hu, Gang

    2012-01-01

    Chaos should occur often in gene regulatory networks (GRNs) which have been widely described by nonlinear coupled ordinary differential equations, if their dimensions are no less than 3. It is therefore puzzling that chaos has never been reported in GRNs in nature and is also extremely rare in models of GRNs. On the other hand, the topic of motifs has attracted great attention in studying biological networks, and network motifs are suggested to be elementary building blocks that carry out some key functions in the network. In this paper, chaotic motifs (subnetworks with chaos) in GRNs are systematically investigated. The conclusion is that: (i) chaos can only appear through competitions between different oscillatory modes with rivaling intensities. Conditions required for chaotic GRNs are found to be very strict, which make chaotic GRNs extremely rare. (ii) Chaotic motifs are explored as the simplest few-node structures capable of producing chaos, and serve as the intrinsic source of chaos of random few-node GRNs. Several optimal motifs causing chaos with atypically high probability are figured out. (iii) Moreover, we discovered that a number of special oscillators can never produce chaos. These structures bring some advantages on rhythmic functions and may help us understand the robustness of diverse biological rhythms. (iv) The methods of dominant phase-advanced driving (DPAD) and DPAD time fraction are proposed to quantitatively identify chaotic motifs and to explain the origin of chaotic behaviors in GRNs.

  7. WebMOTIFS: automated discovery, filtering and scoring of DNA sequence motifs using multiple programs and Bayesian approaches.

    Science.gov (United States)

    Romer, Katherine A; Kayombya, Guy-Richard; Fraenkel, Ernest

    2007-07-01

    WebMOTIFS provides a web interface that facilitates the discovery and analysis of DNA-sequence motifs. Several studies have shown that the accuracy of motif discovery can be significantly improved by using multiple de novo motif discovery programs and using randomized control calculations to identify the most significant motifs or by using Bayesian approaches. WebMOTIFS makes it easy to apply these strategies. Using a single submission form, users can run several motif discovery programs and score, cluster and visualize the results. In addition, the Bayesian motif discovery program THEME can be used to determine the class of transcription factors that is most likely to regulate a set of sequences. Input can be provided as a list of gene or probe identifiers. Used with the default settings, WebMOTIFS accurately identifies biologically relevant motifs from diverse data in several species. WebMOTIFS is freely available at http://fraenkel.mit.edu/webmotifs.

  8. Machine Fault Signature Analysis

    Directory of Open Access Journals (Sweden)

    Pratesh Jayaswal

    2008-01-01

    Full Text Available The objective of this paper is to present recent developments in the field of machine fault signature analysis with particular regard to vibration analysis. The different types of faults that can be identified from the vibration signature analysis are, for example, gear fault, rolling contact bearing fault, journal bearing fault, flexible coupling faults, and electrical machine fault. It is not the intention of the authors to attempt to provide a detailed coverage of all the faults while detailed consideration is given to the subject of the rolling element bearing fault signature analysis.

  9. Are there molecular signatures?

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, W.P.

    1995-10-01

    This report describes molecular signatures and mutational spectrum analysis. The mutation spectrum is defined as the type and location of DNA base change. There are currently about five well documented cases. Mutations and radon-associated tumors are discussed.

  10. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  11. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  12. Structural motifs are closed into cycles in proteins.

    Science.gov (United States)

    Efimov, Alexander V

    2010-08-27

    Beta-hairpins, triple-strand beta-sheets and betaalphabeta-units represent simple structural motifs closed into cycles by systems of hydrogen bonds. Secondary closing of these simple motifs into large cycles by means of different superhelices, split beta-hairpins or SS-bridges results in the formation of more complex structural motifs having unique overall folds and unique handedness such as abcd-units, phi-motifs, five- and seven-segment alpha/beta-motifs. Apparently, the complex structural motifs are more cooperative and stable and this may be one of the main reasons of high frequencies of occurrence of the motifs in proteins.

  13. Functional characterization of variations on regulatory motifs.

    Directory of Open Access Journals (Sweden)

    Michal Lapidot

    2008-03-01

    Full Text Available Transcription factors (TFs regulate gene expression through specific interactions with short promoter elements. The same regulatory protein may recognize a variety of related sequences. Moreover, once they are detected it is hard to predict whether highly similar sequence motifs will be recognized by the same TF and regulate similar gene expression patterns, or serve as binding sites for distinct regulatory factors. We developed computational measures to assess the functional implications of variations on regulatory motifs and to compare the functions of related sites. We have developed computational means for estimating the functional outcome of substituting a single position within a binding site and applied them to a collection of putative regulatory motifs. We predict the effects of nucleotide variations within motifs on gene expression patterns. In cases where such predictions could be compared to suitable published experimental evidence, we found very good agreement. We further accumulated statistics from multiple substitutions across various binding sites in an attempt to deduce general properties that characterize nucleotide substitutions that are more likely to alter expression. We found that substitutions involving Adenine are more likely to retain the expression pattern and that substitutions involving Guanine are more likely to alter expression compared to the rest of the substitutions. Our results should facilitate the prediction of the expression outcomes of binding site variations. One typical important implication is expected to be the ability to predict the phenotypic effect of variation in regulatory motifs in promoters.

  14. Sublinear Time Motif Discovery from Multiple Sequences

    Directory of Open Access Journals (Sweden)

    Yunhui Fu

    2013-10-01

    Full Text Available In this paper, a natural probabilistic model for motif discovery has been used to experimentally test the quality of motif discovery programs. In this model, there are k background sequences, and each character in a background sequence is a random character from an alphabet, Σ. A motif G = g1g2 ... gm is a string of m characters. In each background sequence is implanted a probabilistically-generated approximate copy of G. For a probabilistically-generated approximate copy b1b2 ... bm of G, every character, bi, is probabilistically generated, such that the probability for bi ≠ gi is at most α. We develop two new randomized algorithms and one new deterministic algorithm. They make advancements in the following aspects: (1 The algorithms are much faster than those before. Our algorithms can even run in sublinear time. (2 They can handle any motif pattern. (3 The restriction for the alphabet size is a lower bound of four. This gives them potential applications in practical problems, since gene sequences have an alphabet size of four. (4 All algorithms have rigorous proofs about their performances. The methods developed in this paper have been used in the software implementation. We observed some encouraging results that show improved performance for motif detection compared with other software.

  15. Technology of Electronic Signatur

    Directory of Open Access Journals (Sweden)

    Jaroslav Sadovsky

    2004-01-01

    Full Text Available An electronic signature uses a hash of message and an asymetrical algorithm of encryption for its generation. During verification of message on receiver side the hash of original message must be identical with the hash of received message. Electronic message is secured autentization of author and integrity of transmission date. By electronic signature it is possible to sign everything what is in digital form.

  16. Stateless Transitive Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    MA Chun-guang; CAI Man-chun; YANG Yi-xian

    2004-01-01

    A new practical method is introduced to transform the stateful transitive signature scheme to stateless one without the loss of security. According to the approach, two concrete stateless transitive signature schemes based on Factoring and RSA are presented respectively. Under the assumption of the hardness of factoring and one-more- RSA-inversion problem, both two schemes are secure under the adaptive chosen-message attacks in random oracle model.

  17. Potent Inhibition of HIV-1 Reverse Transcriptase and Replication by Nonpseudoknot, "UCAA-motif" RNA Aptamers.

    Science.gov (United States)

    Whatley, Angela S; Ditzler, Mark A; Lange, Margaret J; Biondi, Elisa; Sawyer, Andrew W; Chang, Jonathan L; Franken, Joshua D; Burke, Donald H

    2013-02-05

    RNA aptamers that bind the reverse transcriptase (RT) of human immunodeficiency virus (HIV) compete with nucleic acid primer/template for access to RT, inhibit RT enzymatic activity in vitro, and suppress viral replication when expressed in human cells. Numerous pseudoknot aptamers have been identified by sequence analysis, but relatively few have been confirmed experimentally. In this work, a screen of nearly 100 full-length and >60 truncated aptamer transcripts established the predictive value of the F1Pk and F2Pk pseudoknot signature motifs. The screen also identified a new, nonpseudoknot motif with a conserved unpaired UCAA element. High-throughput sequence (HTS) analysis identified 181 clusters capable of forming this novel element. Comparative sequence analysis, enzymatic probing and RT inhibition by aptamer variants established the essential requirements of the motif, which include two conserved base pairs (AC/GU) on the 5' side of the unpaired UCAA. Aptamers in this family inhibit RT in primer extension assays with IC(50) values in the low nmol/l range, and they suppress viral replication with a potency that is comparable with that of previously studied aptamers. All three known anti-RT aptamer families (pseudoknots, the UCAA element, and the recently described "(6/5)AL" motif) are therefore suitable for developing aptamer-based antiviral gene therapies.Molecular Therapy - Nucleic Acids (2013) 2, e71; doi:10.1038/mtna.2012.62; published online 5 February 2013.

  18. Sequential motif profile of natural visibility graphs

    CERN Document Server

    Iacovacci, Jacopo

    2016-01-01

    The concept of sequential visibility graph motifs -subgraphs appearing with characteristic frequencies in the visibility graphs associated to time series- has been advanced recently along with a theoretical framework to compute analytically the motif profiles associated to Horizontal Visibility Graphs (HVGs). Here we develop a theory to compute the profile of sequential visibility graph motifs in the context of Natural Visibility Graphs (VGs). This theory gives exact results for deterministic aperiodic processes with a smooth invariant density or stochastic processes that fulfil the Markov property and have a continuous marginal distribution. The framework also allows for a linear time numerical estimation in the case of empirical time series. A comparison between the HVG and the VG case (including evaluation of their robustness for short series polluted with measurement noise) is also presented.

  19. Armadillo motifs involved in vesicular transport.

    Directory of Open Access Journals (Sweden)

    Harald Striegl

    Full Text Available Armadillo (ARM repeat proteins function in various cellular processes including vesicular transport and membrane tethering. They contain an imperfect repeating sequence motif that forms a conserved three-dimensional structure. Recently, structural and functional insight into tethering mediated by the ARM-repeat protein p115 has been provided. Here we describe the p115 ARM-motifs for reasons of clarity and nomenclature and show that both sequence and structure are highly conserved among ARM-repeat proteins. We argue that there is no need to invoke repeat types other than ARM repeats for a proper description of the structure of the p115 globular head region. Additionally, we propose to define a new subfamily of ARM-like proteins and show lack of evidence that the ARM motifs found in p115 are present in other long coiled-coil tethering factors of the golgin family.

  20. Identifying motifs in folktales using topic models

    NARCIS (Netherlands)

    Karsdorp, F.; Bosch, A.P.J. van den

    2013-01-01

    With the undertake of various folktale digitalization initiatives, the need for computational aids to explore these collections is increasing. In this paper we compare Labeled LDA (L-LDA) to a simple retrieval model on the task of identifying motifs in folktales. We show that both methods are well a

  1. Highly scalable Ab initio genomic motif identification

    KAUST Repository

    Marchand, Benoit

    2011-01-01

    We present results of scaling an ab initio motif family identification system, Dragon Motif Finder (DMF), to 65,536 processor cores of IBM Blue Gene/P. DMF seeks groups of mutually similar polynucleotide patterns within a set of genomic sequences and builds various motif families from them. Such information is of relevance to many problems in life sciences. Prior attempts to scale such ab initio motif-finding algorithms achieved limited success. We solve the scalability issues using a combination of mixed-mode MPI-OpenMP parallel programming, master-slave work assignment, multi-level workload distribution, multi-level MPI collectives, and serial optimizations. While the scalability of our algorithm was excellent (94% parallel efficiency on 65,536 cores relative to 256 cores on a modest-size problem), the final speedup with respect to the original serial code exceeded 250,000 when serial optimizations are included. This enabled us to carry out many large-scale ab initio motiffinding simulations in a few hours while the original serial code would have needed decades of execution time. Copyright 2011 ACM.

  2. The Motif of Meeting in Digital Education

    Science.gov (United States)

    Sheail, Philippa

    2015-01-01

    This article draws on theoretical work which considers the composition of meetings, in order to think about the form of the meeting in digital environments for higher education. To explore the motif of meeting, I undertake a "compositional interpretation" (Rose, 2012) of the default interface offered by "Collaborate", an…

  3. Bioactive motifs of agouti signal protein.

    Science.gov (United States)

    Virador, V M; Santis, C; Furumura, M; Kalbacher, H; Hearing, V J

    2000-08-25

    The switch between the synthesis of eu- and pheomelanins is modulated by the interaction of two paracrine signaling molecules, alpha-melanocyte stimulating hormone (MSH) and agouti signal protein (ASP), which interact with melanocytes via the MSH receptor (MC1R). Comparison of the primary sequence of ASP with the known MSH pharmacophore provides no suggestion about the putative bioactive domain(s) of ASP. To identify such bioactive motif(s), we synthesized 15-mer peptides that spanned the primary sequence of ASP and determined their effects on the melanogenic activities of murine melanocytes. Northern and Western blotting were used, together with chemical analysis of melanins and enzymatic assays, to identify three distinct bioactive regions of ASP that down-regulate eumelanogenesis. The decrease in eumelanin production was mediated by down-regulation of mRNA levels for tyrosinase and other melanogenic enzymes, as occurs in vivo, and these effects were comparable to those elicited by intact recombinant ASP. Shorter peptides in those motifs were synthesized and their effects on melanogenesis were further investigated. The amino acid arginine, which is present in the MSH peptide pharmacophore (HFRW), is also in the most active domain of ASP (KVARP). Our data suggest that lysines and an arginine (in motifs such as KxxxxKxxR or KxxRxxxxK) are important for the bioactivity of ASP. Identification of the specific ASP epitope that interacts with the MC1R has potential pharmacological applications in treating dysfunctions of skin pigmentation.

  4. Functionally specified protein signatures distinctive for each of the different blue copper proteins

    Directory of Open Access Journals (Sweden)

    Anishetty Sharmila

    2004-09-01

    Full Text Available Abstract Background Proteins having similar functions from different sources can be identified by the occurrence in their sequences, a conserved cluster of amino acids referred to as pattern, motif, signature or fingerprint. The wide usage of protein sequence analysis in par with the growth of databases signifies the importance of using patterns or signatures to retrieve out related sequences. Blue copper proteins are found in the electron transport chain of prokaryotes and eukaryotes. The signatures already existing in the databases like the type 1 copper blue, multiple copper oxidase, cyt b/b6, photosystem 1 psaA&B, psaG&K, and reiske iron sulphur protein are not specified signatures for blue copper proteins as the name itself suggests. Most profile and motif databases strive to classify protein sequences into a broad spectrum of protein families. This work describes the signatures designed based on the copper metal binding motifs in blue copper proteins. The common feature in all blue copper proteins is a trigonal planar arrangement of two nitrogen ligands [each from histidine] and one sulphur containing thiolate ligand [from cysteine], with strong interactions between the copper center and these ligands. Results Sequences that share such conserved motifs are crucial to the structure or function of the protein and this could provide a signature of family membership. The blue copper proteins chosen for the study were plantacyanin, plastocyanin, cucumber basic protein, stellacyanin, dicyanin, umecyanin, uclacyanin, cusacyanin, rusticyanin, sulfocyanin, halocyanin, azurin, pseudoazurin, amicyanin and nitrite reductase which were identified in both eukaryotes and prokaryotes. ClustalW analysis of the protein sequences of each of the blue copper proteins was the basis for designing protein signatures or peptides. The protein signatures and peptides identified in this study were designed involving the active site region involving the amino acids

  5. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  6. Cyanobacterial signature genes.

    Science.gov (United States)

    Martin, Kirt A; Siefert, Janet L; Yerrapragada, Sailaja; Lu, Yue; McNeill, Thomas Z; Moreno, Pedro A; Weinstock, George M; Widger, William R; Fox, George E

    2003-01-01

    A comparison of 8 cyanobacterial genomes reveals that there are 181 shared genes that do not have obvious orthologs in other bacteria. These signature genes define aspects of the genotype that are uniquely cyanobacterial. Approximately 25% of these genes have been associated with some function. These signature genes may or may not be involved in photosynthesis but likely they will be in many cases. In addition, several examples of widely conserved gene order involving two or more signature genes were observed. This suggests there may be regulatory processes that have been preserved throughout the long history of the cyanobacterial phenotype. The results presented here will be especially useful because they identify which of the many genes of unassigned function are likely to be of the greatest interest.

  7. Parallel motif extraction from very long sequences

    KAUST Repository

    Sahli, Majed

    2013-01-01

    Motifs are frequent patterns used to identify biological functionality in genomic sequences, periodicity in time series, or user trends in web logs. In contrast to a lot of existing work that focuses on collections of many short sequences, modern applications require mining of motifs in one very long sequence (i.e., in the order of several gigabytes). For this case, there exist statistical approaches that are fast but inaccurate; or combinatorial methods that are sound and complete. Unfortunately, existing combinatorial methods are serial and very slow. Consequently, they are limited to very short sequences (i.e., a few megabytes), small alphabets (typically 4 symbols for DNA sequences), and restricted types of motifs. This paper presents ACME, a combinatorial method for extracting motifs from a single very long sequence. ACME arranges the search space in contiguous blocks that take advantage of the cache hierarchy in modern architectures, and achieves almost an order of magnitude performance gain in serial execution. It also decomposes the search space in a smart way that allows scalability to thousands of processors with more than 90% speedup. ACME is the only method that: (i) scales to gigabyte-long sequences; (ii) handles large alphabets; (iii) supports interesting types of motifs with minimal additional cost; and (iv) is optimized for a variety of architectures such as multi-core systems, clusters in the cloud, and supercomputers. ACME reduces the extraction time for an exact-length query from 4 hours to 7 minutes on a typical workstation; handles 3 orders of magnitude longer sequences; and scales up to 16, 384 cores on a supercomputer. Copyright is held by the owner/author(s).

  8. DNA motif elucidation using belief propagation

    KAUST Repository

    Wong, Ka-Chun

    2013-06-29

    Protein-binding microarray (PBM) is a high-throughout platform that can measure the DNA-binding preference of a protein in a comprehensive and unbiased manner. A typical PBM experiment can measure binding signal intensities of a protein to all the possible DNA k-mers (k = 8 ?10); such comprehensive binding affinity data usually need to be reduced and represented as motif models before they can be further analyzed and applied. Since proteins can often bind to DNA in multiple modes, one of the major challenges is to decompose the comprehensive affinity data into multimodal motif representations. Here, we describe a new algorithm that uses Hidden Markov Models (HMMs) and can derive precise and multimodal motifs using belief propagations. We describe an HMM-based approach using belief propagations (kmerHMM), which accepts and preprocesses PBM probe raw data into median-binding intensities of individual k-mers. The k-mers are ranked and aligned for training an HMM as the underlying motif representation. Multiple motifs are then extracted from the HMM using belief propagations. Comparisons of kmerHMM with other leading methods on several data sets demonstrated its effectiveness and uniqueness. Especially, it achieved the best performance on more than half of the data sets. In addition, the multiple binding modes derived by kmerHMM are biologically meaningful and will be useful in interpreting other genome-wide data such as those generated from ChIP-seq. The executables and source codes are available at the authors\\' websites: e.g. http://www.cs.toronto.edu/?wkc/kmerHMM. 2013 The Author(s).

  9. DNA motif elucidation using belief propagation.

    Science.gov (United States)

    Wong, Ka-Chun; Chan, Tak-Ming; Peng, Chengbin; Li, Yue; Zhang, Zhaolei

    2013-09-01

    Protein-binding microarray (PBM) is a high-throughout platform that can measure the DNA-binding preference of a protein in a comprehensive and unbiased manner. A typical PBM experiment can measure binding signal intensities of a protein to all the possible DNA k-mers (k=8∼10); such comprehensive binding affinity data usually need to be reduced and represented as motif models before they can be further analyzed and applied. Since proteins can often bind to DNA in multiple modes, one of the major challenges is to decompose the comprehensive affinity data into multimodal motif representations. Here, we describe a new algorithm that uses Hidden Markov Models (HMMs) and can derive precise and multimodal motifs using belief propagations. We describe an HMM-based approach using belief propagations (kmerHMM), which accepts and preprocesses PBM probe raw data into median-binding intensities of individual k-mers. The k-mers are ranked and aligned for training an HMM as the underlying motif representation. Multiple motifs are then extracted from the HMM using belief propagations. Comparisons of kmerHMM with other leading methods on several data sets demonstrated its effectiveness and uniqueness. Especially, it achieved the best performance on more than half of the data sets. In addition, the multiple binding modes derived by kmerHMM are biologically meaningful and will be useful in interpreting other genome-wide data such as those generated from ChIP-seq. The executables and source codes are available at the authors' websites: e.g. http://www.cs.toronto.edu/∼wkc/kmerHMM.

  10. Ab initio coordination chemistry for nickel chelation motifs.

    Science.gov (United States)

    Sudan, R Jesu Jaya; Kumari, J Lesitha Jeeva; Sudandiradoss, C

    2015-01-01

    Chelation therapy is one of the most appreciated methods in the treatment of metal induced disease predisposition. Coordination chemistry provides a way to understand metal association in biological structures. In this work we have implemented coordination chemistry to study nickel coordination due to its high impact in industrial usage and thereby health consequences. This paper reports the analysis of nickel coordination from a large dataset of nickel bound structures and sequences. Coordination patterns predicted from the structures are reported in terms of donors, chelate length, coordination number, chelate geometry, structural fold and architecture. The analysis revealed histidine as the most favored residue in nickel coordination. The most common chelates identified were histidine based namely HHH, HDH, HEH and HH spaced at specific intervals. Though a maximum coordination number of 8 was observed, the presence of a single protein donor was noted to be mandatory in nickel coordination. The coordination pattern did not reveal any specific fold, nevertheless we report preferable residue spacing for specific structural architecture. In contrast, the analysis of nickel binding proteins from bacterial and archeal species revealed no common coordination patterns. Nickel binding sequence motifs were noted to be organism specific and protein class specific. As a result we identified about 13 signatures derived from 13 classes of nickel binding proteins. The specifications on nickel coordination presented in this paper will prove beneficial for developing better chelation strategies.

  11. Ab initio coordination chemistry for nickel chelation motifs.

    Directory of Open Access Journals (Sweden)

    R Jesu Jaya Sudan

    Full Text Available Chelation therapy is one of the most appreciated methods in the treatment of metal induced disease predisposition. Coordination chemistry provides a way to understand metal association in biological structures. In this work we have implemented coordination chemistry to study nickel coordination due to its high impact in industrial usage and thereby health consequences. This paper reports the analysis of nickel coordination from a large dataset of nickel bound structures and sequences. Coordination patterns predicted from the structures are reported in terms of donors, chelate length, coordination number, chelate geometry, structural fold and architecture. The analysis revealed histidine as the most favored residue in nickel coordination. The most common chelates identified were histidine based namely HHH, HDH, HEH and HH spaced at specific intervals. Though a maximum coordination number of 8 was observed, the presence of a single protein donor was noted to be mandatory in nickel coordination. The coordination pattern did not reveal any specific fold, nevertheless we report preferable residue spacing for specific structural architecture. In contrast, the analysis of nickel binding proteins from bacterial and archeal species revealed no common coordination patterns. Nickel binding sequence motifs were noted to be organism specific and protein class specific. As a result we identified about 13 signatures derived from 13 classes of nickel binding proteins. The specifications on nickel coordination presented in this paper will prove beneficial for developing better chelation strategies.

  12. Motifs, themes and thematic maps of an integrated Saccharomyces cerevisiae interaction network

    Directory of Open Access Journals (Sweden)

    Andrews Brenda

    2005-06-01

    Full Text Available Abstract Background Large-scale studies have revealed networks of various biological interaction types, such as protein-protein interaction, genetic interaction, transcriptional regulation, sequence homology, and expression correlation. Recurring patterns of interconnection, or 'network motifs', have revealed biological insights for networks containing either one or two types of interaction. Results To study more complex relationships involving multiple biological interaction types, we assembled an integrated Saccharomyces cerevisiae network in which nodes represent genes (or their protein products and differently colored links represent the aforementioned five biological interaction types. We examined three- and four-node interconnection patterns containing multiple interaction types and found many enriched multi-color network motifs. Furthermore, we showed that most of the motifs form 'network themes' – classes of higher-order recurring interconnection patterns that encompass multiple occurrences of network motifs. Network themes can be tied to specific biological phenomena and may represent more fundamental network design principles. Examples of network themes include a pair of protein complexes with many inter-complex genetic interactions – the 'compensatory complexes' theme. Thematic maps – networks rendered in terms of such themes – can simplify an otherwise confusing tangle of biological relationships. We show this by mapping the S. cerevisiae network in terms of two specific network themes. Conclusion Significantly enriched motifs in an integrated S. cerevisiae interaction network are often signatures of network themes, higher-order network structures that correspond to biological phenomena. Representing networks in terms of network themes provides a useful simplification of complex biological relationships.

  13. A discriminative approach for unsupervised clustering of DNA sequence motifs.

    Directory of Open Access Journals (Sweden)

    Philip Stegmaier

    Full Text Available Algorithmic comparison of DNA sequence motifs is a problem in bioinformatics that has received increased attention during the last years. Its main applications concern characterization of potentially novel motifs and clustering of a motif collection in order to remove redundancy. Despite growing interest in motif clustering, the question which motif clusters to aim at has so far not been systematically addressed. Here we analyzed motif similarities in a comprehensive set of vertebrate transcription factor classes. For this we developed enhanced similarity scores by inclusion of the information coverage (IC criterion, which evaluates the fraction of information an alignment covers in aligned motifs. A network-based method enabled us to identify motif clusters with high correspondence to DNA-binding domain phylogenies and prior experimental findings. Based on this analysis we derived a set of motif families representing distinct binding specificities. These motif families were used to train a classifier which was further integrated into a novel algorithm for unsupervised motif clustering. Application of the new algorithm demonstrated its superiority to previously published methods and its ability to reproduce entrained motif families. As a result, our work proposes a probabilistic approach to decide whether two motifs represent common or distinct binding specificities.

  14. Statistical clumped isotope signatures

    NARCIS (Netherlands)

    Röckmann, T.; Popa, M. E.; Krol, M. C.; Hofmann, M. E. G.

    2016-01-01

    High precision measurements of molecules containing more than one heavy isotope may provide novel constraints on element cycles in nature. These so-called clumped isotope signatures are reported relative to the random (stochastic) distribution of heavy isotopes over all available isotopocules of a m

  15. Signature transition and compactification

    CERN Document Server

    Mohseni, M

    2000-01-01

    It is shown that a change in the signature of the space-time metric together with compactification of internal dimensions could occure in a six-dimensional cosmological model. We also show that this is due to interaction with Maxwell fields having support in the internal part of the space-time.

  16. Signatures of the Invisible

    CERN Multimedia

    Strom, D

    2003-01-01

    On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).

  17. Collider signatures of hylogenesis

    Science.gov (United States)

    Demidov, S. V.; Gorbunov, D. S.; Kirpichnikov, D. V.

    2015-02-01

    We consider collider signatures of the hylogenesis—a variant of the antibaryonic dark matter model. We obtain bounds on the model parameters from results of the first LHC run. Also we suggest several new channels relevant for probing the antibaryonic dark matter at LHC.

  18. Collider signatures of Hylogenesis

    CERN Document Server

    Demidov, S V; Kirpichnikov, D V

    2014-01-01

    We consider collider signatures of the hylogenesis --- a variant of antibaryonic dark matter model. We obtain bounds on the model parameters from results of the first LHC run. Also we suggest several new channels relevant for probing the antibaryonic dark matter at LHC.

  19. Using SCOPE to identify potential regulatory motifs in coregulated genes.

    Science.gov (United States)

    Martyanov, Viktor; Gross, Robert H

    2011-05-31

    SCOPE is an ensemble motif finder that uses three component algorithms in parallel to identify potential regulatory motifs by over-representation and motif position preference. Each component algorithm is optimized to find a different kind of motif. By taking the best of these three approaches, SCOPE performs better than any single algorithm, even in the presence of noisy data. In this article, we utilize a web version of SCOPE to examine genes that are involved in telomere maintenance. SCOPE has been incorporated into at least two other motif finding programs and has been used in other studies. The three algorithms that comprise SCOPE are BEAM, which finds non-degenerate motifs (ACCGGT), PRISM, which finds degenerate motifs (ASCGWT), and SPACER, which finds longer bipartite motifs (ACCnnnnnnnnGGT). These three algorithms have been optimized to find their corresponding type of motif. Together, they allow SCOPE to perform extremely well. Once a gene set has been analyzed and candidate motifs identified, SCOPE can look for other genes that contain the motif which, when added to the original set, will improve the motif score. This can occur through over-representation or motif position preference. Working with partial gene sets that have biologically verified transcription factor binding sites, SCOPE was able to identify most of the rest of the genes also regulated by the given transcription factor. Output from SCOPE shows candidate motifs, their significance, and other information both as a table and as a graphical motif map. FAQs and video tutorials are available at the SCOPE web site which also includes a "Sample Search" button that allows the user to perform a trial run. Scope has a very friendly user interface that enables novice users to access the algorithm's full power without having to become an expert in the bioinformatics of motif finding. As input, SCOPE can take a list of genes, or FASTA sequences. These can be entered in browser text fields, or read from

  20. Bases of motifs for generating repeated patterns with wild cards

    OpenAIRE

    Pisanti, Nadia; Crochemore, Maxime; Grossi, Roberto; Sagot, Marie-France

    2005-01-01

    Motif inference represents one of the most important areas of research in computational biology, and one of its oldest ones. Despite this, the problem remains very much open in the sense that no existing definition is fully satisfying, either in formal terms, or in relation to the biological questions that involve finding such motifs. Two main types of motifs have been considered in the literature: matrices (of letter frequency per position in the motif) and patterns. There is no conclusive e...

  1. On Mechanism of Signature Inversion

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    <正>The signature is associated with the invariance of a system with intrinsic quadrupole deformation under a rotation of 180° around a principal axis, and is defined in the cranking model. The signature

  2. Anticipated synchronization in neuronal network motifs

    Science.gov (United States)

    Matias, F. S.; Gollo, L. L.; Carelli, P. V.; Copelli, M.; Mirasso, C. R.

    2013-01-01

    Two identical dynamical systems coupled unidirectionally (in a so called master-slave configuration) exhibit anticipated synchronization (AS) if the one which receives the coupling (the slave) also receives a negative delayed self-feedback. In oscillatory neuronal systems AS is characterized by a phase-locking with negative time delay τ between the spikes of the master and of the slave (slave fires before the master), while in the usual delayed synchronization (DS) regime τ is positive (slave fires after the master). A 3-neuron motif in which the slave self-feedback is replaced by a feedback loop mediated by an interneuron can exhibits both AS and DS regimes. Here we show that AS is robust in the presence of noise in a 3 Hodgkin-Huxley type neuronal motif. We also show that AS is stable for large values of τ in a chain of connected slaves-interneurons.

  3. Chiral Alkyl Halides: Underexplored Motifs in Medicine

    Directory of Open Access Journals (Sweden)

    Bálint Gál

    2016-11-01

    Full Text Available While alkyl halides are valuable intermediates in synthetic organic chemistry, their use as bioactive motifs in drug discovery and medicinal chemistry is rare in comparison. This is likely attributable to the common misconception that these compounds are merely non-specific alkylators in biological systems. A number of chlorinated compounds in the pharmaceutical and food industries, as well as a growing number of halogenated marine natural products showing unique bioactivity, illustrate the role that chiral alkyl halides can play in drug discovery. Through a series of case studies, we demonstrate in this review that these motifs can indeed be stable under physiological conditions, and that halogenation can enhance bioactivity through both steric and electronic effects. Our hope is that, by placing such compounds in the minds of the chemical community, they may gain more traction in drug discovery and inspire more synthetic chemists to develop methods for selective halogenation.

  4. MINER: software for phylogenetic motif identification

    OpenAIRE

    La, David; Livesay, Dennis R.

    2005-01-01

    MINER is web-based software for phylogenetic motif (PM) identification. PMs are sequence regions (fragments) that conserve the overall familial phylogeny. PMs have been shown to correspond to a wide variety of catalytic regions, substrate-binding sites and protein interfaces, making them ideal functional site predictions. The MINER output provides an intuitive interface for interactive PM sequence analysis and structural visualization. The web implementation of MINER is freely available at . ...

  5. MENGUNGKAP SEJARAH DAN MOTIF BATIK SEMARANGAN

    Directory of Open Access Journals (Sweden)

    Dewi Yuliati

    2011-10-01

    Full Text Available Batik Semarang was born in line with the needs of the people of Hyderabad of the material with a new motif or style tailored to the taste, intention, and creativity of the craftsmen. Batik is a combination of several countries influence developing in Indonesian culture. Based on its shape, Batik designs can be divided into two major groups, namely geometric and non-Geometric. The development of Semarangan batik was due to the fact that certain motif of batik can only be worn by certain people, not for all group of people. Batik semarangan craftments are found in coastal regions. It displays the design composing of ornaments plucked from marine environment. Indonesian Batik develops not only to display a blending of court Batik designs with the coastal Batik technique, but also to incorporate other ornaments which come from many various ethnic groups in Indonesia.   Key words: batik, history, ornaments, marine environment, designs   Batik Semarang lahirkan sejalan dengan kebutuhan dari orang-orang dari Hyderabad akan bahan dengan motif atau gaya baru yang berdasarkan pada rasa, niat, dan kreatifitas dari pembuatnya. Batik merupakan perpaduan dari pengaruh beberapa negara yang berkembang dalam budaya Indonesia. Ditinjau dari desainnya, desain batik dapat dibagi menjadi dua kelompok utama, yakni geometrik dan nongeometrik. Pengembangan yang dilakukan terhadap batik semarangan disebabkan adanya beberapa motif batik yang hanya digunakan oleh kalangan tertentu, dan tidak boleh untuk kalangan umum. Pengrajin batik Semarangan berkembang di kawasan pesisir. Ia menampilkan desain yang terdiri atas berbagai ornamen yang menunjukkan ciri khas kemaritiman. Batik ini dikembangakan tidak hanya menampilkan desain batik khas pesisiran, tetapi juga memasukkan berbagai ornament dari beragam kelompok etnis di Indonesia.   Kata kunci: batik, sejarah, ragam hias, lingkungan pesisir, desain  

  6. Social Network Analysis Based on Network Motifs

    OpenAIRE

    2014-01-01

    Based on the community structure characteristics, theory, and methods of frequent subgraph mining, network motifs findings are firstly introduced into social network analysis; the tendentiousness evaluation function and the importance evaluation function are proposed for effectiveness assessment. Compared with the traditional way based on nodes centrality degree, the new approach can be used to analyze the properties of social network more fully and judge the roles of the nodes effectively. I...

  7. Trading networks, abnormal motifs and stock manipulation

    OpenAIRE

    2012-01-01

    We study trade-based manipulation of stock prices from the perspective of complex trading networks constructed by using detailed information of trades. A stock trading network consists of nodes and directed links, where every trader is a node and a link is formed from one trader to the other if the former sells shares to the latter. Specifically, three abnormal network motifs are investigated, which are found to be formed by a few traders, implying potential intention of price manipulation. W...

  8. Dynamic motifs in socio-economic networks

    Science.gov (United States)

    Zhang, Xin; Shao, Shuai; Stanley, H. Eugene; Havlin, Shlomo

    2014-12-01

    Socio-economic networks are of central importance in economic life. We develop a method of identifying and studying motifs in socio-economic networks by focusing on “dynamic motifs,” i.e., evolutionary connection patterns that, because of “node acquaintances” in the network, occur much more frequently than random patterns. We examine two evolving bi-partite networks: i) the world-wide commercial ship chartering market and ii) the ship build-to-order market. We find similar dynamic motifs in both bipartite networks, even though they describe different economic activities. We also find that “influence” and “persistence” are strong factors in the interaction behavior of organizations. When two companies are doing business with the same customer, it is highly probable that another customer who currently only has business relationship with one of these two companies, will become customer of the second in the future. This is the effect of influence. Persistence means that companies with close business ties to customers tend to maintain their relationships over a long period of time.

  9. Multilayer motif analysis of brain networks

    CERN Document Server

    Battiston, Federico; Chavez, Mario; Latora, Vito

    2016-01-01

    In the last decade network science has shed new light on the anatomical connectivity and on correlations in the activity of different areas of the human brain. The study of brain networks has made possible in fact to detect the central areas of a neural system, and to identify its building blocks by looking at overabundant small subgraphs, known as motifs. However, network analysis of the brain has so far mainly focused on structural and functional networks as separate entities. The recently developed mathematical framework of multi-layer networks allows to perform a multiplex analysis of the human brain where the structural and functional layers are considered at the same time. In this work we describe how to classify subgraphs in multiplex networks, and we extend motif analysis to networks with many layers. We then extract multi-layer motifs in brain networks of healthy subjects by considering networks with two layers, respectively obtained from diffusion and functional magnetic resonance imaging. Results i...

  10. Two Improved Digital Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In this paper, two improved digital signature schemes are presented based on the design of directed signaturescheme [3]. The peculiarity of the system is that only if the scheme is specific recipient, the signature is authenticated.Since the scheme adds the screen of some information parameters, the difficulty of deciphered keys and the security ofdigital signature system are increased.

  11. Large-scale discovery of promoter motifs in Drosophila melanogaster.

    Directory of Open Access Journals (Sweden)

    Thomas A Down

    2007-01-01

    Full Text Available A key step in understanding gene regulation is to identify the repertoire of transcription factor binding motifs (TFBMs that form the building blocks of promoters and other regulatory elements. Identifying these experimentally is very laborious, and the number of TFBMs discovered remains relatively small, especially when compared with the hundreds of transcription factor genes predicted in metazoan genomes. We have used a recently developed statistical motif discovery approach, NestedMICA, to detect candidate TFBMs from a large set of Drosophila melanogaster promoter regions. Of the 120 motifs inferred in our initial analysis, 25 were statistically significant matches to previously reported motifs, while 87 appeared to be novel. Analysis of sequence conservation and motif positioning suggested that the great majority of these discovered motifs are predictive of functional elements in the genome. Many motifs showed associations with specific patterns of gene expression in the D. melanogaster embryo, and we were able to obtain confident annotation of expression patterns for 25 of our motifs, including eight of the novel motifs. The motifs are available through Tiffin, a new database of DNA sequence motifs. We have discovered many new motifs that are overrepresented in D. melanogaster promoter regions, and offer several independent lines of evidence that these are novel TFBMs. Our motif dictionary provides a solid foundation for further investigation of regulatory elements in Drosophila, and demonstrates techniques that should be applicable in other species. We suggest that further improvements in computational motif discovery should narrow the gap between the set of known motifs and the total number of transcription factors in metazoan genomes.

  12. Hybrid Baryon Signatures

    CERN Document Server

    Page, P R

    2000-01-01

    We discuss whether a low-lying hybrid baryon should be defined as a three quark - gluon bound state or as three quarks moving on an excited adiabatic potential. We show that the latter definition becomes exact, not only for very heavy quarks, but also for specific dynamics. We review the literature on the signatures of hybrid baryons, with specific reference to strong hadronic decays, electromagnetic couplings, diffractive production and production in psi decay.

  13. SMAWT Signature Test

    Science.gov (United States)

    1974-10-01

    were generally inversely proportional to the size assesments of the flash and smoke . Table 26 shows the percent of change in average judgments of...Average Time of Gunner’s View Obscuration by Smoke During Firings From the Wood Line .. .. ..... ..... ...... ..... .. 18 7. Average Obscuration Times...of Gunner’s View Obscuration by Smoke - Grass Line 19 8. Normalized Comparisons of the Relative Grades Assigned to Systems Signature Components

  14. ET-Motif: Solving the Exact (l, d)-Planted Motif Problem Using Error Tree Structure.

    Science.gov (United States)

    Al-Okaily, Anas; Huang, Chun-Hsi

    2016-07-01

    Motif finding is an important and a challenging problem in many biological applications such as discovering promoters, enhancers, locus control regions, transcription factors, and more. The (l, d)-planted motif search, PMS, is one of several variations of the problem. In this problem, there are n given sequences over alphabets of size [Formula: see text], each of length m, and two given integers l and d. The problem is to find a motif m of length l, where in each sequence there is at least an l-mer at a Hamming distance of [Formula: see text] of m. In this article, we propose ET-Motif, an algorithm that can solve the PMS problem in [Formula: see text] time and [Formula: see text] space. The time bound can be further reduced by a factor of m with [Formula: see text] space. In case the suffix tree that is built for the input sequences is balanced, the problem can be solved in [Formula: see text] time and [Formula: see text] space. Similarly, the time bound can be reduced by a factor of m using [Formula: see text] space. Moreover, the variations of the problem, namely the edit distance PMS and edited PMS (Quorum), can be solved using ET-Motif with simple modifications but upper bands of space and time. For edit distance PMS, the time and space bounds will be increased by [Formula: see text], while for edited PMS the increase will be of [Formula: see text] in the time bound.

  15. Dynamics of network motifs in genetic regulatory networks

    Institute of Scientific and Technical Information of China (English)

    Li Ying; Liu Zeng-Rong; Zhang Jian-Bao

    2007-01-01

    Network motifs hold a very important status in genetic regulatory networks. This paper aims to analyse the dynamical property of the network motifs in genetic regulatory networks. The main result we obtained is that the dynamical property of a single motif is very simple with only an asymptotically stable equilibrium point, but the combination of several motifs can make more complicated dynamical properties emerge such as limit cycles. The above-mentioned result shows that network motif is a stable substructure in genetic regulatory networks while their combinations make the genetic regulatory network more complicated.

  16. No tradeoff between versatility and robustness in gene circuit motifs

    Science.gov (United States)

    Payne, Joshua L.

    2016-05-01

    Circuit motifs are small directed subgraphs that appear in real-world networks significantly more often than in randomized networks. In the Boolean model of gene circuits, most motifs are realized by multiple circuit genotypes. Each of a motif's constituent circuit genotypes may have one or more functions, which are embodied in the expression patterns the circuit forms in response to specific initial conditions. Recent enumeration of a space of nearly 17 million three-gene circuit genotypes revealed that all circuit motifs have more than one function, with the number of functions per motif ranging from 12 to nearly 30,000. This indicates that some motifs are more functionally versatile than others. However, the individual circuit genotypes that constitute each motif are less robust to mutation if they have many functions, hinting that functionally versatile motifs may be less robust to mutation than motifs with few functions. Here, I explore the relationship between versatility and robustness in circuit motifs, demonstrating that functionally versatile motifs are robust to mutation despite the inherent tradeoff between versatility and robustness at the level of an individual circuit genotype.

  17. CLIMP: Clustering Motifs via Maximal Cliques with Parallel Computing Design.

    Science.gov (United States)

    Zhang, Shaoqiang; Chen, Yong

    2016-01-01

    A set of conserved binding sites recognized by a transcription factor is called a motif, which can be found by many applications of comparative genomics for identifying over-represented segments. Moreover, when numerous putative motifs are predicted from a collection of genome-wide data, their similarity data can be represented as a large graph, where these motifs are connected to one another. However, an efficient clustering algorithm is desired for clustering the motifs that belong to the same groups and separating the motifs that belong to different groups, or even deleting an amount of spurious ones. In this work, a new motif clustering algorithm, CLIMP, is proposed by using maximal cliques and sped up by parallelizing its program. When a synthetic motif dataset from the database JASPAR, a set of putative motifs from a phylogenetic foot-printing dataset, and a set of putative motifs from a ChIP dataset are used to compare the performances of CLIMP and two other high-performance algorithms, the results demonstrate that CLIMP mostly outperforms the two algorithms on the three datasets for motif clustering, so that it can be a useful complement of the clustering procedures in some genome-wide motif prediction pipelines. CLIMP is available at http://sqzhang.cn/climp.html.

  18. RNA structural motif recognition based on least-squares distance.

    Science.gov (United States)

    Shen, Ying; Wong, Hau-San; Zhang, Shaohong; Zhang, Lin

    2013-09-01

    RNA structural motifs are recurrent structural elements occurring in RNA molecules. RNA structural motif recognition aims to find RNA substructures that are similar to a query motif, and it is important for RNA structure analysis and RNA function prediction. In view of this, we propose a new method known as RNA Structural Motif Recognition based on Least-Squares distance (LS-RSMR) to effectively recognize RNA structural motifs. A test set consisting of five types of RNA structural motifs occurring in Escherichia coli ribosomal RNA is compiled by us. Experiments are conducted for recognizing these five types of motifs. The experimental results fully reveal the superiority of the proposed LS-RSMR compared with four other state-of-the-art methods.

  19. CONTEMPORARY USAGE OF TRADITIONAL TURKISH MOTIFS IN PRODUCT DESIGNS

    Directory of Open Access Journals (Sweden)

    Tulay Gumuser

    2012-12-01

    Full Text Available The aim of this study is to identify the traditional Turkish motifs and its relations among present industrial designs. Traditional Turkish motifs played a very important role in 16th century onwards. The arts of the Ottoman Empire were used because of their symbolic meanings and unique styles. When we examine these motifs we encounter; Tiger Stripe, Three Spot (Çintemani, Rumi, Hatayi, Penç, Cloud, Crescent, Star, Crown, Hyacinth, Tulip and Carnation motifs. Nowadays, Turkish designers have begun to use these traditional Turkish motifs in their designs so as to create differences and awareness in the world design. The examples of these industrial designs, using the Turkish motifs, have survived and have Ottoman heritage and historical value. In this study, the Turkish motifs will be examined along with their focus on contemporary Turkish industrial designs used today.

  20. AISMOTIF-An Artificial Immune System for DNA Motif Discovery

    CERN Document Server

    Seeja, K R

    2011-01-01

    Discovery of transcription factor binding sites is a much explored and still exploring area of research in functional genomics. Many computational tools have been developed for finding motifs and each of them has their own advantages as well as disadvantages. Most of these algorithms need prior knowledge about the data to construct background models. However there is not a single technique that can be considered as best for finding regulatory motifs. This paper proposes an artificial immune system based algorithm for finding the transcription factor binding sites or motifs and two new weighted scores for motif evaluation. The algorithm is enumerative, but sufficient pruning of the pattern search space has been incorporated using immune system concepts. The performance of AISMOTIF has been evaluated by comparing it with eight state of art composite motif discovery algorithms and found that AISMOTIF predicts known motifs as well as new motifs from the benchmark dataset without any prior knowledge about the data...

  1. Chaotic motif sampler: detecting motifs from biological sequences by using chaotic neurodynamics

    Science.gov (United States)

    Matsuura, Takafumi; Ikeguchi, Tohru

    Identification of a region in biological sequences, motif extraction problem (MEP) is solved in bioinformatics. However, the MEP is an NP-hard problem. Therefore, it is almost impossible to obtain an optimal solution within a reasonable time frame. To find near optimal solutions for NP-hard combinatorial optimization problems such as traveling salesman problems, quadratic assignment problems, and vehicle routing problems, chaotic search, which is one of the deterministic approaches, has been proposed and exhibits better performance than stochastic approaches. In this paper, we propose a new alignment method that employs chaotic dynamics to solve the MEPs. It is called the Chaotic Motif Sampler. We show that the performance of the Chaotic Motif Sampler is considerably better than that of the conventional methods such as the Gibbs Site Sampler and the Neighborhood Optimization for Multiple Alignment Discovery.

  2. Assessing the Exceptionality of Coloured Motifs in Networks

    Directory of Open Access Journals (Sweden)

    Lacroix Vincent

    2009-01-01

    Full Text Available Various methods have been recently employed to characterise the structure of biological networks. In particular, the concept of network motif and the related one of coloured motif have proven useful to model the notion of a functional/evolutionary building block. However, algorithms that enumerate all the motifs of a network may produce a very large output, and methods to decide which motifs should be selected for downstream analysis are needed. A widely used method is to assess if the motif is exceptional, that is, over- or under-represented with respect to a null hypothesis. Much effort has been put in the last thirty years to derive -values for the frequencies of topological motifs, that is, fixed subgraphs. They rely either on (compound Poisson and Gaussian approximations for the motif count distribution in Erdös-Rényi random graphs or on simulations in other models. We focus on a different definition of graph motifs that corresponds to coloured motifs. A coloured motif is a connected subgraph with fixed vertex colours but unspecified topology. Our work is the first analytical attempt to assess the exceptionality of coloured motifs in networks without any simulation. We first establish analytical formulae for the mean and the variance of the count of a coloured motif in an Erdös-Rényi random graph model. Using simulations under this model, we further show that a Pólya-Aeppli distribution better approximates the distribution of the motif count compared to Gaussian or Poisson distributions. The Pólya-Aeppli distribution, and more generally the compound Poisson distributions, are indeed well designed to model counts of clumping events. Altogether, these results enable to derive a -value for a coloured motif, without spending time on simulations.

  3. Bases of motifs for generating repeated patterns with wild cards.

    Science.gov (United States)

    Pisanti, Nadia; Crochemore, Maxime; Grossi, Roberto; Sagot, Marie-France

    2005-01-01

    Motif inference represents one of the most important areas of research in computational biology, and one of its oldest ones. Despite this, the problem remains very much open in the sense that no existing definition is fully satisfying, either in formal terms, or in relation to the biological questions that involve finding such motifs. Two main types of motifs have been considered in the literature: matrices (of letter frequency per position in the motif) and patterns. There is no conclusive evidence in favor of either, and recent work has attempted to integrate the two types into a single model. In this paper, we address the formal issue in relation to motifs as patterns. This is essential to get at a better understanding of motifs in general. In particular, we consider a promising idea that was recently proposed, which attempted to avoid the combinatorial explosion in the number of motifs by means of a generator set for the motifs. Instead of exhibiting a complete list of motifs satisfying some input constraints, what is produced is a basis of such motifs from which all the other ones can be generated. We study the computational cost of determining such a basis of repeated motifs with wild cards in a sequence. We give new upper and lower bounds on such a cost, introducing a notion of basis that is provably contained in (and, thus, smaller) than previously defined ones. Our basis can be computed in less time and space, and is still able to generate the same set of motifs. We also prove that the number of motifs in all bases defined so far grows exponentially with the quorum, that is, with the minimal number of times a motif must appear in a sequence, something unnoticed in previous work. We show that there is no hope to efficiently compute such bases unless the quorum is fixed.

  4. The MHC motif viewer: a visualization tool for MHC binding motifs

    DEFF Research Database (Denmark)

    Rapin, Nicolas; Hoof, Ilka; Lund, Ole

    2010-01-01

    of peptides, and knowledge of their binding specificities is important for understanding differences in the immune response between individuals. Algorithms predicting which peptides bind a given MHC molecule have recently been developed with high prediction accuracy. The utility of these algorithms...... is hampered by the lack of tools for browsing and comparing specificity of these molecules. We have developed a Web server, MHC Motif Viewer, which allows the display of the binding motif for MHC class I proteins for human, chimpanzee, rhesus monkey, mouse, and swine, as well as HLA-DR protein sequences...

  5. MINER: software for phylogenetic motif identification.

    Science.gov (United States)

    La, David; Livesay, Dennis R

    2005-07-01

    MINER is web-based software for phylogenetic motif (PM) identification. PMs are sequence regions (fragments) that conserve the overall familial phylogeny. PMs have been shown to correspond to a wide variety of catalytic regions, substrate-binding sites and protein interfaces, making them ideal functional site predictions. The MINER output provides an intuitive interface for interactive PM sequence analysis and structural visualization. The web implementation of MINER is freely available at http://www.pmap.csupomona.edu/MINER/. Source code is available to the academic community on request.

  6. DNA motif elucidation using belief propagation

    OpenAIRE

    Wong, Ka-Chun; Chan, Tak-Ming; Peng, Chengbin; Li, Yue; Zhang, Zhaolei

    2013-01-01

    Protein-binding microarray (PBM) is a high-throughout platform that can measure the DNA-binding preference of a protein in a comprehensive and unbiased manner. A typical PBM experiment can measure binding signal intensities of a protein to all the possible DNA k-mers (k = 8 ∼10); such comprehensive binding affinity data usually need to be reduced and represented as motif models before they can be further analyzed and applied. Since proteins can often bind to DNA in multiple modes, one of the ...

  7. On Constructing Certificateless Proxy Signature from Certificateless Signature

    Institute of Scientific and Technical Information of China (English)

    WAN Zhong-mei; LAI Xue-jia; WENG Jian; HONG Xuan; LONG Yu; JIA Wei-wei

    2008-01-01

    In proxy signature schemes,an original signer A delegates its signing capability to a proxy signer B,in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based (ID-based) proxy signature schemes have been proposed,however,the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper,we present a general security model for certificateless proxy signature scheme.Then,we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme,and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme.

  8. Signatures of nonthermal melting

    Directory of Open Access Journals (Sweden)

    Tobias Zier

    2015-09-01

    Full Text Available Intense ultrashort laser pulses can melt crystals in less than a picosecond but, in spite of over thirty years of active research, for many materials it is not known to what extent thermal and nonthermal microscopic processes cause this ultrafast phenomenon. Here, we perform ab-initio molecular-dynamics simulations of silicon on a laser-excited potential-energy surface, exclusively revealing nonthermal signatures of laser-induced melting. From our simulated atomic trajectories, we compute the decay of five structure factors and the time-dependent structure function. We demonstrate how these quantities provide criteria to distinguish predominantly nonthermal from thermal melting.

  9. Signature CERN-URSS

    CERN Document Server

    Jentschke,W

    1975-01-01

    Le DG W.Jentschke souhaite la bienvenue à l'assemblée et aux invités pour la signature du protocole entre le Cern et l'URSS qui est un événement important. C'est en 1955 que 55 visiteurs soviétiques ont visité le Cern pour la première fois. Le premier DG au Cern, F.Bloch, et Mons.Amaldi sont aussi présents. Tandis que le discours anglais de W.Jentschke est traduit en russe, le discours russe de Mons.Morozov est traduit en anglais.

  10. RMOD: a tool for regulatory motif detection in signaling network.

    Directory of Open Access Journals (Sweden)

    Jinki Kim

    Full Text Available Regulatory motifs are patterns of activation and inhibition that appear repeatedly in various signaling networks and that show specific regulatory properties. However, the network structures of regulatory motifs are highly diverse and complex, rendering their identification difficult. Here, we present a RMOD, a web-based system for the identification of regulatory motifs and their properties in signaling networks. RMOD finds various network structures of regulatory motifs by compressing the signaling network and detecting the compressed forms of regulatory motifs. To apply it into a large-scale signaling network, it adopts a new subgraph search algorithm using a novel data structure called path-tree, which is a tree structure composed of isomorphic graphs of query regulatory motifs. This algorithm was evaluated using various sizes of signaling networks generated from the integration of various human signaling pathways and it showed that the speed and scalability of this algorithm outperforms those of other algorithms. RMOD includes interactive analysis and auxiliary tools that make it possible to manipulate the whole processes from building signaling network and query regulatory motifs to analyzing regulatory motifs with graphical illustration and summarized descriptions. As a result, RMOD provides an integrated view of the regulatory motifs and mechanism underlying their regulatory motif activities within the signaling network. RMOD is freely accessible online at the following URL: http://pks.kaist.ac.kr/rmod.

  11. The signature package on Witt spaces, II. Higher signatures

    CERN Document Server

    Albin, Pierre; Mazzeo, Rafe; Piazza, Paolo

    2009-01-01

    This is a sequel to the paper "The signature package on Witt spaces, I. Index classes" by the same authors. In the first part we investigated, via a parametrix construction, the regularity properties of the signature operator on a stratified Witt pseudomanifold, proving, in particular, that one can define a K-homology signature class. We also established the existence of an analytic index class for the signature operator twisted by a C^*_r\\Gamma Mischenko bundle and proved that the K-homology signature class is mapped to the signature index class by the assembly map. In this paper we continue our study, showing that the signature index class is invariant under rational Witt bordisms and stratified homotopies. We are also able to identify this analytic class with the topological analogue of the Mischenko symmetric signature recently defined by Banagl. Finally, we define Witt-Novikov higher signatures and show that our analytic results imply a purely topological theorem, namely that the Witt-Novikov higher sign...

  12. Identity-based threshold signature and mediated proxy signature schemes

    Institute of Scientific and Technical Information of China (English)

    YU Yong; YANG Bo; SUN Ying

    2007-01-01

    Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. However, many proxy signature schemes have the defect which is the inability to solve the proxy revocation problem. In this article, we firstly propose an identity-based threshold signature scheme and show that it has the properties of unforgeability and robustness. In our threshold signature scheme, we adopt such a method that the private key associated with an identity rather than the master key is shared. Then, based on the threshold signature scheme, an identity-based mediated proxy signature scheme is proposed where a security mediator (SEM) is introduced to help a proxy signer to generate valid proxy signatures, examine whether a proxy signer signs according to the warrant, and check the revocation of a proxy signer. It is shown that the proposed scheme satisfies all the security requirements of a secure proxy signature. Moreover, a proxy signer must cooperate with the SEM to generate a valid proxy signature, which makes the new scheme have an effective and fast proxy revocation.

  13. Protein functional-group 3D motif and its applications

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Representing and recognizing protein active sites sequence motif (1D motif) and structural motif (3D motif) is an important topic for predicting and designing protein function. Prevalent methods for extracting and searching 3D motif always consider residue as the minimal unit, which have limited sensitivity. Here we present a new spatial representation of protein active sites, called "functional-group 3D motif ", based on the fact that the functional groups inside a residue contribute mostly to its function. Relevant algorithm and computer program are developed, which could be widely used in the function prediction and the study of structural-function relationship of proteins. As a test, we defined a functional-group 3D motif of the catalytic triad and oxyanion hole with the structure of porcine trypsin (PDB code: 1mct) as the template. With our motif-searching program, we successfully found similar sub-structures in trypsins, subtilisins and a/b hydrolases, which show distinct folds but share similar catalytic mechanism. Moreover, this motif can be used to elucidate the structural basis of other proteins with variant catalytic triads by comparing it to those proteins. Finally, we scanned this motif against a non-redundant protein structure database to find its matches, and the results demonstrated the potential application of functional group 3D motif in function prediction. Above all, compared with the other 3D-motif representations on residues, the functional group 3D motif achieves better representation of protein active region, which is more sensitive for protein function prediction.

  14. Promoter Motifs in NCLDVs: An Evolutionary Perspective

    Science.gov (United States)

    Oliveira, Graziele Pereira; Andrade, Ana Cláudia dos Santos Pereira; Rodrigues, Rodrigo Araújo Lima; Arantes, Thalita Souza; Boratto, Paulo Victor Miranda; Silva, Ludmila Karen dos Santos; Dornas, Fábio Pio; Trindade, Giliane de Souza; Drumond, Betânia Paiva; La Scola, Bernard; Kroon, Erna Geessien; Abrahão, Jônatas Santos

    2017-01-01

    For many years, gene expression in the three cellular domains has been studied in an attempt to discover sequences associated with the regulation of the transcription process. Some specific transcriptional features were described in viruses, although few studies have been devoted to understanding the evolutionary aspects related to the spread of promoter motifs through related viral families. The discovery of giant viruses and the proposition of the new viral order Megavirales that comprise a monophyletic group, named nucleo-cytoplasmic large DNA viruses (NCLDV), raised new questions in the field. Some putative promoter sequences have already been described for some NCLDV members, bringing new insights into the evolutionary history of these complex microorganisms. In this review, we summarize the main aspects of the transcription regulation process in the three domains of life, followed by a systematic description of what is currently known about promoter regions in several NCLDVs. We also discuss how the analysis of the promoter sequences could bring new ideas about the giant viruses’ evolution. Finally, considering a possible common ancestor for the NCLDV group, we discussed possible promoters’ evolutionary scenarios and propose the term “MEGA-box” to designate an ancestor promoter motif (‘TATATAAAATTGA’) that could be evolved gradually by nucleotides’ gain and loss and point mutations. PMID:28117683

  15. The network motif architecture of dominance hierarchies.

    Science.gov (United States)

    Shizuka, Daizaburo; McDonald, David B

    2015-04-01

    The widespread existence of dominance hierarchies has been a central puzzle in social evolution, yet we lack a framework for synthesizing the vast empirical data on hierarchy structure in animal groups. We applied network motif analysis to compare the structures of dominance networks from data published over the past 80 years. Overall patterns of dominance relations, including some aspects of non-interactions, were strikingly similar across disparate group types. For example, nearly all groups exhibited high frequencies of transitive triads, whereas cycles were very rare. Moreover, pass-along triads were rare, and double-dominant triads were common in most groups. These patterns did not vary in any systematic way across taxa, study settings (captive or wild) or group size. Two factors significantly affected network motif structure: the proportion of dyads that were observed to interact and the interaction rates of the top-ranked individuals. Thus, study design (i.e. how many interactions were observed) and the behaviour of key individuals in the group could explain much of the variations we see in social hierarchies across animals. Our findings confirm the ubiquity of dominance hierarchies across all animal systems, and demonstrate that network analysis provides new avenues for comparative analyses of social hierarchies.

  16. An Affinity Propagation-Based DNA Motif Discovery Algorithm

    Directory of Open Access Journals (Sweden)

    Chunxiao Sun

    2015-01-01

    Full Text Available The planted (l,d motif search (PMS is one of the fundamental problems in bioinformatics, which plays an important role in locating transcription factor binding sites (TFBSs in DNA sequences. Nowadays, identifying weak motifs and reducing the effect of local optimum are still important but challenging tasks for motif discovery. To solve the tasks, we propose a new algorithm, APMotif, which first applies the Affinity Propagation (AP clustering in DNA sequences to produce informative and good candidate motifs and then employs Expectation Maximization (EM refinement to obtain the optimal motifs from the candidate motifs. Experimental results both on simulated data sets and real biological data sets show that APMotif usually outperforms four other widely used algorithms in terms of high prediction accuracy.

  17. Triadic motifs in the dependence networks of virtual societies

    CERN Document Server

    Xie, Wen-Jie; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2014-01-01

    In friendship networks, individuals have different numbers of friends, and the closeness or intimacy between an individual and her friends is heterogeneous. Using a statistical filtering method to identify relationships about who depends on whom, we construct dependence networks (which are directed) from weighted friendship networks of avatars in more than two hundred virtual societies of a massively multiplayer online role-playing game (MMORPG). We investigate the evolution of triadic motifs in dependence networks. Several metrics show that the virtual societies evolved through a transient stage in the first two to three weeks and reached a relatively stable stage. We find that the unidirectional loop motif (${\\rm{M}}_9$) is underrepresented and does not appear, open motifs are also underrepresented, while other close motifs are overrepresented. We also find that, for most motifs, the overall level difference of the three avatars in the same motif is significantly lower than average, whereas the sum of ranks...

  18. An Affinity Propagation-Based DNA Motif Discovery Algorithm.

    Science.gov (United States)

    Sun, Chunxiao; Huo, Hongwei; Yu, Qiang; Guo, Haitao; Sun, Zhigang

    2015-01-01

    The planted (l, d) motif search (PMS) is one of the fundamental problems in bioinformatics, which plays an important role in locating transcription factor binding sites (TFBSs) in DNA sequences. Nowadays, identifying weak motifs and reducing the effect of local optimum are still important but challenging tasks for motif discovery. To solve the tasks, we propose a new algorithm, APMotif, which first applies the Affinity Propagation (AP) clustering in DNA sequences to produce informative and good candidate motifs and then employs Expectation Maximization (EM) refinement to obtain the optimal motifs from the candidate motifs. Experimental results both on simulated data sets and real biological data sets show that APMotif usually outperforms four other widely used algorithms in terms of high prediction accuracy.

  19. Probabilistic models for semisupervised discriminative motif discovery in DNA sequences.

    Science.gov (United States)

    Kim, Jong Kyoung; Choi, Seungjin

    2011-01-01

    Methods for discriminative motif discovery in DNA sequences identify transcription factor binding sites (TFBSs), searching only for patterns that differentiate two sets (positive and negative sets) of sequences. On one hand, discriminative methods increase the sensitivity and specificity of motif discovery, compared to generative models. On the other hand, generative models can easily exploit unlabeled sequences to better detect functional motifs when labeled training samples are limited. In this paper, we develop a hybrid generative/discriminative model which enables us to make use of unlabeled sequences in the framework of discriminative motif discovery, leading to semisupervised discriminative motif discovery. Numerical experiments on yeast ChIP-chip data for discovering DNA motifs demonstrate that the best performance is obtained between the purely-generative and the purely-discriminative and the semisupervised learning improves the performance when labeled sequences are limited.

  20. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  1. Set signatures and their applications

    Institute of Scientific and Technical Information of China (English)

    WU ChuanKun

    2009-01-01

    There are many constraints In the use of digital signatures. This paper proposes a new way of using digital signatures with some restrictions, i.e. set signatures. It works in such a way that when the signing algorithm Is given, one can use it to create a valid signature on a message if and only if the message belongs to a pre-defined set, and given the information about the signing algorithm, It is computationally Infeasible to create valid signatures on any other arbitrary messages outside of the set. This special property enables the signing algorithm to be made public, which seems to contradict with the traditional signature where a private key Is needed, which must be kept secret. What makes the problem challenging is that the signing algorithm does not reveal the secret signing key, and hence forging normal signatures for arbitrary messages is computationaUy Infeasible. In many cases, the signing algorithm does not reveal the elements in the authorized set. As an application of the new concept, set signatures for intelligent mobile agents committing "smaller than" condition Is studied, which shows the applicability of set signatures on small sets.

  2. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  3. Detecting DNA regulatory motifs by incorporating positional trendsin information content

    Energy Technology Data Exchange (ETDEWEB)

    Kechris, Katherina J.; van Zwet, Erik; Bickel, Peter J.; Eisen,Michael B.

    2004-05-04

    On the basis of the observation that conserved positions in transcription factor binding sites are often clustered together, we propose a simple extension to the model-based motif discovery methods. We assign position-specific prior distributions to the frequency parameters of the model, penalizing deviations from a specified conservation profile. Examples with both simulated and real data show that this extension helps discover motifs as the data become noisier or when there is a competing false motif.

  4. STEME: a robust, accurate motif finder for large data sets.

    Directory of Open Access Journals (Sweden)

    John E Reid

    Full Text Available Motif finding is a difficult problem that has been studied for over 20 years. Some older popular motif finders are not suitable for analysis of the large data sets generated by next-generation sequencing. We recently published an efficient approximation (STEME to the EM algorithm that is at the core of many motif finders such as MEME. This approximation allows the EM algorithm to be applied to large data sets. In this work we describe several efficient extensions to STEME that are based on the MEME algorithm. Together with the original STEME EM approximation, these extensions make STEME a fully-fledged motif finder with similar properties to MEME. We discuss the difficulty of objectively comparing motif finders. We show that STEME performs comparably to existing prominent discriminative motif finders, DREME and Trawler, on 13 sets of transcription factor binding data in mouse ES cells. We demonstrate the ability of STEME to find long degenerate motifs which these discriminative motif finders do not find. As part of our method, we extend an earlier method due to Nagarajan et al. for the efficient calculation of motif E-values. STEME's source code is available under an open source license and STEME is available via a web interface.

  5. Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes

    Directory of Open Access Journals (Sweden)

    Jia Yu

    2010-06-01

    Full Text Available Forward-secure signatures are proposed to tackle the key exposure problem, in which the security of all signatures prior to key leakage is still kept even if the secret key leaks. In this paper, we construct two forward-secure multisignature schemes, one forward-secure threshold signature scheme, and one forward-secure blind signature scheme. Our constructions are based on the recently proposed forward-secure signature scheme from bilinear maps in [11]. Our constructions are very efficient and useful thanks to the elegant structure of the base scheme. Such schemes play an important role in many electronic applications such as cryptographic election systems, digital cash schemes, and e-cheques.

  6. Complex lasso: new entangled motifs in proteins

    Science.gov (United States)

    Niemyska, Wanda; Dabrowski-Tumanski, Pawel; Kadlof, Michal; Haglund, Ellinor; Sułkowski, Piotr; Sulkowska, Joanna I.

    2016-11-01

    We identify new entangled motifs in proteins that we call complex lassos. Lassos arise in proteins with disulfide bridges (or in proteins with amide linkages), when termini of a protein backbone pierce through an auxiliary surface of minimal area, spanned on a covalent loop. We find that as much as 18% of all proteins with disulfide bridges in a non-redundant subset of PDB form complex lassos, and classify them into six distinct geometric classes, one of which resembles supercoiling known from DNA. Based on biological classification of proteins we find that lassos are much more common in viruses, plants and fungi than in other kingdoms of life. We also discuss how changes in the oxidation/reduction potential may affect the function of proteins with lassos. Lassos and associated surfaces of minimal area provide new, interesting and possessing many potential applications geometric characteristics not only of proteins, but also of other biomolecules.

  7. Modeling Network Evolution Using Graph Motifs

    CERN Document Server

    Conway, Drew

    2011-01-01

    Network structures are extremely important to the study of political science. Much of the data in its subfields are naturally represented as networks. This includes trade, diplomatic and conflict relationships. The social structure of several organization is also of interest to many researchers, such as the affiliations of legislators or the relationships among terrorist. A key aspect of studying social networks is understanding the evolutionary dynamics and the mechanism by which these structures grow and change over time. While current methods are well suited to describe static features of networks, they are less capable of specifying models of change and simulating network evolution. In the following paper I present a new method for modeling network growth and evolution. This method relies on graph motifs to generate simulated network data with particular structural characteristic. This technique departs notably from current methods both in form and function. Rather than a closed-form model, or stochastic ...

  8. Motif-role-fingerprints: the building-blocks of motifs, clustering-coefficients and transitivities in directed networks.

    Directory of Open Access Journals (Sweden)

    Mark D McDonnell

    Full Text Available Complex networks are frequently characterized by metrics for which particular subgraphs are counted. One statistic from this category, which we refer to as motif-role fingerprints, differs from global subgraph counts in that the number of subgraphs in which each node participates is counted. As with global subgraph counts, it can be important to distinguish between motif-role fingerprints that are 'structural' (induced subgraphs and 'functional' (partial subgraphs. Here we show mathematically that a vector of all functional motif-role fingerprints can readily be obtained from an arbitrary directed adjacency matrix, and then converted to structural motif-role fingerprints by multiplying that vector by a specific invertible conversion matrix. This result demonstrates that a unique structural motif-role fingerprint exists for any given functional motif-role fingerprint. We demonstrate a similar result for the cases of functional and structural motif-fingerprints without node roles, and global subgraph counts that form the basis of standard motif analysis. We also explicitly highlight that motif-role fingerprints are elemental to several popular metrics for quantifying the subgraph structure of directed complex networks, including motif distributions, directed clustering coefficient, and transitivity. The relationships between each of these metrics and motif-role fingerprints also suggest new subtypes of directed clustering coefficients and transitivities. Our results have potential utility in analyzing directed synaptic networks constructed from neuronal connectome data, such as in terms of centrality. Other potential applications include anomaly detection in networks, identification of similar networks and identification of similar nodes within networks. Matlab code for calculating all stated metrics following calculation of functional motif-role fingerprints is provided as S1 Matlab File.

  9. A Secure Threshold Group Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    Wang Xiaoming; Fu Fangwei

    2003-01-01

    The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack

  10. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  11. Encoded expansion: an efficient algorithm to discover identical string motifs.

    Directory of Open Access Journals (Sweden)

    Aqil M Azmi

    Full Text Available A major task in computational biology is the discovery of short recurring string patterns known as motifs. Most of the schemes to discover motifs are either stochastic or combinatorial in nature. Stochastic approaches do not guarantee finding the correct motifs, while the combinatorial schemes tend to have an exponential time complexity with respect to motif length. To alleviate the cost, the combinatorial approach exploits dynamic data structures such as trees or graphs. Recently (Karci (2009 Efficient automatic exact motif discovery algorithms for biological sequences, Expert Systems with Applications 36:7952-7963 devised a deterministic algorithm that finds all the identical copies of string motifs of all sizes [Formula: see text] in theoretical time complexity of [Formula: see text] and a space complexity of [Formula: see text] where [Formula: see text] is the length of the input sequence and [Formula: see text] is the length of the longest possible string motif. In this paper, we present a significant improvement on Karci's original algorithm. The algorithm that we propose reports all identical string motifs of sizes [Formula: see text] that occur at least [Formula: see text] times. Our algorithm starts with string motifs of size 2, and at each iteration it expands the candidate string motifs by one symbol throwing out those that occur less than [Formula: see text] times in the entire input sequence. We use a simple array and data encoding to achieve theoretical worst-case time complexity of [Formula: see text] and a space complexity of [Formula: see text] Encoding of the substrings can speed up the process of comparison between string motifs. Experimental results on random and real biological sequences confirm that our algorithm has indeed a linear time complexity and it is more scalable in terms of sequence length than the existing algorithms.

  12. The limits of de novo DNA motif discovery.

    Directory of Open Access Journals (Sweden)

    David Simcha

    Full Text Available A major challenge in molecular biology is reverse-engineering the cis-regulatory logic that plays a major role in the control of gene expression. This program includes searching through DNA sequences to identify "motifs" that serve as the binding sites for transcription factors or, more generally, are predictive of gene expression across cellular conditions. Several approaches have been proposed for de novo motif discovery-searching sequences without prior knowledge of binding sites or nucleotide patterns. However, unbiased validation is not straightforward. We consider two approaches to unbiased validation of discovered motifs: testing the statistical significance of a motif using a DNA "background" sequence model to represent the null hypothesis and measuring performance in predicting membership in gene clusters. We demonstrate that the background models typically used are "too null," resulting in overly optimistic assessments of significance, and argue that performance in predicting TF binding or expression patterns from DNA motifs should be assessed by held-out data, as in predictive learning. Applying this criterion to common motif discovery methods resulted in universally poor performance, although there is a marked improvement when motifs are statistically significant against real background sequences. Moreover, on synthetic data where "ground truth" is known, discriminative performance of all algorithms is far below the theoretical upper bound, with pronounced "over-fitting" in training. A key conclusion from this work is that the failure of de novo discovery approaches to accurately identify motifs is basically due to statistical intractability resulting from the fixed size of co-regulated gene clusters, and thus such failures do not necessarily provide evidence that unfound motifs are not active biologically. Consequently, the use of prior knowledge to enhance motif discovery is not just advantageous but necessary. An implementation of

  13. Immunity related genes in dipterans share common enrichment of AT-rich motifs in their 5' regulatory regions that are potentially involved in nucleosome formation

    Directory of Open Access Journals (Sweden)

    Rodriguez Mario H

    2008-07-01

    Full Text Available Abstract Background Understanding the transcriptional regulation mechanisms in response to environmental challenges is of fundamental importance in biology. Transcription factors associated to response elements and the chromatin structure had proven to play important roles in gene expression regulation. We have analyzed promoter regions of dipteran genes induced in response to immune challenge, in search for particular sequence patterns involved in their transcriptional regulation. Results 5' upstream regions of D. melanogaster and A. gambiae immunity-induced genes and their corresponding orthologous genes in 11 non-melanogaster drosophilid species and Ae. aegypti share enrichment in AT-rich short motifs. AT-rich motifs are associated with nucleosome formation as predicted by two different algorithms. In A. gambiae and D. melanogaster, many immunity genes 5' upstream sequences also showed NFκB response elements, located within 500 bp from the transcription start site. In A. gambiae, the frequency of ATAA motif near the NFκB response elements was increased, suggesting a functional link between nucleosome formation/remodelling and NFκB regulation of transcription. Conclusion AT-rich motif enrichment in 5' upstream sequences in A. gambiae, Ae. aegypti and the Drosophila genus immunity genes suggests a particular pattern of nucleosome formation/chromatin organization. The co-occurrence of such motifs with the NFκB response elements suggests that these sequence signatures may be functionally involved in transcriptional activation during dipteran immune response. AT-rich motif enrichment in regulatory regions in this group of co-regulated genes could represent an evolutionary constrained signature in dipterans and perhaps other distantly species.

  14. Probing structural changes of self assembled i-motif DNA

    KAUST Repository

    Lee, Iljoon

    2015-01-01

    We report an i-motif structural probing system based on Thioflavin T (ThT) as a fluorescent sensor. This probe can discriminate the structural changes of RET and Rb i-motif sequences according to pH change. This journal is

  15. Discovering large network motifs from a complex biological network

    Energy Technology Data Exchange (ETDEWEB)

    Terada, Aika; Sese, Jun, E-mail: terada@sel.is.ocha.ac.j, E-mail: sesejun@is.ocha.ac.j [Department of Computer Science, Ochanomizu University, 2-1-1 Ohtsuka, Bunkyo-ku, Tokyo 112-8610 (Japan)

    2009-12-01

    Graph structures representing relationships between entries have been studied in statistical analysis, and the results of these studies have been applied to biological networks, whose nodes and edges represent proteins and the relationships between them, respectively. Most of the studies have focused on only graph structures such as scale-free properties and cliques, but the relationships between nodes are also important features since most of the proteins perform their functions by connecting to other proteins. In order to determine such relationships, the problem of network motif discovery has been addressed; network motifs are frequently appearing graph structures in a given graph. However, the methods for network motif discovery are highly restrictive for the application to biological network because they can only be used to find small network motifs or they do not consider noise and uncertainty in observations. In this study, we introduce a new index to measure network motifs called AR index and develop a novel algorithm called ARIANA for finding large motifs even when the network has noise. Experiments using a synthetic network verify that our method can find better network motifs than an existing algorithm. By applying ARIANA to a real complex biological network, we find network motifs associated with regulations of start time of cell functions and generation of cell energies and discover that the cell cycle proteins can be categorized into two different groups.

  16. Motif Participation by Genes in E. coli Transcriptional Networks

    Directory of Open Access Journals (Sweden)

    Michael eMayo

    2012-09-01

    Full Text Available Motifs are patterns of recurring connections among the genes of genetic networks that occur more frequently than would be expected from randomized networks with the same degree sequence. Although the abundance of certain three-node motifs, such as the feed-forward loop, is positively correlated with a networks’ ability to tolerate moderate disruptions to gene expression, little is known regarding the connectivity of individual genes participating in multiple motifs. Using the transcriptional network of the bacterium Escherichia coli, we investigate this feature by reconstructing the distribution of genes participating in feed-forward loop motifs from its largest connected network component. We contrast these motif participation distributions with those obtained from model networks built using the preferential attachment mechanism employed by many biological and man-made networks. We report that, although some of these model networks support a motif participation distribution that appears qualitatively similar to that obtained from the bacterium Escherichia coli, the probability for a node to support a feed-forward loop motif may instead be strongly influenced by only a few master transcriptional regulators within the network. From these analyses we conclude that such master regulators may be a crucial ingredient to describe coupling among feed-forward loop motifs in transcriptional regulatory networks.

  17. Dynamic Motifs of Strategies in Prisoner's Dilemma Games

    CERN Document Server

    Kim, Young Jin; Jeong, Seon-Young; Son, Seung-Woo

    2014-01-01

    We investigate the win-lose relations between strategies of iterated prisoner's dilemma games by using a directed network concept to display the replicator dynamics results. In the giant strongly-connected component of the win/lose network, we find win-lose circulations similar to rock-paper-scissors and analyze the fixed point and its stability. Applying the network motif concept, we introduce dynamic motifs, which describe the population dynamics relations among the three strategies. Through exact enumeration, we find 22 dynamic motifs and display their phase portraits. Visualization using directed networks and motif analysis is a useful method to make complex dynamic behavior simple in order to understand it more intuitively. Dynamic motifs can be building blocks for dynamic behavior among strategies when they are applied to other types of games.

  18. Dynamic motifs of strategies in prisoner's dilemma games

    Science.gov (United States)

    Kim, Young Jin; Roh, Myungkyoon; Jeong, Seon-Young; Son, Seung-Woo

    2014-12-01

    We investigate the win-lose relations between strategies of iterated prisoner's dilemma games by using a directed network concept to display the replicator dynamics results. In the giant strongly-connected component of the win/lose network, we find win-lose circulations similar to rock-paper-scissors and analyze the fixed point and its stability. Applying the network motif concept, we introduce dynamic motifs, which describe the population dynamics relations among the three strategies. Through exact enumeration, we find 22 dynamic motifs and display their phase portraits. Visualization using directed networks and motif analysis is a useful method to make complex dynamic behavior simple in order to understand it more intuitively. Dynamic motifs can be building blocks for dynamic behavior among strategies when they are applied to other types of games.

  19. BlockLogo: Visualization of peptide and sequence motif conservation

    DEFF Research Database (Denmark)

    Olsen, Lars Rønn; Kudahl, Ulrich Johan; Simon, Christian

    2013-01-01

    BlockLogo is a web-server application for the visualization of protein and nucleotide fragments, continuous protein sequence motifs, and discontinuous sequence motifs using calculation of block entropy from multiple sequence alignments. The user input consists of a multiple sequence alignment......, selection of motif positions, type of sequence, and output format definition. The output has BlockLogo along with the sequence logo, and a table of motif frequencies. We deployed BlockLogo as an online application and have demonstrated its utility through examples that show visualization of T-cell epitopes...... and B-cell epitopes (both continuous and discontinuous). Our additional example shows a visualization and analysis of structural motifs that determine the specificity of peptide binding to HLA-DR molecules. The BlockLogo server also employs selected experimentally validated prediction algorithms...

  20. An algorithm for motif-based network design

    CERN Document Server

    Mäki-Marttunen, Tuomo

    2016-01-01

    A determinant property of the structure of a biological network is the distribution of local connectivity patterns, i.e., network motifs. In this work, a method for creating directed, unweighted networks while promoting a certain combination of motifs is presented. This motif-based network algorithm starts with an empty graph and randomly connects the nodes by advancing or discouraging the formation of chosen motifs. The in- or out-degree distribution of the generated networks can be explicitly chosen. The algorithm is shown to perform well in producing networks with high occurrences of the targeted motifs, both ones consisting of 3 nodes as well as ones consisting of 4 nodes. Moreover, the algorithm can also be tuned to bring about global network characteristics found in many natural networks, such as small-worldness and modularity.

  1. Different sequence signatures in the upstream regions of plant and animal tRNA genes shape distinct modes of regulation.

    Science.gov (United States)

    Zhang, Gong; Lukoszek, Radoslaw; Mueller-Roeber, Bernd; Ignatova, Zoya

    2011-04-01

    In eukaryotes, the transcription of tRNA genes is initiated by the concerted action of transcription factors IIIC (TFIIIC) and IIIB (TFIIIB) which direct the recruitment of polymerase III. While TFIIIC recognizes highly conserved, intragenic promoter elements, TFIIIB binds to the non-coding 5'-upstream regions of the tRNA genes. Using a systematic bioinformatic analysis of 11 multicellular eukaryotic genomes we identified a highly conserved TATA motif followed by a CAA-motif in the tRNA upstream regions of all plant genomes. Strikingly, the 5'-flanking tRNA regions of the animal genomes are highly heterogeneous and lack a common conserved sequence signature. Interestingly, in the animal genomes the tRNA species that read the same codon share conserved motifs in their upstream regions. Deep-sequencing analysis of 16 human tissues revealed multiple splicing variants of two of the TFIIIB subunits, Bdp1 and Brf1, with tissue-specific expression patterns. These multiple forms most likely modulate the TFIIIB-DNA interactions and explain the lack of a uniform signature motif in the tRNA upstream regions of animal genomes. The anticodon-dependent 5'-flanking motifs provide a possible mechanism for independent regulation of the tRNA transcription in various human tissues.

  2. Automatic annotation of protein motif function with Gene Ontology terms

    Directory of Open Access Journals (Sweden)

    Gopalakrishnan Vanathi

    2004-09-01

    Full Text Available Abstract Background Conserved protein sequence motifs are short stretches of amino acid sequence patterns that potentially encode the function of proteins. Several sequence pattern searching algorithms and programs exist foridentifying candidate protein motifs at the whole genome level. However, amuch needed and importanttask is to determine the functions of the newly identified protein motifs. The Gene Ontology (GO project is an endeavor to annotate the function of genes or protein sequences with terms from a dynamic, controlled vocabulary and these annotations serve well as a knowledge base. Results This paperpresents methods to mine the GO knowledge base and use the association between the GO terms assigned to a sequence and the motifs matched by the same sequence as evidence for predicting the functions of novel protein motifs automatically. The task of assigning GO terms to protein motifsis viewed as both a binary classification and information retrieval problem, where PROSITE motifs are used as samples for mode training and functional prediction. The mutual information of a motif and aGO term association isfound to be a very useful feature. We take advantageof the known motifs to train a logistic regression classifier, which allows us to combine mutual information with other frequency-based features and obtain a probability of correctassociation. The trained logistic regression model has intuitively meaningful and logically plausible parameter values, and performs very well empirically according to our evaluation criteria. Conclusions In this research, different methods for automatic annotation of protein motifs have been investigated. Empirical result demonstrated that the methods have a great potential for detecting and augmenting information about thefunctions of newly discovered candidate protein motifs.

  3. Comparative Whole-Genome Mapping To Determine Staphylococcus aureus Genome Size, Virulence Motifs, and Clonality

    Science.gov (United States)

    Pantrang, Madhulatha; Stahl, Buffy; Briska, Adam M.; Stemper, Mary E.; Wagner, Trevor K.; Zentz, Emily B.; Callister, Steven M.; Lovrich, Steven D.; Henkhaus, John K.; Dykes, Colin W.

    2012-01-01

    Despite being a clonal pathogen, Staphylococcus aureus continues to acquire virulence and antibiotic-resistant genes located on mobile genetic elements such as genomic islands, prophages, pathogenicity islands, and the staphylococcal chromosomal cassette mec (SCCmec) by horizontal gene transfer from other staphylococci. The potential virulence of a S. aureus strain is often determined by comparing its pulsed-field gel electrophoresis (PFGE) or multilocus sequence typing profiles to that of known epidemic or virulent clones and by PCR of the toxin genes. Whole-genome mapping (formerly optical mapping), which is a high-resolution ordered restriction mapping of a bacterial genome, is a relatively new genomic tool that allows comparative analysis across entire bacterial genomes to identify regions of genomic similarities and dissimilarities, including small and large insertions and deletions. We explored whether whole-genome maps (WGMs) of methicillin-resistant S. aureus (MRSA) could be used to predict the presence of methicillin resistance, SCCmec type, and Panton-Valentine leukocidin (PVL)-producing genes on an S. aureus genome. We determined the WGMs of 47 diverse clinical isolates of S. aureus, including well-characterized reference MRSA strains, and annotated the signature restriction pattern in SCCmec types, arginine catabolic mobile element (ACME), and PVL-carrying prophage, PhiSa2 or PhiSa2-like regions on the genome. WGMs of these isolates accurately characterized them as MRSA or methicillin-sensitive S. aureus based on the presence or absence of the SCCmec motif, ACME and the unique signature pattern for the prophage insertion that harbored the PVL genes. Susceptibility to methicillin resistance and the presence of mecA, SCCmec types, and PVL genes were confirmed by PCR. A WGM clustering approach was further able to discriminate isolates within the same PFGE clonal group. These results showed that WGMs could be used not only to genotype S. aureus but also to

  4. Signatures of AGN feedback

    Science.gov (United States)

    Wylezalek, Dominika; Zakamska, Nadia L.; MaNGA-GMOS Team

    2017-01-01

    Feedback from actively accreting SMBHs (Active Galactic Nuclei, AGN) is now widely considered to be the main driver in regulating the growth of massive galaxies. Observational proof for this scenario has, however, been hard to come by. Many attempts at finding a conclusive observational proof that AGN may be able to quench star formation and regulate the host galaxies' growth have shown that this problem is highly complex.I will present results from several projects that focus on understanding the power, reach and impact of feedback processes exerted by AGN. I will describe recent efforts in our group of relating feedback signatures to the specific star formation rate in their host galaxies, where our results are consistent with the AGN having a `negative' impact through feedback on the galaxies' star formation history (Wylezalek+2016a,b). Furthermore, I will show that powerful AGN-driven winds can be easily hidden and not be apparent in the integrated spectrum of the galaxy. This implies that large IFU surveys, such as the SDSS-IV MaNGA survey, might uncover many previously unknown AGN and outflows that are potentially very relevant for understanding the role of AGN in galaxy evolution (Wylezalek+2016c)!

  5. De Novo Regulatory Motif Discovery Identifies Significant Motifs in Promoters of Five Classes of Plant Dehydrin Genes.

    Science.gov (United States)

    Zolotarov, Yevgen; Strömvik, Martina

    2015-01-01

    Plants accumulate dehydrins in response to osmotic stresses. Dehydrins are divided into five different classes, which are thought to be regulated in different manners. To better understand differences in transcriptional regulation of the five dehydrin classes, de novo motif discovery was performed on 350 dehydrin promoter sequences from a total of 51 plant genomes. Overrepresented motifs were identified in the promoters of five dehydrin classes. The Kn dehydrin promoters contain motifs linked with meristem specific expression, as well as motifs linked with cold/dehydration and abscisic acid response. KS dehydrin promoters contain a motif with a GATA core. SKn and YnSKn dehydrin promoters contain motifs that match elements connected with cold/dehydration, abscisic acid and light response. YnKn dehydrin promoters contain motifs that match abscisic acid and light response elements, but not cold/dehydration response elements. Conserved promoter motifs are present in the dehydrin classes and across different plant lineages, indicating that dehydrin gene regulation is likely also conserved.

  6. Secure mediated certificateless signature scheme

    Institute of Scientific and Technical Information of China (English)

    YANG Chen; MA Wen-ping; WANG Xin-mei

    2007-01-01

    Ju et al proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in their proposed scheme, once a valid signature has been produced, the signer can recover his private key information and the instantaneous revocation property will be damaged. Furthermore, an improved mediated signature scheme, which can eliminate these disadvantages, is proposed, and security proof of the improved scheme under elliptic curve factorization problem (ECFP) assumption and bilinear computational diffie-hellman problem (BCDH) assumption is also proposed.

  7. Motif-specific sampling of phosphoproteomes.

    Science.gov (United States)

    Ruse, Cristian I; McClatchy, Daniel B; Lu, Bingwen; Cociorva, Daniel; Motoyama, Akira; Park, Sung Kyu; Yates, John R

    2008-05-01

    Phosphoproteomics, the targeted study of a subfraction of the proteome which is modified by phosphorylation, has become an indispensable tool to study cell signaling dynamics. We described a methodology that linked phosphoproteome and proteome analysis based on Ba2+ binding properties of amino acids. This technology selected motif-specific phosphopeptides independent of the system under analysis. MudPIT (Multidimensional Identification Technology) identified 1037 precipitated phosphopeptides from as little as 250 microg of proteins. To extend coverage of the phosphoproteome, we sampled the nuclear extract of HeLa cells with three values of Ba2+ ions molarity. The presence of more than 70% of identified phosphoproteins was further substantiated by their nonmodified peptides. Upon isoproterenol stimulation of HEK cells, we identified an increasing number of phosphoproteins from MAPK cascades and AKAP signaling hubs. We quantified changes in both protein and phosphorylation levels of 197 phosphoproteins including a critical kinase, MAPK1. Integration of differential phosphorylation of MAPK1 with knowledge bases constructed modules that correlated well with its role as node in cross-talk of canonical pathways.

  8. Initial Semantics for Strengthened Signatures

    CERN Document Server

    Hirschowitz, André; 10.4204/EPTCS.77.5

    2012-01-01

    We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax). Our strengthened arities admit colimits, which allows the treatment of the \\lambda-calculus with explicit substitution.

  9. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  10. E1DS: catalytic site prediction based on 1D signatures of concurrent conservation.

    Science.gov (United States)

    Chien, Ting-Ying; Chang, Darby Tien-Hao; Chen, Chien-Yu; Weng, Yi-Zhong; Hsu, Chen-Ming

    2008-07-01

    Large-scale automatic annotation of protein sequences remains challenging in postgenomics era. E1DS is designed for annotating enzyme sequences based on a repository of 1D signatures. The employed sequence signatures are derived using a novel pattern mining approach that discovers long motifs consisted of several sequential blocks (conserved segments). Each of the sequential blocks is considerably conserved among the protein members of an EC group. Moreover, a signature includes at least three sequential blocks that are concurrently conserved, i.e. frequently observed together in sequences. In other words, a sequence signature is consisted of residues from multiple regions of the protein sequence, which echoes the observation that an enzyme catalytic site is usually constituted of residues that are largely separated in the sequence. E1DS currently contains 5421 sequence signatures that in total cover 932 4-digital EC numbers. E1DS is evaluated based on a collection of enzymes with catalytic sites annotated in Catalytic Site Atlas. When compared to the famous pattern database PROSITE, predictions based on E1DS signatures are considered more sensitive in identifying catalytic sites and the involved residues. E1DS is available at http://e1ds.ee.ncku.edu.tw/ and a mirror site can be found at http://e1ds.csbb.ntu.edu.tw/.

  11. Strategi Mengenali Motif Khas Kain Tenun Cual Bangka Dengan AHP

    Directory of Open Access Journals (Sweden)

    Hilyah Magdalena

    2016-12-01

    Full Text Available Woven fabric cual Bangka currently used as one of the identity of community pride in Bangka Belitung Islands. The specificity of this fart cual fabric interesting to study because of the motives that have similarities with songket palembang. Woven fabric cual Bangka and Palembang songket cloth looks similar because the same cloth-making techniques - both using techniques sungkit. The purpose of this research is how to recognize a particular motif woven fabric cual fart. This research using Analytical Hierarchy Process ( AHP to classify some specific motifs that exist in woven fabric cual fart. Experts in the field of woven fabric cual is to inform you that the woven fabric cual farts have tabled motif, motifs or patterns, motifs fabric edge, motif gold thread, fabric base material, as well as the specific color. The research involved four experts that the results of the questionnaires is processed by software Expert Choice 2000. The results showed that the main peculiarity of the woven fabric cual fart is in a pattern or motif with a percentage of 31.5, and is the chosen alternative product is songket with a percentage of 25.4.

  12. Computational analyses of synergism in small molecular network motifs.

    Directory of Open Access Journals (Sweden)

    Yili Zhang

    2014-03-01

    Full Text Available Cellular functions and responses to stimuli are controlled by complex regulatory networks that comprise a large diversity of molecular components and their interactions. However, achieving an intuitive understanding of the dynamical properties and responses to stimuli of these networks is hampered by their large scale and complexity. To address this issue, analyses of regulatory networks often focus on reduced models that depict distinct, reoccurring connectivity patterns referred to as motifs. Previous modeling studies have begun to characterize the dynamics of small motifs, and to describe ways in which variations in parameters affect their responses to stimuli. The present study investigates how variations in pairs of parameters affect responses in a series of ten common network motifs, identifying concurrent variations that act synergistically (or antagonistically to alter the responses of the motifs to stimuli. Synergism (or antagonism was quantified using degrees of nonlinear blending and additive synergism. Simulations identified concurrent variations that maximized synergism, and examined the ways in which it was affected by stimulus protocols and the architecture of a motif. Only a subset of architectures exhibited synergism following paired changes in parameters. The approach was then applied to a model describing interlocked feedback loops governing the synthesis of the CREB1 and CREB2 transcription factors. The effects of motifs on synergism for this biologically realistic model were consistent with those for the abstract models of single motifs. These results have implications for the rational design of combination drug therapies with the potential for synergistic interactions.

  13. Triadic motifs in the dependence networks of virtual societies

    Science.gov (United States)

    Xie, Wen-Jie; Li, Ming-Xia; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2014-06-01

    In friendship networks, individuals have different numbers of friends, and the closeness or intimacy between an individual and her friends is heterogeneous. Using a statistical filtering method to identify relationships about who depends on whom, we construct dependence networks (which are directed) from weighted friendship networks of avatars in more than two hundred virtual societies of a massively multiplayer online role-playing game (MMORPG). We investigate the evolution of triadic motifs in dependence networks. Several metrics show that the virtual societies evolved through a transient stage in the first two to three weeks and reached a relatively stable stage. We find that the unidirectional loop motif (M9) is underrepresented and does not appear, open motifs are also underrepresented, while other close motifs are overrepresented. We also find that, for most motifs, the overall level difference of the three avatars in the same motif is significantly lower than average, whereas the sum of ranks is only slightly larger than average. Our findings show that avatars' social status plays an important role in the formation of triadic motifs.

  14. Contract Signature Using Quantum Information

    CERN Document Server

    De Sousa, P B M; Ramos, Rubens Viana; Sousa, Paulo Benicio Melo de

    2006-01-01

    This paper describes how to perform contract signature in a fair way using quantum information. The protocol proposed permits two partners, users of a communication network, to exchange their signatures with non-repudiation. For this, we assume that there is a trustable arbitrator, responsible for the authentication of the signers and that performs a central task in a quantum teleportation protocol of the XOR function between two classical bits.

  15. An arbitrated quantum signature scheme

    CERN Document Server

    Zeng, G; Zeng, Guihua; Keitel, Christoph H.

    2002-01-01

    The general principle for a quantum signature scheme is proposed and investigated based on ideas from classical signature schemes and quantum cryptography. The suggested algorithm is implemented by a symmetrical quantum key cryptosystem and Greenberger-Horne-Zeilinger (GHZ) triplet states and relies on the availability of an arbitrator. We can guarantee the unconditional security of the algorithm, mostly due to the correlation of the GHZ triplet states and the use of quantum one-time pads.

  16. A speedup technique for (l, d-motif finding algorithms

    Directory of Open Access Journals (Sweden)

    Dinh Hieu

    2011-03-01

    Full Text Available Abstract Background The discovery of patterns in DNA, RNA, and protein sequences has led to the solution of many vital biological problems. For instance, the identification of patterns in nucleic acid sequences has resulted in the determination of open reading frames, identification of promoter elements of genes, identification of intron/exon splicing sites, identification of SH RNAs, location of RNA degradation signals, identification of alternative splicing sites, etc. In protein sequences, patterns have proven to be extremely helpful in domain identification, location of protease cleavage sites, identification of signal peptides, protein interactions, determination of protein degradation elements, identification of protein trafficking elements, etc. Motifs are important patterns that are helpful in finding transcriptional regulatory elements, transcription factor binding sites, functional genomics, drug design, etc. As a result, numerous papers have been written to solve the motif search problem. Results Three versions of the motif search problem have been proposed in the literature: Simple Motif Search (SMS, (l, d-motif search (or Planted Motif Search (PMS, and Edit-distance-based Motif Search (EMS. In this paper we focus on PMS. Two kinds of algorithms can be found in the literature for solving the PMS problem: exact and approximate. An exact algorithm identifies the motifs always and an approximate algorithm may fail to identify some or all of the motifs. The exact version of PMS problem has been shown to be NP-hard. Exact algorithms proposed in the literature for PMS take time that is exponential in some of the underlying parameters. In this paper we propose a generic technique that can be used to speedup PMS algorithms. Conclusions We present a speedup technique that can be used on any PMS algorithm. We have tested our speedup technique on a number of algorithms. These experimental results show that our speedup technique is indeed very

  17. Exploitation of peptide motif sequences and their use in nanobiotechnology.

    Science.gov (United States)

    Shiba, Kiyotaka

    2010-08-01

    Short amino acid sequences extracted from natural proteins or created using in vitro evolution systems are sometimes associated with particular biological functions. These peptides, called peptide motifs, can serve as functional units for the creation of various tools for nanobiotechnology. In particular, peptide motifs that have the ability to specifically recognize the surfaces of solid materials and to mineralize certain inorganic materials have been linking biological science to material science. Here, I review how these peptide motifs have been isolated from natural proteins or created using in vitro evolution systems, and how they have been used in the nanobiotechnology field.

  18. A comprehensive search for recombinogenic motifs in the human genome.

    Directory of Open Access Journals (Sweden)

    Henry R Johnston

    Full Text Available The patterns of male and female recombination vary greatly on a macro scale. A unique motif in each gender, triggering a double strand break at its location, much in the way Chi sites operate in E. coli, could logically explain this difference. As such, we have undertaken a comprehensive search of all small motifs in an attempt to identify one or more that match to the available data. In the end, we conclude that no such motifs appear to exist in the human genome.

  19. Identification of protein superfamily from structure- based sequence motif

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The structure-based sequence motif of the distant proteins in evolution, protein tyrosine phosphatases (PTP) Ⅰ and Ⅱ superfamilies, as an example, has been defined by the structural comparison, structure-based sequence alignment and analyses on substitution patterns of residues in common sequence conserved regions. And the phosphatases Ⅰ and Ⅱ can be correctly identified together by the structure-based PTP sequence motif from SWISS-PROT and TrEBML databases. The results show that the correct rates of identification are over 98%. This is the first time to identify PTP Ⅰ and Ⅱ together by this motif.

  20. ROMANIAN FOLKLORE MOTIFS IN FASHION DESIGN

    Directory of Open Access Journals (Sweden)

    MOCENCO Alexandra

    2014-05-01

    Full Text Available The traditional Romanian costume such as the entire popular art (architecture, woodcarvins, pottery etc. was born and lasted in our country since ancient times. Closely related to human existence, the traditional costume reflected over the years as reflected nowadays, the mentality and artistic conception of the people. Today the traditional Romanian costume became an inspiration source to the wholesale fashion production industry designers, both Romanian and international. Although the contemporary designers are working in accordance with a vision, using a wide area of styles, methods and current technology, they usually return to traditional techniques and ethnic folklore motifs, which converts and resize them, integrating them in their contemporary space. Adrian Oianu is a very appreciated Romanian designer who launched two collections inspired by his native’s country traditional costumes: “Suflecata pan’ la brau” (“Turned up ‘til the belt” and “Bucurie” (“Joy”. Dorin Negrau had as inspiration for his “Lost” collection the traditional costume from the Bihor region. Yves Saint Laurent had a collection inspired by the Romanian traditional flax blouses called “La blouse roumaine”. The paper presents the traditional Romanian values throw fashion collections. The research activity will create innovative concepts to support the garment industry in order to develop their own brand and to bring the design activities in Romania at an international level. The research was conducted during the initial stage of a project, financed through national founds, consisting in a documentary study on ethnographic characteristics of the popular costume from different regions of the country.

  1. Targeting functional motifs of a protein family

    Science.gov (United States)

    Bhadola, Pradeep; Deo, Nivedita

    2016-10-01

    The structural organization of a protein family is investigated by devising a method based on the random matrix theory (RMT), which uses the physiochemical properties of the amino acid with multiple sequence alignment. A graphical method to represent protein sequences using physiochemical properties is devised that gives a fast, easy, and informative way of comparing the evolutionary distances between protein sequences. A correlation matrix associated with each property is calculated, where the noise reduction and information filtering is done using RMT involving an ensemble of Wishart matrices. The analysis of the eigenvalue statistics of the correlation matrix for the β -lactamase family shows the universal features as observed in the Gaussian orthogonal ensemble (GOE). The property-based approach captures the short- as well as the long-range correlation (approximately following GOE) between the eigenvalues, whereas the previous approach (treating amino acids as characters) gives the usual short-range correlations, while the long-range correlations are the same as that of an uncorrelated series. The distribution of the eigenvector components for the eigenvalues outside the bulk (RMT bound) deviates significantly from RMT observations and contains important information about the system. The information content of each eigenvector of the correlation matrix is quantified by introducing an entropic estimate, which shows that for the β -lactamase family the smallest eigenvectors (low eigenmodes) are highly localized as well as informative. These small eigenvectors when processed gives clusters involving positions that have well-defined biological and structural importance matching with experiments. The approach is crucial for the recognition of structural motifs as shown in β -lactamase (and other families) and selectively identifies the important positions for targets to deactivate (activate) the enzymatic actions.

  2. C-terminal motif prediction in eukaryotic proteomes using comparative genomics and statistical over-representation across protein families

    Directory of Open Access Journals (Sweden)

    Cutler Sean R

    2007-06-01

    Full Text Available Abstract Background The carboxy termini of proteins are a frequent site of activity for a variety of biologically important functions, ranging from post-translational modification to protein targeting. Several short peptide motifs involved in protein sorting roles and dependent upon their proximity to the C-terminus for proper function have already been characterized. As a limited number of such motifs have been identified, the potential exists for genome-wide statistical analysis and comparative genomics to reveal novel peptide signatures functioning in a C-terminal dependent manner. We have applied a novel methodology to the prediction of C-terminal-anchored peptide motifs involving a simple z-statistic and several techniques for improving the signal-to-noise ratio. Results We examined the statistical over-representation of position-specific C-terminal tripeptides in 7 eukaryotic proteomes. Sequence randomization models and simple-sequence masking were applied to the successful reduction of background noise. Similarly, as C-terminal homology among members of large protein families may artificially inflate tripeptide counts in an irrelevant and obfuscating manner, gene-family clustering was performed prior to the analysis in order to assess tripeptide over-representation across protein families as opposed to across all proteins. Finally, comparative genomics was used to identify tripeptides significantly occurring in multiple species. This approach has been able to predict, to our knowledge, all C-terminally anchored targeting motifs present in the literature. These include the PTS1 peroxisomal targeting signal (SKL*, the ER-retention signal (K/HDEL*, the ER-retrieval signal for membrane bound proteins (KKxx*, the prenylation signal (CC* and the CaaX box prenylation motif. In addition to a high statistical over-representation of these known motifs, a collection of significant tripeptides with a high propensity for biological function exists

  3. C-terminal motif prediction in eukaryotic proteomes using comparative genomics and statistical over-representation across protein families

    Science.gov (United States)

    Austin, Ryan S; Provart, Nicholas J; Cutler, Sean R

    2007-01-01

    Background The carboxy termini of proteins are a frequent site of activity for a variety of biologically important functions, ranging from post-translational modification to protein targeting. Several short peptide motifs involved in protein sorting roles and dependent upon their proximity to the C-terminus for proper function have already been characterized. As a limited number of such motifs have been identified, the potential exists for genome-wide statistical analysis and comparative genomics to reveal novel peptide signatures functioning in a C-terminal dependent manner. We have applied a novel methodology to the prediction of C-terminal-anchored peptide motifs involving a simple z-statistic and several techniques for improving the signal-to-noise ratio. Results We examined the statistical over-representation of position-specific C-terminal tripeptides in 7 eukaryotic proteomes. Sequence randomization models and simple-sequence masking were applied to the successful reduction of background noise. Similarly, as C-terminal homology among members of large protein families may artificially inflate tripeptide counts in an irrelevant and obfuscating manner, gene-family clustering was performed prior to the analysis in order to assess tripeptide over-representation across protein families as opposed to across all proteins. Finally, comparative genomics was used to identify tripeptides significantly occurring in multiple species. This approach has been able to predict, to our knowledge, all C-terminally anchored targeting motifs present in the literature. These include the PTS1 peroxisomal targeting signal (SKL*), the ER-retention signal (K/HDEL*), the ER-retrieval signal for membrane bound proteins (KKxx*), the prenylation signal (CC*) and the CaaX box prenylation motif. In addition to a high statistical over-representation of these known motifs, a collection of significant tripeptides with a high propensity for biological function exists between species, among

  4. An autoinhibited conformation of LGN reveals a distinct interaction mode between GoLoco motifs and TPR motifs.

    Science.gov (United States)

    Pan, Zhu; Zhu, Jinwei; Shang, Yuan; Wei, Zhiyi; Jia, Min; Xia, Caihao; Wen, Wenyu; Wang, Wenning; Zhang, Mingjie

    2013-06-01

    LGN plays essential roles in asymmetric cell divisions via its N-terminal TPR-motif-mediated binding to mInsc and NuMA. This scaffolding activity requires the release of the autoinhibited conformation of LGN by binding of Gα(i) to its C-terminal GoLoco (GL) motifs. The interaction between the GL and TPR motifs of LGN represents a distinct GL/target binding mode with an unknown mechanism. Here, we show that two consecutive GL motifs of LGN form a minimal TPR-motif-binding unit. GL12 and GL34 bind to TPR0-3 and TPR4-7, respectively. The crystal structure of a truncated LGN reveals that GL34 forms a pair of parallel α helices and binds to the concave surface of TPR4-7, thereby preventing LGN from binding to other targets. Importantly, the GLs bind to TPR motifs with a mode distinct from that observed in the GL/Gα(i)·GDP complexes. Our results also indicate that multiple and orphan GL motif proteins likely respond to G proteins with distinct mechanisms.

  5. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents...

  6. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and...

  7. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  8. Simulating realistic predator signatures in quantitative fatty acid signature analysis

    Science.gov (United States)

    Bromaghin, Jeffrey F.

    2015-01-01

    Diet estimation is an important field within quantitative ecology, providing critical insights into many aspects of ecology and community dynamics. Quantitative fatty acid signature analysis (QFASA) is a prominent method of diet estimation, particularly for marine mammal and bird species. Investigators using QFASA commonly use computer simulation to evaluate statistical characteristics of diet estimators for the populations they study. Similar computer simulations have been used to explore and compare the performance of different variations of the original QFASA diet estimator. In both cases, computer simulations involve bootstrap sampling prey signature data to construct pseudo-predator signatures with known properties. However, bootstrap sample sizes have been selected arbitrarily and pseudo-predator signatures therefore may not have realistic properties. I develop an algorithm to objectively establish bootstrap sample sizes that generates pseudo-predator signatures with realistic properties, thereby enhancing the utility of computer simulation for assessing QFASA estimator performance. The algorithm also appears to be computationally efficient, resulting in bootstrap sample sizes that are smaller than those commonly used. I illustrate the algorithm with an example using data from Chukchi Sea polar bears (Ursus maritimus) and their marine mammal prey. The concepts underlying the approach may have value in other areas of quantitative ecology in which bootstrap samples are post-processed prior to their use.

  9. Linear array of conserved sequence motifs to discriminate protein subfamilies: study on pyridine nucleotide-disulfide reductases

    Directory of Open Access Journals (Sweden)

    De Las Rivas Javier

    2007-03-01

    Full Text Available Abstract Background The pyridine nucleotide disulfide reductase (PNDR is a large and heterogeneous protein family divided into two classes (I and II, which reflect the divergent evolution of its characteristic disulfide redox active site. However, not all the PNDR members fit into these categories and this suggests the need of further studies to achieve a more comprehensive classification of this complex family. Results A workflow to improve the clusterization of protein families based on the array of linear conserved motifs is designed. The method is applied to the PNDR large family finding two main groups, which correspond to PNDR classes I and II. However, two other separate protein clusters, previously classified as class I in most databases, are outgrouped: the peroxide reductases (NAOX, NAPE and the type II NADH dehydrogenases (NDH-2. In this way, two novel PNDR classes III and IV for NAOX/NAPE and NDH-2 respectively are proposed. By knowledge-driven biochemical and functional data analyses done on the new class IV, a linear array of motifs putatively related to Cu(II-reductase activity is detected in a specific subset of NDH-2. Conclusion The results presented are a novel contribution to the classification of the complex and large PNDR protein family, supporting its reclusterization into four classes. The linear array of motifs detected within the class IV PNDR subfamily could be useful as a signature for a particular subgroup of NDH-2.

  10. Significance analysis of prognostic signatures.

    Directory of Open Access Journals (Sweden)

    Andrew H Beck

    Full Text Available A major goal in translational cancer research is to identify biological signatures driving cancer progression and metastasis. A common technique applied in genomics research is to cluster patients using gene expression data from a candidate prognostic gene set, and if the resulting clusters show statistically significant outcome stratification, to associate the gene set with prognosis, suggesting its biological and clinical importance. Recent work has questioned the validity of this approach by showing in several breast cancer data sets that "random" gene sets tend to cluster patients into prognostically variable subgroups. This work suggests that new rigorous statistical methods are needed to identify biologically informative prognostic gene sets. To address this problem, we developed Significance Analysis of Prognostic Signatures (SAPS which integrates standard prognostic tests with a new prognostic significance test based on stratifying patients into prognostic subtypes with random gene sets. SAPS ensures that a significant gene set is not only able to stratify patients into prognostically variable groups, but is also enriched for genes showing strong univariate associations with patient prognosis, and performs significantly better than random gene sets. We use SAPS to perform a large meta-analysis (the largest completed to date of prognostic pathways in breast and ovarian cancer and their molecular subtypes. Our analyses show that only a small subset of the gene sets found statistically significant using standard measures achieve significance by SAPS. We identify new prognostic signatures in breast and ovarian cancer and their corresponding molecular subtypes, and we show that prognostic signatures in ER negative breast cancer are more similar to prognostic signatures in ovarian cancer than to prognostic signatures in ER positive breast cancer. SAPS is a powerful new method for deriving robust prognostic biological signatures from clinically

  11. Automatic Network Fingerprinting through Single-Node Motifs

    CERN Document Server

    Echtermeyer, Christoph; Rodrigues, Francisco A; Kaiser, Marcus; 10.1371/journal.pone.0015765

    2011-01-01

    Complex networks have been characterised by their specific connectivity patterns (network motifs), but their building blocks can also be identified and described by node-motifs---a combination of local network features. One technique to identify single node-motifs has been presented by Costa et al. (L. D. F. Costa, F. A. Rodrigues, C. C. Hilgetag, and M. Kaiser, Europhys. Lett., 87, 1, 2009). Here, we first suggest improvements to the method including how its parameters can be determined automatically. Such automatic routines make high-throughput studies of many networks feasible. Second, the new routines are validated in different network-series. Third, we provide an example of how the method can be used to analyse network time-series. In conclusion, we provide a robust method for systematically discovering and classifying characteristic nodes of a network. In contrast to classical motif analysis, our approach can identify individual components (here: nodes) that are specific to a network. Such special nodes...

  12. Review article: The mountain motif in the plot of Matthew

    Directory of Open Access Journals (Sweden)

    Gert J. Volschenk

    2010-02-01

    Full Text Available This article reviewed T.L. Donaldson’s book, Jesus on the mountain: A study in Matthean theology, published in 1985 by JSOT Press, Sheffield, and focused on the mountain motif in the structure and plot of the Gospel of Matthew, in addition to the work of Donaldson on the mountain motif as a literary motif and as theological symbol. The mountain is a primary theological setting for Jesus’ ministry and thus is an important setting, serving as one of the literary devices by which Matthew structured and progressed his narrative. The Zion theological and eschatological significance and Second Temple Judaism serve as the historical and theological background for the mountain motif. The last mountain setting (Mt 28:16–20 is the culmination of the three theological themes in the plot of Matthew, namely Christology, ecclesiology and salvation history.

  13. The Origin of Motif Families in Food Webs

    OpenAIRE

    Klaise, Janis; Johnson, Samuel

    2016-01-01

    Food webs have been found to exhibit remarkable motif profiles, patterns in the relative prevalences of all possible three-species sub-graphs, and this has been related to ecosystem properties such as stability and robustness. Analysing 46 food webs of various kinds, we find that most food webs fall into one of two distinct motif families. The separation between the families is well predicted by a global measure of hierarchical order in directed networks - trophic coherence. We find that trop...

  14. Robust and Adaptive MicroRNA-Mediated Incoherent Feedforward Motifs

    Institute of Scientific and Technical Information of China (English)

    XU Feng-Dan; LIU Zeng-Rong; ZHANG Zhi-Yong; SHEN Jian-Wei

    2009-01-01

    We integrate transcriptional and post-transcriptional regulation into microRNA-mediated incoherent feedforward motifs and analyse their dynamical behaviour and functions. The analysis show that the behaviour of the system is almost uninfluenced by the varying input in certain ranges and by introducing of delay and noise. The results indicate that microRNA-mediated incoherent feedforward motifs greatly enhance the robustness of gene regulation.

  15. Three-Dimensional DNA Nanostructures Assembled from DNA Star Motifs.

    Science.gov (United States)

    Tian, Cheng; Zhang, Chuan

    2017-01-01

    Tile-based DNA self-assembly is a promising method in DNA nanotechnology and has produced a wide range of nanostructures by using a small set of unique DNA strands. DNA star motif, as one of DNA tiles, has been employed to assemble varieties of symmetric one-, two-, three-dimensional (1, 2, 3D) DNA nanostructures. Herein, we describe the design principles, assembly methods, and characterization methods of 3D DNA nanostructures assembled from the DNA star motifs.

  16. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  17. Efficient motif finding algorithms for large-alphabet inputs

    Directory of Open Access Journals (Sweden)

    Pavlovic Vladimir

    2010-10-01

    Full Text Available Abstract Background We consider the problem of identifying motifs, recurring or conserved patterns, in the biological sequence data sets. To solve this task, we present a new deterministic algorithm for finding patterns that are embedded as exact or inexact instances in all or most of the input strings. Results The proposed algorithm (1 improves search efficiency compared to existing algorithms, and (2 scales well with the size of alphabet. On a synthetic planted DNA motif finding problem our algorithm is over 10× more efficient than MITRA, PMSPrune, and RISOTTO for long motifs. Improvements are orders of magnitude higher in the same setting with large alphabets. On benchmark TF-binding site problems (FNP, CRP, LexA we observed reduction in running time of over 12×, with high detection accuracy. The algorithm was also successful in rapidly identifying protein motifs in Lipocalin, Zinc metallopeptidase, and supersecondary structure motifs for Cadherin and Immunoglobin families. Conclusions Our algorithm reduces computational complexity of the current motif finding algorithms and demonstrate strong running time improvements over existing exact algorithms, especially in important and difficult cases of large-alphabet sequences.

  18. Transcriptional Network Growing Models Using Motif-Based Preferential Attachment.

    Science.gov (United States)

    Abdelzaher, Ahmed F; Al-Musawi, Ahmad F; Ghosh, Preetam; Mayo, Michael L; Perkins, Edward J

    2015-01-01

    Understanding relationships between architectural properties of gene-regulatory networks (GRNs) has been one of the major goals in systems biology and bioinformatics, as it can provide insights into, e.g., disease dynamics and drug development. Such GRNs are characterized by their scale-free degree distributions and existence of network motifs - i.e., small-node subgraphs that occur more abundantly in GRNs than expected from chance alone. Because these transcriptional modules represent "building blocks" of complex networks and exhibit a wide range of functional and dynamical properties, they may contribute to the remarkable robustness and dynamical stability associated with the whole of GRNs. Here, we developed network-construction models to better understand this relationship, which produce randomized GRNs by using transcriptional motifs as the fundamental growth unit in contrast to other methods that construct similar networks on a node-by-node basis. Because this model produces networks with a prescribed lower bound on the number of choice transcriptional motifs (e.g., downlinks, feed-forward loops), its fidelity to the motif distributions observed in model organisms represents an improvement over existing methods, which we validated by contrasting their resultant motif and degree distributions against existing network-growth models and data from the model organism of the bacterium Escherichia coli. These models may therefore serve as novel testbeds for further elucidating relationships between the topology of transcriptional motifs and network-wide dynamical properties.

  19. Transcriptional Network growing Models using Motif-based Preferential Attachment

    Directory of Open Access Journals (Sweden)

    Ahmed Farouk Abdelzaher

    2015-10-01

    Full Text Available Understanding relationships between architectural properties of gene-regulatory networks (GRNs has been one of the major goals in systems biology and bioinformatics, as it can provide insights into, e.g., disease dynamics and drug development. Such GRNs are characterized by their scale-free degree distributions and existence of network motifs--i.e., small-node subgraphs that occur more abundantly in GRNs than expected from chance alone. Because these transcriptional modules represent ``building blocks'' of complex networks and exhibit a wide range of functional and dynamical properties, they may contribute to the remarkable robustness and dynamical stability associated with the whole of GRNs. Here we developed network-construction models to better understand this relationship, which produce randomized GRNs by using transcriptional motifs as the fundamental growth unit in contrast to other methods that construct similar networks on a node-by-node basis. Because this model produces networks with a prescribed lower bound on the number of choice transcriptional motifs (e.g., downlinks, feed-forward loops, its fidelity to the motif distributions observed in model organisms represents an improvement over existing methods, which we validated by contrasting their resultant motif and degree distributions against existing network-growth models and data from the model organism of the bacterium Escherichia coli. These models may therefore serve as novel testbeds for further elucidating relationships between the topology of transcriptional motifs and network-wide dynamical properties.

  20. The distribution of RNA motifs in natural sequences.

    Science.gov (United States)

    Bourdeau, V; Ferbeyre, G; Pageau, M; Paquin, B; Cedergren, R

    1999-11-15

    Functional analysis of genome sequences has largely ignored RNA genes and their structures. We introduce here the notion of 'ribonomics' to describe the search for the distribution of and eventually the determination of the physiological roles of these RNA structures found in the sequence databases. The utility of this approach is illustrated here by the identification in the GenBank database of RNA motifs having known binding or chemical activity. The frequency of these motifs indicates that most have originated from evolutionary drift and are selectively neutral. On the other hand, their distribution among species and their location within genes suggest that the destiny of these motifs may be more elaborate. For example, the hammerhead motif has a skewed organismal presence, is phylogenetically stable and recent work on a schistosome version confirms its in vivo biological activity. The under-representation of the valine-binding motif and the Rev-binding element in GenBank hints at a detrimental effect on cell growth or viability. Data on the presence and the location of these motifs may provide critical guidance in the design of experiments directed towards the understanding and the manipulation of RNA complexes and activities in vivo.

  1. Signature Visualization of Software Binaries

    Energy Technology Data Exchange (ETDEWEB)

    Panas, T

    2008-07-01

    In this paper we present work on the visualization of software binaries. In particular, we utilize ROSE, an open source compiler infrastructure, to pre-process software binaries, and we apply a landscape metaphor to visualize the signature of each binary (malware). We define the signature of a binary as a metric-based layout of the functions contained in the binary. In our initial experiment, we visualize the signatures of a series of computer worms that all originate from the same line. These visualizations are useful for a number of reasons. First, the images reveal how the archetype has evolved over a series of versions of one worm. Second, one can see the distinct changes between version. This allows the viewer to form conclusions about the development cycle of a particular worm.

  2. A Signature Scheme with Non-Repudiation

    Institute of Scientific and Technical Information of China (English)

    XIN Xiangjun; GUO Xiaoli; XIAO Guozhen

    2006-01-01

    Based on the Schnorr signature scheme, a new signature scheme with non-repudiation is proposed. In this scheme, only the signer and the designated receiver can verify the signature signed by the signer, and if necessary, both the signer and the designated receiver can prove and show the validity of the signature signed by the signer. The proof of the validity of the signature is noninteractive and transferable. To verify and prove the validity of the signature, the signer and the nominated receiver needn't store extra information besides the signature. At the same time, neither the signer nor the designated receiver can deny a valid signature signed. Then, there is no repudiation in this new signature scheme. According to the security analysis of this scheme, it is found the proposed scheme is secure against existential forgery on adaptive chosen message attack.

  3. Structural motif screening reveals a novel, conserved carbohydrate-binding surface in the pathogenesis-related protein PR-5d

    Directory of Open Access Journals (Sweden)

    Moffatt Barbara A

    2010-08-01

    Full Text Available Abstract Background Aromatic amino acids play a critical role in protein-glycan interactions. Clusters of surface aromatic residues and their features may therefore be useful in distinguishing glycan-binding sites as well as predicting novel glycan-binding proteins. In this work, a structural bioinformatics approach was used to screen the Protein Data Bank (PDB for coplanar aromatic motifs similar to those found in known glycan-binding proteins. Results The proteins identified in the screen were significantly associated with carbohydrate-related functions according to gene ontology (GO enrichment analysis, and predicted motifs were found frequently within novel folds and glycan-binding sites not included in the training set. In addition to numerous binding sites predicted in structural genomics proteins of unknown function, one novel prediction was a surface motif (W34/W36/W192 in the tobacco pathogenesis-related protein, PR-5d. Phylogenetic analysis revealed that the surface motif is exclusive to a subfamily of PR-5 proteins from the Solanaceae family of plants, and is absent completely in more distant homologs. To confirm PR-5d's insoluble-polysaccharide binding activity, a cellulose-pulldown assay of tobacco proteins was performed and PR-5d was identified in the cellulose-binding fraction by mass spectrometry. Conclusions Based on the combined results, we propose that the putative binding site in PR-5d may be an evolutionary adaptation of Solanaceae plants including potato, tomato, and tobacco, towards defense against cellulose-containing pathogens such as species of the deadly oomycete genus, Phytophthora. More generally, the results demonstrate that coplanar aromatic clusters on protein surfaces are a structural signature of glycan-binding proteins, and can be used to computationally predict novel glycan-binding proteins from 3 D structure.

  4. Structural and functional studies of a phosphatidic acid-binding antifungal plant defensin MtDef4: Identification of an RGFRRR motif governing fungal cell entry

    Energy Technology Data Exchange (ETDEWEB)

    Sagaram, Uma S.; El-Mounadi, Kaoutar; Buchko, Garry W.; Berg, Howard R.; Kaur, Jagdeep; Pandurangi, Raghoottama; Smith, Thomas J.; Shah, Dilip

    2013-12-04

    A highly conserved plant defensin MtDef4 potently inhibits the growth of a filamentous fungus Fusarium graminearum. MtDef4 is internalized by cells of F. graminearum. To determine its mechanism of fungal cell entry and antifungal action, NMR solution structure of MtDef4 has been determined. The analysis of its structure has revealed a positively charged patch on the surface of the protein consisting of arginine residues in its γ-core signature, a major determinant of the antifungal activity of MtDef4. Here, we report functional analysis of the RGFRRR motif of the γ-core signature of MtDef4. The replacement of RGFRRR to AAAARR or to RGFRAA not only abolishes fungal cell entry but also results in loss of the antifungal activity of MtDef4. MtDef4 binds strongly to phosphatidic acid (PA), a precursor for the biosynthesis of membrane phospholipids and a signaling lipid known to recruit cytosolic proteins to membranes. Mutations of RGFRRR which abolish fungal cell entry of MtDef4 also impair its binding to PA. Our results suggest that RGFRRR motif is a translocation signal for entry of MtDef4 into fungal cells and that this positively charged motif likely mediates interaction of this defensin with PA as part of its antifungal action.

  5. An Improved Proxy Multi-Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    GU Li-ze; ZHANG Sheng; YANG Yi-xian

    2005-01-01

    Based on the Kim-like's proxy multi-signature scheme[1],an improved proxy multi-signature scheme is proposed.The new scheme overcomes the two problems in the Kim-like's proxy multi-signature scheme:(1)Security issue(every original signer can forge a valid proxy multi-signature for any message);(2)Efficiency issue(both the size of the proxy multi-signature and the efficiency of signature checking are dependent on the number of the original signers).

  6. Verifiably Encrypted Signatures Without Random Oracles

    Institute of Scientific and Technical Information of China (English)

    LI Xiang-xue; CHEN Ke-fei; LIU Sheng-li; LI Shi-qun

    2006-01-01

    Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satisfied. This paper presented new verifiably encrypted signatures from bilinear pairings. The proposed signatures share the properties of simplicity and efficiency with existing verifiably encrypted signature schemes. To support the proposed scheme, it also exhibited security proofs that do not use random oracle assumption. For existential unforgeability, there exist tight security reductions from the proposed verifiably encrypted signature scheme to a strong but reasonable computational assumption.

  7. Epigenetic Signatures of Cigarette Smoking

    NARCIS (Netherlands)

    R. Joehanes (Roby); Just, A.C. (Allan C.); R.E. Marioni (Riccardo); L.C. Pilling (Luke); L.M. Reynolds (Lindsay); Mandaviya, P.R. (Pooja R.); W. Guan (Weihua); Xu, T. (Tao); C.E. Elks (Cathy); Aslibekyan, S. (Stella); H. Moreno-Macías (Hortensia); J.A. Smith (Jennifer A); J. Brody (Jennifer); Dhingra, R. (Radhika); P. Yousefi (Paul); J.S. Pankow (James); Kunze, S. (Sonja); Shah, S.H. (Sonia H.); A.F. McRae (Allan F.); K. Lohman (Kurt); Sha, J. (Jin); D. Absher (Devin); L. Ferrucci (Luigi); Zhao, W. (Wei); E.W. Demerath (Ellen); J. Bressler (Jan); M.L. Grove (Megan); T. Huan (Tianxiao); C. Liu (Chunyu); Mendelson, M.M. (Michael M.); C. Yao (Chen); D.P. Kiel (Douglas P.); A. Peters (Annette); R. Wang-Sattler (Rui); P.M. Visscher (Peter); N.R. Wray (Naomi); J.M. Starr (John); Ding, J. (Jingzhong); Rodriguez, C.J. (Carlos J.); N.J. Wareham (Nick); Irvin, M.R. (Marguerite R.); Zhi, D. (Degui); M. Barrdahl (Myrto); P. Vineis (Paolo); Ambatipudi, S. (Srikant); A.G. Uitterlinden (André); A. Hofman (Albert); Schwartz, J. (Joel); Colicino, E. (Elena); Hou, L. (Lifang); Vokonas, P.S. (Pantel S.); D.G. Hernandez (Dena); A. Singleton (Andrew); S. Bandinelli (Stefania); S.T. Turner (Stephen); E.B. Ware (Erin B.); Smith, A.K. (Alicia K.); T. Klengel (Torsten); E.B. Binder (Elisabeth B.); B.M. Psaty (Bruce); K.D. Taylor (Kent); S.A. Gharib (Sina); Swenson, B.R. (Brenton R.); Liang, L. (Liming); D.L. Demeo (Dawn L.); G.T. O'Connor (George); Z. Herceg (Zdenko); Ressler, K.J. (Kerry J.); K.N. Conneely (Karen N.); N. Sotoodehnia (Nona); Kardia, S.L.R. (Sharon L. R.); D. Melzer (David); A.A. Baccarelli (Andrea A.); J.B.J. van Meurs (Joyce); I. Romieu (Isabelle); D.K. Arnett (Donna); Ong, K.K. (Ken K.); Y. Liu (Yongmei); M. Waldenberger (Melanie); I.J. Deary (Ian J.); M. Fornage (Myriam); D. Levy (Daniel); S.J. London (Stephanie J.)

    2016-01-01

    textabstractBackground-DNA methylation leaves a long-term signature of smoking exposure and is one potential mechanism by which tobacco exposure predisposes to adverse health outcomes, such as cancers, osteoporosis, lung, and cardiovascular disorders. Methods and Results-To comprehensively determine

  8. Discovering motifs in ranked lists of DNA sequences.

    Directory of Open Access Journals (Sweden)

    Eran Eden

    2007-03-01

    Full Text Available Computational methods for discovery of sequence elements that are enriched in a target set compared with a background set are fundamental in molecular biology research. One example is the discovery of transcription factor binding motifs that are inferred from ChIP-chip (chromatin immuno-precipitation on a microarray measurements. Several major challenges in sequence motif discovery still require consideration: (i the need for a principled approach to partitioning the data into target and background sets; (ii the lack of rigorous models and of an exact p-value for measuring motif enrichment; (iii the need for an appropriate framework for accounting for motif multiplicity; (iv the tendency, in many of the existing methods, to report presumably significant motifs even when applied to randomly generated data. In this paper we present a statistical framework for discovering enriched sequence elements in ranked lists that resolves these four issues. We demonstrate the implementation of this framework in a software application, termed DRIM (discovery of rank imbalanced motifs, which identifies sequence motifs in lists of ranked DNA sequences. We applied DRIM to ChIP-chip and CpG methylation data and obtained the following results. (i Identification of 50 novel putative transcription factor (TF binding sites in yeast ChIP-chip data. The biological function of some of them was further investigated to gain new insights on transcription regulation networks in yeast. For example, our discoveries enable the elucidation of the network of the TF ARO80. Another finding concerns a systematic TF binding enhancement to sequences containing CA repeats. (ii Discovery of novel motifs in human cancer CpG methylation data. Remarkably, most of these motifs are similar to DNA sequence elements bound by the Polycomb complex that promotes histone methylation. Our findings thus support a model in which histone methylation and CpG methylation are mechanistically linked

  9. Binding properties of SUMO-interacting motifs (SIMs) in yeast.

    Science.gov (United States)

    Jardin, Christophe; Horn, Anselm H C; Sticht, Heinrich

    2015-03-01

    Small ubiquitin-like modifier (SUMO) conjugation and interaction play an essential role in many cellular processes. A large number of yeast proteins is known to interact non-covalently with SUMO via short SUMO-interacting motifs (SIMs), but the structural details of this interaction are yet poorly characterized. In the present work, sequence analysis of a large dataset of 148 yeast SIMs revealed the existence of a hydrophobic core binding motif and a preference for acidic residues either within or adjacent to the core motif. Thus the sequence properties of yeast SIMs are highly similar to those described for human. Molecular dynamics simulations were performed to investigate the binding preferences for four representative SIM peptides differing in the number and distribution of acidic residues. Furthermore, the relative stability of two previously observed alternative binding orientations (parallel, antiparallel) was assessed. For all SIMs investigated, the antiparallel binding mode remained stable in the simulations and the SIMs were tightly bound via their hydrophobic core residues supplemented by polar interactions of the acidic residues. In contrary, the stability of the parallel binding mode is more dependent on the sequence features of the SIM motif like the number and position of acidic residues or the presence of additional adjacent interaction motifs. This information should be helpful to enhance the prediction of SIMs and their binding properties in different organisms to facilitate the reconstruction of the SUMO interactome.

  10. Fitting a mixture model by expectation maximization to discover motifs in biopolymers

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, T.L.; Elkan, C. [Univ. of California, La Jolla, CA (United States)

    1994-12-31

    The algorithm described in this paper discovers one or more motifs in a collection of DNA or protein sequences by using the technique of expectation maximization to fit a two-component finite mixture model to the set of sequences. Multiple motifs are found by fitting a mixture model to the data, probabilistically erasing the occurrences of the motif thus found, and repeating the process to find successive motifs. The algorithm requires only a set of unaligned sequences and a number specifying the width of the motifs as input. It returns a model of each motif and a threshold which together can be used as a Bayes-optimal classifier for searching for occurrences of the motif in other databases. The algorithm estimates how many times each motif occurs in each sequence in the dataset and outputs an alignment of the occurrences of the motif. The algorithm is capable of discovering several different motifs with differing numbers of occurrences in a single dataset.

  11. Mutations at the signature sequence of CFTR create a Cd(2+)-gated chloride channel.

    Science.gov (United States)

    Wang, Xiaohui; Bompadre, Silvia G; Li, Min; Hwang, Tzyh-Chang

    2009-01-01

    The canonical sequence LSGGQ, also known as the signature sequence, defines the adenosine triphosphate (ATP)-binding cassette transporter superfamily. Crystallographic studies reveal that the signature sequence, together with the Walker A and Walker B motifs, forms the ATP-binding pocket upon dimerization of the two nucleotide-binding domains (NBDs) in a head-to-tail configuration. The importance of the signature sequence is attested by the fact that a glycine to aspartate mutation (i.e., G551D) in cystic fibrosis transmembrane conductance regulator (CFTR) results in a severe phenotype of cystic fibrosis. We previously showed that the G551D mutation completely eliminates ATP-dependent gating of the CFTR chloride channel. Here, we report that micromolar [Cd(2+)] can dramatically increase the activity of G551D-CFTR in the absence of ATP. This effect of Cd(2+) is not seen in wild-type channels or in G551A. Pretreatment of G551D-CFTR with the cysteine modification reagent 2-aminoethyl methane thiosulfonate hydrobromide protects the channel from Cd(2+) activation, suggesting an involvement of endogenous cysteine residue(s) in mediating this effect of Cd(2+). The mutants G551C, L548C, and S549C, all in the signature sequence of CFTR's NBD1, show robust response to Cd(2+). On the other hand, negligible effects of Cd(2+) were seen with T547C, Q552C, and R553C, indicating that a specific region of the signature sequence is involved in transmitting the signal of Cd(2+) binding to the gate. Collectively, these results suggest that the effect of Cd(2+) is mediated by a metal bridge formation between yet to be identified cysteine residue(s) and the engineered aspartate or cysteine in the signature sequence. We propose that the signature sequence serves as a switch that transduces the signal of ligand binding to the channel gate.

  12. Elliptic Curve Blind Digital Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    YOULin; YANGYixian; WENQiaoyan

    2003-01-01

    Blind signature schemes are important cryptographic protocols in guaranteeing the privacy or anonymity of the users.Three new blind signature schemes and their corresponding generalizations are pro-posed. Moreover, their securities are simply analyzed.

  13. Motifs in Triadic Random Graphs based on Steiner Triple Systems

    CERN Document Server

    Winkler, Marco

    2013-01-01

    Conventionally, pairwise relationships between nodes are considered to be the fundamental building blocks of complex networks. However, over the last decade the overabundance of certain sub-network patterns, so called motifs, has attracted high attention. It has been hypothesized, these motifs, instead of links, serve as the building blocks of network structures. Although the relation between a network's topology and the general properties of the system, such as its function, its robustness against perturbations, or its efficiency in spreading information is the central theme of network science, there is still a lack of sound generative models needed for testing the functional role of subgraph motifs. Our work aims to overcome this limitation. We employ the framework of exponential random graphs (ERGMs) to define novel models based on triadic substructures. The fact that only a small portion of triads can actually be set independently poses a challenge for the formulation of such models. To overcome this obst...

  14. Network Motifs in Object-Oriented Software Systems

    CERN Document Server

    Ma, Yutao; Liu, Jing

    2008-01-01

    Nowadays, software has become a complex piece of work that may be beyond our control. Understanding how software evolves over time plays an important role in controlling software development processes. Recently, a few researchers found the quantitative evidence of structural duplication in software systems or web applications, which is similar to the evolutionary trend found in biological systems. To investigate the principles or rules of software evolution, we introduce the relevant theories and methods of complex networks into structural evolution and change of software systems. According to the results of our experiment on network motifs, we find that the stability of a motif shows positive correlation with its abundance and a motif with high Z score tends to have stable structure. These findings imply that the evolution of software systems is based on functional cloning as well as structural duplication and tends to be structurally stable. So, the work presented in this paper will be useful for the analys...

  15. How pathogens use linear motifs to perturb host cell networks

    KAUST Repository

    Via, Allegra

    2015-01-01

    Molecular mimicry is one of the powerful stratagems that pathogens employ to colonise their hosts and take advantage of host cell functions to guarantee their replication and dissemination. In particular, several viruses have evolved the ability to interact with host cell components through protein short linear motifs (SLiMs) that mimic host SLiMs, thus facilitating their internalisation and the manipulation of a wide range of cellular networks. Here we present convincing evidence from the literature that motif mimicry also represents an effective, widespread hijacking strategy in prokaryotic and eukaryotic parasites. Further insights into host motif mimicry would be of great help in the elucidation of the molecular mechanisms behind host cell invasion and the development of anti-infective therapeutic strategies.

  16. Partially Blind Signatures Based on Quantum Cryptography

    Science.gov (United States)

    Cai, Xiao-Qiu; Niu, Hui-Fang

    2012-12-01

    In a partially blind signature scheme, the signer explicitly includes pre-agreed common information in the blind signature, which can improve the availability and performance. We present a new partially blind signature scheme based on fundamental properties of quantum mechanics. In addition, we analyze the security of this scheme, and show it is not possible to forge valid partially blind signatures. Moreover, the comparisons between this scheme and those based on public-key cryptography are also discussed.

  17. Blind Signature Scheme Based on Chebyshev Polynomials

    OpenAIRE

    Maheswara Rao Valluri

    2011-01-01

    A blind signature scheme is a cryptographic protocol to obtain a valid signature for a message from a signer such that signer’s view of the protocol can’t be linked to the resulting message signature pair. This paper presents blind signature scheme using Chebyshev polynomials. The security of the given scheme depends upon the intractability of the integer factorization problem and discrete logarithms ofChebyshev polynomials.

  18. Blind Signature Scheme Based on Chebyshev Polynomials

    Directory of Open Access Journals (Sweden)

    Maheswara Rao Valluri

    2011-12-01

    Full Text Available A blind signature scheme is a cryptographic protocol to obtain a valid signature for a message from a signer such that signer’s view of the protocol can’t be linked to the resulting message signature pair. This paper presents blind signature scheme using Chebyshev polynomials. The security of the given scheme depends upon the intractability of the integer factorization problem and discrete logarithms ofChebyshev polynomials.

  19. Quantum group blind signature scheme without entanglement

    Science.gov (United States)

    Xu, Rui; Huang, Liusheng; Yang, Wei; He, Libao

    2011-07-01

    In this paper we propose a quantum group blind signature scheme designed for distributed e-voting system. Our scheme combines the properties of group signature and blind signature to provide anonymity of voters in an e-voting system. The unconditional security of our scheme is ensured by quantum mechanics. Without employing entanglement, the proposed scheme is easier to be realized comparing with other quantum signature schemes.

  20. Selection against spurious promoter motifs correlates withtranslational efficiency across bacteria

    Energy Technology Data Exchange (ETDEWEB)

    Froula, Jeffrey L.; Francino, M. Pilar

    2007-05-01

    Because binding of RNAP to misplaced sites could compromise the efficiency of transcription, natural selection for the optimization of gene expression should regulate the distribution of DNA motifs capable of RNAP-binding across the genome. Here we analyze the distribution of the -10 promoter motifs that bind the {sigma}{sup 70} subunit of RNAP in 42 bacterial genomes. We show that selection on these motifs operates across the genome, maintaining an over-representation of -10 motifs in regulatory sequences while eliminating them from the nonfunctional and, in most cases, from the protein coding regions. In some genomes, however, -10 sites are over-represented in the coding sequences; these sites could induce pauses effecting regulatory roles throughout the length of a transcriptional unit. For nonfunctional sequences, the extent of motif under-representation varies across genomes in a manner that broadly correlates with the number of tRNA genes, a good indicator of translational speed and growth rate. This suggests that minimizing the time invested in gene transcription is an important selective pressure against spurious binding. However, selection against spurious binding is detectable in the reduced genomes of host-restricted bacteria that grow at slow rates, indicating that components of efficiency other than speed may also be important. Minimizing the number of RNAP molecules per cell required for transcription, and the corresponding energetic expense, may be most relevant in slow growers. These results indicate that genome-level properties affecting the efficiency of transcription and translation can respond in an integrated manner to optimize gene expression. The detection of selection against promoter motifs in nonfunctional regions also implies that no sequence may evolve free of selective constraints, at least in the relatively small and unstructured genomes of bacteria.

  1. [Specific motifs in the genomes of the family Chlamydiaceae].

    Science.gov (United States)

    Demkin, V V; Kirillova, N V

    2012-01-01

    Specific motifs in the genomes of the family Chlamydiaceae were discussed. The search for genetic markers ofbacteria identification and typing is an urgent problem. The progress in sequencing technology resulted in compilation of the database of genomic nucleotide sequences of bacteria. This raised the problem of the search and selection of genetic targets for identification and typing in bacterial genes based on comparative analysis of complete genomic sequences. The goal of this work was to implement comparative genetic analysis of different species of the family Chlamydiaceae. This analysis was focused to detection of specific motifs capable of serving as genetic marker of this family. The consensus domains were detected using the Visual Basic for Application software for MS Excel. Complete coincidence of segments 25 nucleotide long was used as the test for consensus domain selection. One complete genomic sequence for each of 8 bacterial species was taken for the experiment. The experimental sample did not contain complete sequence of C. suis, because at the moment of this research this species was absence in the database GenBank. Comparative assay of the sequences of the C. trachomatis and other representatives of the family Chlamydiaceae revealed 41 common motifs for 8 Chlamydiaceae species tested in this work. The maximal number of consensus motifs was observed in genes of ribosomal RNA and t-RNA. In addition to genes of r-RNA and t-RNA consensus motifs were observed in 5 genes and 6 intergene segments. The gene CTL0299, CTLO800, dagA, and hctA consensus motifs detected in this work can be regarded as identification domains of the family Chlamydiaceae.

  2. Some results on more flexible versions of Graph Motif

    CERN Document Server

    Rizzi, Romeo

    2012-01-01

    The problems studied in this paper originate from Graph Motif, a problem introduced in 2006 in the context of biological networks. Informally speaking, it consists in deciding if a multiset of colors occurs in a connected subgraph of a vertex-colored graph. Due to the high rate of noise in the biological data, more flexible definitions of the problem have been outlined. We present in this paper two inapproximability results for two different optimization variants of Graph Motif. We also study another definition of the problem, when the connectivity constraint is replaced by modularity. While the problem stays NP-complete, it allows algorithms in FPT for biologically relevant parameterizations.

  3. BayesMD: flexible biological modeling for motif discovery

    DEFF Research Database (Denmark)

    Tang, Man-Hung Eric; Krogh, Anders; Winther, Ole

    2008-01-01

    We present BayesMD, a Bayesian Motif Discovery model with several new features. Three different types of biological a priori knowledge are built into the framework in a modular fashion. A mixture of Dirichlets is used as prior over nucleotide probabilities in binding sites. It is trained on trans......We present BayesMD, a Bayesian Motif Discovery model with several new features. Three different types of biological a priori knowledge are built into the framework in a modular fashion. A mixture of Dirichlets is used as prior over nucleotide probabilities in binding sites. It is trained...

  4. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the...

  5. Evaluation of infrared signature suppression of ships

    NARCIS (Netherlands)

    Schleijpen, H.M.A.

    1996-01-01

    Reduction of the infrared signature of warships helps to increase their survivability. Two methods to reduce the infrared signature are discussed: the cooling of exhaust gases and the application of low emissivity paint. The infrared signature of a generic frigate has been calculated with and withou

  6. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by...

  7. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the...

  8. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting...

  9. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4... ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an... be signed by that individual, and the signature shall be followed by the individual's typed,...

  10. Polarization signatures of airborne particulates

    Science.gov (United States)

    Raman, Prashant; Fuller, Kirk A.; Gregory, Don A.

    2013-07-01

    Exploratory research has been conducted with the aim of completely determining the polarization signatures of selected particulates as a function of wavelength. This may lead to a better understanding of the interaction between electromagnetic radiation and such materials, perhaps leading to the point detection of bio-aerosols present in the atmosphere. To this end, a polarimeter capable of measuring the complete Mueller matrix of highly scattering samples in transmission and reflection (with good spectral resolution from 300 to 1100 nm) has been developed. The polarization properties of Bacillus subtilis (surrogate for anthrax spore) are compared to ambient particulate matter species such as pollen, dust, and soot. Differentiating features in the polarization signatures of these samples have been identified, thus demonstrating the potential applicability of this technique for the detection of bio-aerosol in the ambient atmosphere.

  11. Discovery of functional elements in 12 Drosophila genomes using evolutionary signatures

    DEFF Research Database (Denmark)

    Stark, Alexander; Lin, Michael F; Kheradpour, Pouya;

    2007-01-01

    element shows characteristic patterns of change, or 'evolutionary signatures', dictated by its precise selective constraints. Such signatures enable recognition of new protein-coding genes and exons, spurious and incorrect gene annotations, and numerous unusual gene structures, including abundant stop......Sequencing of multiple related species followed by comparative genomics analysis constitutes a powerful approach for the systematic understanding of any genome. Here, we use the genomes of 12 Drosophila species for the de novo discovery of functional elements in the fly. Each type of functional......-codon readthrough. Similarly, we predict non-protein-coding RNA genes and structures, and new microRNA (miRNA) genes. We provide evidence of miRNA processing and functionality from both hairpin arms and both DNA strands. We identify several classes of pre- and post-transcriptional regulatory motifs, and predict...

  12. Elucidation of a C-Rich Signature Motif in Target mRNAs of RNA-Binding Protein TIAR▿ †

    OpenAIRE

    Kim, Henry S.; Kuwano, Yuki; Zhan, Ming; Pullmann, Rudolf; Mazan-Mamczarz, Krystyna; Li, Huai; Kedersha, Nancy; Anderson, Paul; Wilce, Matthew C J; Gorospe, Myriam; Wilce, Jacqueline A.

    2007-01-01

    The RNA-binding protein TIAR (related to TIA-1 [T-cell-restricted intracellular antigen 1]) was shown to associate with subsets of mRNAs bearing U-rich sequences in their 3′ untranslated regions. TIAR can function as a translational repressor, particularly in response to cytotoxic agents. Using unstressed colon cancer cells, collections of mRNAs associated with TIAR were isolated by immunoprecipitation (IP) of (TIAR-RNA) ribonucleoprotein (RNP) complexes, identified by microarray analysis, an...

  13. Enhance Confidentiality of Threshold Signature for MANET

    Institute of Scientific and Technical Information of China (English)

    GUO Wei; XIONG Zhongwei

    2006-01-01

    The participating wireless mobile node that mobile ad hoc network (MANET) communications need to forward may be malicious. That means not only adversary might be able to acquire some sensitive information of the threshold signatures from the compromised node, but also the partial signatures may be fabricated by malicious node, the advantages of threshold signatures would disappear. Signing and encrypting the sensitive information of the threshold signatures, and only the specified receiver can recover it, which will improve the confidentiality of threshold signatures. The security analysis shows the method is suitable for the secure characteristic of MANET that has the malicious nodes, and the message transmission is secure can against the attack.

  14. A New Signature Scheme with Shared Verification

    Institute of Scientific and Technical Information of China (English)

    JIA Xiao-yun; LUO Shou-shan; YUAN Chao-wei

    2006-01-01

    With expanding user demands, digital signature techniques are also being expanded greatly, from single signature and single verification techniques to techniques supporting multi-users. This paper presents a new digital signature scheme vith shared verification based on the fiat-shamir signature scheme. This scheme is suitable not only for digital signatures of one public key, but also for situations where multiple public keys are required. In addition, the scheme can resist all kinds of collusion, making it more practicable and safer. Additionally it is more efficient than other schemes.

  15. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  16. Positional bias of general and tissue-specific regulatory motifs in mouse gene promoters

    Directory of Open Access Journals (Sweden)

    Farré Domènec

    2007-12-01

    Full Text Available Abstract Background The arrangement of regulatory motifs in gene promoters, or promoter architecture, is the result of mutation and selection processes that have operated over many millions of years. In mammals, tissue-specific transcriptional regulation is related to the presence of specific protein-interacting DNA motifs in gene promoters. However, little is known about the relative location and spacing of these motifs. To fill this gap, we have performed a systematic search for motifs that show significant bias at specific promoter locations in a large collection of housekeeping and tissue-specific genes. Results We observe that promoters driving housekeeping gene expression are enriched in particular motifs with strong positional bias, such as YY1, which are of little relevance in promoters driving tissue-specific expression. We also identify a large number of motifs that show positional bias in genes expressed in a highly tissue-specific manner. They include well-known tissue-specific motifs, such as HNF1 and HNF4 motifs in liver, kidney and small intestine, or RFX motifs in testis, as well as many potentially novel regulatory motifs. Based on this analysis, we provide predictions for 559 tissue-specific motifs in mouse gene promoters. Conclusion The study shows that motif positional bias is an important feature of mammalian proximal promoters and that it affects both general and tissue-specific motifs. Motif positional constraints define very distinct promoter architectures depending on breadth of expression and type of tissue.

  17. Nephila clavipes Flagelliform silk-like GGX motifs contribute to extensibility and spacer motifs contribute to strength in synthetic spider silk fibers.

    Science.gov (United States)

    Adrianos, Sherry L; Teulé, Florence; Hinman, Michael B; Jones, Justin A; Weber, Warner S; Yarger, Jeffery L; Lewis, Randolph V

    2013-06-10

    Flagelliform spider silk is the most extensible silk fiber produced by orb weaver spiders, though not as strong as the dragline silk of the spider. The motifs found in the core of the Nephila clavipes flagelliform Flag protein are GGX, spacer, and GPGGX. Flag does not contain the polyalanine motif known to provide the strength of dragline silk. To investigate the source of flagelliform fiber strength, four recombinant proteins were produced containing variations of the three core motifs of the Nephila clavipes flagelliform Flag protein that produces this type of fiber. The as-spun fibers were processed in 80% aqueous isopropanol using a standardized process for all four fiber types, which produced improved mechanical properties. Mechanical testing of the recombinant proteins determined that the GGX motif contributes extensibility and the spacer motif contributes strength to the recombinant fibers. Recombinant protein fibers containing the spacer motif were stronger than the proteins constructed without the spacer that contained only the GGX motif or the combination of the GGX and GPGGX motifs. The mechanical and structural X-ray diffraction analysis of the recombinant fibers provide data that suggests a functional role of the spacer motif that produces tensile strength, though the spacer motif is not clearly defined structurally. These results indicate that the spacer is likely a primary contributor of strength, with the GGX motif supplying mobility to the protein network of native N. clavipes flagelliform silk fibers.

  18. Linear motif atlas for phosphorylation-dependent signaling

    DEFF Research Database (Denmark)

    Miller, Martin Lee; Jensen, LJ; Diella, F;

    2008-01-01

    Systematic and quantitative analysis of protein phosphorylation is revealing dynamic regulatory networks underlying cellular responses to environmental cues. However, matching these sites to the kinases that phosphorylate them and the phosphorylation-dependent binding domains that may subsequently...... sequence models of linear motifs. The atlas is available as a community resource (http://netphorest.info)....

  19. Motifs in triadic random graphs based on Steiner triple systems

    Science.gov (United States)

    Winkler, Marco; Reichardt, Jörg

    2013-08-01

    Conventionally, pairwise relationships between nodes are considered to be the fundamental building blocks of complex networks. However, over the last decade, the overabundance of certain subnetwork patterns, i.e., the so-called motifs, has attracted much attention. It has been hypothesized that these motifs, instead of links, serve as the building blocks of network structures. Although the relation between a network's topology and the general properties of the system, such as its function, its robustness against perturbations, or its efficiency in spreading information, is the central theme of network science, there is still a lack of sound generative models needed for testing the functional role of subgraph motifs. Our work aims to overcome this limitation. We employ the framework of exponential random graph models (ERGMs) to define models based on triadic substructures. The fact that only a small portion of triads can actually be set independently poses a challenge for the formulation of such models. To overcome this obstacle, we use Steiner triple systems (STSs). These are partitions of sets of nodes into pair-disjoint triads, which thus can be specified independently. Combining the concepts of ERGMs and STSs, we suggest generative models capable of generating ensembles of networks with nontrivial triadic Z-score profiles. Further, we discover inevitable correlations between the abundance of triad patterns, which occur solely for statistical reasons and need to be taken into account when discussing the functional implications of motif statistics. Moreover, we calculate the degree distributions of our triadic random graphs analytically.

  20. How curved membranes recruit amphipathic helices and protein anchoring motifs

    DEFF Research Database (Denmark)

    Hatzakis, Nikos; Bhatia, Vikram Kjøller; Larsen, Jannik;

    2009-01-01

    Lipids and several specialized proteins are thought to be able to sense the curvature of membranes (MC). Here we used quantitative fluorescence microscopy to measure curvature-selective binding of amphipathic motifs on single liposomes 50-700 nm in diameter. Our results revealed that sensing...

  1. Provably secure robust threshold partial blind signature

    Institute of Scientific and Technical Information of China (English)

    CAO Zhenfu; ZHU Haojin; LU Rongxing

    2006-01-01

    Threshold digital signature and blind signature are playing important roles in cryptography as well as in practical applications such as e-cash and e-voting systems.Over the past few years, many cryptographic researchers have made considerable headway in this field. However, to our knowledge, most of existing threshold blind signature schemes are based on the discrete logarithm problem. In this paper, we propose a new robust threshold partial blind signature scheme based on improved RSA cryptosystem.This scheme is the first threshold partial blind signature scheme based on factoring, and the robustness of threshold partial blind signature is also introduced. Moreover, in practical application, the proposed scheme will be especially suitable for blind signature-based voting systems with multiple administrators and secure electronic cash systems to prevent their abuse.

  2. Infrared signature generation of airborne targets

    Science.gov (United States)

    Whalen, Michael R.

    1993-08-01

    This report proposes a generic methodology for generating infrared signatures of airborne targets. The various issues, assumptions and simplifications utilized in signature studies are outlines to insure baseline consistency among future models and evaluation tools. More specifically, the target is characterized on a component level, and the at-aperture signature is generated by the correct inclusion of atmospheric transmission. While the technique and general concepts may apply to all airborne targets, this study places emphasis on cruise missiles and related targets due to their low contrast. For these targets, the background signature becomes more important as both the emitted target radiance and the reflected background radiance contribute to the overall signature. Example target signatures generated using the proposed methodology will be presented following the discussion of signature modeling.

  3. TopSig: Topology Preserving Document Signatures

    CERN Document Server

    Geva, Shlomo

    2012-01-01

    Performance comparisons between File Signatures and Inverted Files for text retrieval have previously shown several significant shortcomings of file signatures relative to inverted files. The inverted file approach underpins most state-of-the-art search engine algorithms, such as Language and Probabilistic models. It has been widely accepted that traditional file signatures are inferior alternatives to inverted files. This paper describes TopSig, a new approach to the construction of file signatures. Many advances in semantic hashing and dimensionality reduction have been made in recent times, but these were not so far linked to general purpose, signature file based, search engines. This paper introduces a different signature file approach that builds upon and extends these recent advances. We are able to demonstrate significant improvements in the performance of signature file based indexing and retrieval, performance that is comparable to that of state of the art inverted file based systems, including Langu...

  4. Certificateless universal designated verifier signature schemes

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unable to convince anyone else of this fact.The previous constructions of universal designated verifier signature rely on the underlying public key infrastructure, that needs both signers and verifiers to verify the authenticity of the public keys, and hence, the certificates are required.This article presents the first model and construction of the certificateless universal designated verifier signature scheme, in which the certificates are not needed.The proposed scheme satisfies all the requirements of the universal designated verifier signature in the certificateless system.Security proofs are provided for the scheme based on the random oracle model, assuming that the Bilinear diffie-hellman (BDH) problem is hard to solve.

  5. Sequence alignment reveals possible MAPK docking motifs on HIV proteins.

    Directory of Open Access Journals (Sweden)

    Perry Evans

    Full Text Available Over the course of HIV infection, virus replication is facilitated by the phosphorylation of HIV proteins by human ERK1 and ERK2 mitogen-activated protein kinases (MAPKs. MAPKs are known to phosphorylate their substrates by first binding with them at a docking site. Docking site interactions could be viable drug targets because the sequences guiding them are more specific than phosphorylation consensus sites. In this study we use multiple bioinformatics tools to discover candidate MAPK docking site motifs on HIV proteins known to be phosphorylated by MAPKs, and we discuss the possibility of targeting docking sites with drugs. Using sequence alignments of HIV proteins of different subtypes, we show that MAPK docking patterns previously described for human proteins appear on the HIV matrix, Tat, and Vif proteins in a strain dependent manner, but are absent from HIV Rev and appear on all HIV Nef strains. We revise the regular expressions of previously annotated MAPK docking patterns in order to provide a subtype independent motif that annotates all HIV proteins. One revision is based on a documented human variant of one of the substrate docking motifs, and the other reduces the number of required basic amino acids in the standard docking motifs from two to one. The proposed patterns are shown to be consistent with in silico docking between ERK1 and the HIV matrix protein. The motif usage on HIV proteins is sufficiently different from human proteins in amino acid sequence similarity to allow for HIV specific targeting using small-molecule drugs.

  6. Improvement of Some Proxy Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    LIJiguo; LIANGZhenghe; ZHUYuelong; HANGYichen

    2005-01-01

    In 1996, Mambo et al. introduced the concept of proxy signature. Proxy signature can be applied to mobile agent, e-vote etc. Recently, Sun and Hsieh showed that Lee et al's strong proxy signature scheme and its application to multi-proxy signature scheme, Shum and Wei's privacy-protected strong proxy signature scheme, and Park and Lee's nominative proxy signature scheme were all insecure against the original signer's forgery attack. In this paper, we show those proxy signature schemes don't withstand public key substitution attack and give some slight but important modifications for those proxy signature schemes such that the resulting schemes are secure against the original signer's forgery attack and public key substitution attack. In addition, we show that Park and Lee's nominative proxy signature scheme don't satisfy strong nonrepudiation and strong identifiability. Improved schemes satisfy all properties of strong proxy signature scheme, and doesn't use secure channel between the original signer and the proxy signer.

  7. An Identity Based Aggregate Signature from Pairings

    Directory of Open Access Journals (Sweden)

    Yike Yu

    2011-04-01

    Full Text Available An aggregate signature is a useful digital signature that supports aggregation: Given n signatures on n distinct messages from n distinct users, aggregate signature scheme is possible to aggregate all these signature into a single short signature. This single signature, along with the n original messages will convince any verifier that the n users did indeed sign the n original messages respectively (i.e., for i=1,...,n user i signed message  mi. In this paper, we propose an identity based aggregate signature scheme which requires constant pairing operations in the verification and the size of aggregate signature is independent of the number of signers. We prove that the proposed signature scheme is secure against existential forgery under adaptively chosen message and identity attack in the random oracle model assuming the intractability of the computational Diffie-Hellman problem.

  8. Observational Signatures of Magnetic Reconnection

    Science.gov (United States)

    Savage, Sabrina

    2014-01-01

    Magnetic reconnection is often referred to as the primary source of energy release during solar flares. Directly observing reconnection occurring in the solar atmosphere, however, is not trivial considering that the scale size of the diffusion region is magnitudes smaller than the observational capabilities of current instrumentation, and coronal magnetic field measurements are not currently sufficient to capture the process. Therefore, predicting and studying observationally feasible signatures of the precursors and consequences of reconnection is necessary for guiding and verifying the simulations that dominate our understanding. I will present a set of such observations, particularly in connection with long-duration solar events, and compare them with recent simulations and theoretical predictions.

  9. Quantum broadcasting multiple blind signature with constant size

    Science.gov (United States)

    Xiao, Min; Li, Zhenli

    2016-09-01

    Using quantum homomorphic signature in quantum network, we propose a quantum broadcasting multiple blind signature scheme. Different from classical signature and current quantum signature schemes, the multi-signature proposed in our scheme is not generated by simply putting the individual signatures together, but by aggregating the individual signatures based on homomorphic property. Therefore, the size of the multi-signature is constant. Furthermore, based on a wide range of investigation for the security of existing quantum signature protocols, our protocol is designed to resist possible forgery attacks against signature and message from the various attack sources and disavowal attacks from participants.

  10. A Bioinformatics Approach for Detecting Repetitive Nested Motifs using Pattern Matching

    Science.gov (United States)

    Romero, José R.; Carballido, Jessica A.; Garbus, Ingrid; Echenique, Viviana C.; Ponzoni, Ignacio

    2016-01-01

    The identification of nested motifs in genomic sequences is a complex computational problem. The detection of these patterns is important to allow the discovery of transposable element (TE) insertions, incomplete reverse transcripts, deletions, and/or mutations. In this study, a de novo strategy for detecting patterns that represent nested motifs was designed based on exhaustive searches for pairs of motifs and combinatorial pattern analysis. These patterns can be grouped into three categories, motifs within other motifs, motifs flanked by other motifs, and motifs of large size. The methodology used in this study, applied to genomic sequences from the plant species Aegilops tauschii and Oryza sativa, revealed that it is possible to identify putative nested TEs by detecting these three types of patterns. The results were validated through BLAST alignments, which revealed the efficacy and usefulness of the new method, which is called Mamushka. PMID:27812277

  11. Verifiable threshold signature schemes against conspiracy attack

    Institute of Scientific and Technical Information of China (English)

    甘元驹

    2004-01-01

    In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters , such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.

  12. Verifiable threshold signature schemes against conspiracy attack

    Institute of Scientific and Technical Information of China (English)

    GAN Yuan-ju(甘元驹)

    2004-01-01

    In this study, the author has designed new verifiable (t,n) threshold untraceable signature schemes. The proposed schemes have the following properties:(1) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants;(2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters ,such as the group secret key, and forge other member's individual signature;(3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.

  13. (Convertible) Undeniable Signatures Without Random Oracles

    Science.gov (United States)

    Yuen, Tsz Hon; Au, Man Ho; Liu, Joseph K.; Susilo, Willy

    We propose a convertible undeniable signature scheme without random oracles. Our construction is based on Waters' and Kurosawa and Heng's schemes that were proposed in Eurocrypt 2005. The security of our scheme is based on the CDH and the decision linear assumption. Comparing only the part of undeniable signatures, our scheme uses more standard assumptions than the existing undeniable signatures without random oracles due to Laguillamie and Vergnaud.

  14. Narrow terahertz attenuation signatures in Bacillus thuringiensis.

    Science.gov (United States)

    Zhang, Weidong; Brown, Elliott R; Viveros, Leamon; Burris, Kellie P; Stewart, C Neal

    2014-10-01

    Terahertz absorption signatures from culture-cultivated Bacillus thuringiensis were measured with a THz photomixing spectrometer operating from 400 to 1200 GHz. We observe two distinct signatures centered at ∼955 and 1015 GHz, and attribute them to the optically coupled particle vibrational resonance (surface phonon-polariton) of Bacillus spores. This demonstrates the potential of the THz attenuation signatures as "fingerprints" for label-free biomolecular detection.

  15. A new motif for inhibitors of geranylgeranyl diphosphate synthase.

    Science.gov (United States)

    Foust, Benjamin J; Allen, Cheryl; Holstein, Sarah A; Wiemer, David F

    2016-08-15

    The enzyme geranylgeranyl diphosphate synthase (GGDPS) is believed to receive the substrate farnesyl diphosphate through one lipophilic channel and release the product geranylgeranyl diphosphate through another. Bisphosphonates with two isoprenoid chains positioned on the α-carbon have proven to be effective inhibitors of this enzyme. Now a new motif has been prepared with one isoprenoid chain on the α-carbon, a second included as a phosphonate ester, and the potential for a third at the α-carbon. The pivaloyloxymethyl prodrugs of several compounds based on this motif have been prepared and the resulting compounds have been tested for their ability to disrupt protein geranylgeranylation and induce cytotoxicity in myeloma cells. The initial biological studies reveal activity consistent with GGDPS inhibition, and demonstrate a structure-function relationship which is dependent on the nature of the alkyl group at the α-carbon.

  16. Genetic analysis of beta1 integrin "activation motifs" in mice

    DEFF Research Database (Denmark)

    Czuchra, Aleksandra; Meyer, Hannelore; Legate, Kyle R

    2006-01-01

    tails, leading to tail separation and integrin activation. We analyzed mice in which we mutated the tyrosines of the beta1 tail and the membrane-proximal aspartic acid required for the salt bridge. Tyrosine-to-alanine substitutions abolished beta1 integrin functions and led to a beta1 integrin......-null phenotype in vivo. Surprisingly, neither the substitution of the tyrosines with phenylalanine nor the aspartic acid with alanine resulted in an obvious defect. These data suggest that the NPXY motifs of the beta1 integrin tail are essential for beta1 integrin function, whereas tyrosine phosphorylation......Akey feature of integrins is their ability to regulate the affinity for ligands, a process termed integrin activation. The final step in integrin activation is talin binding to the NPXY motif of the integrin beta cytoplasmic domains. Talin binding disrupts the salt bridge between the alpha/beta...

  17. A combinatorial code for splicing silencing: UAGG and GGGG motifs.

    Directory of Open Access Journals (Sweden)

    Kyoungha Han

    2005-05-01

    Full Text Available Alternative pre-mRNA splicing is widely used to regulate gene expression by tuning the levels of tissue-specific mRNA isoforms. Few regulatory mechanisms are understood at the level of combinatorial control despite numerous sequences, distinct from splice sites, that have been shown to play roles in splicing enhancement or silencing. Here we use molecular approaches to identify a ternary combination of exonic UAGG and 5'-splice-site-proximal GGGG motifs that functions cooperatively to silence the brain-region-specific CI cassette exon (exon 19 of the glutamate NMDA R1 receptor (GRIN1 transcript. Disruption of three components of the motif pattern converted the CI cassette into a constitutive exon, while predominant skipping was conferred when the same components were introduced, de novo, into a heterologous constitutive exon. Predominant exon silencing was directed by the motif pattern in the presence of six competing exonic splicing enhancers, and this effect was retained after systematically repositioning the two exonic UAGGs within the CI cassette. In this system, hnRNP A1 was shown to mediate silencing while hnRNP H antagonized silencing. Genome-wide computational analysis combined with RT-PCR testing showed that a class of skipped human and mouse exons can be identified by searches that preserve the sequence and spatial configuration of the UAGG and GGGG motifs. This analysis suggests that the multi-component silencing code may play an important role in the tissue-specific regulation of the CI cassette exon, and that it may serve more generally as a molecular language to allow for intricate adjustments and the coordination of splicing patterns from different genes.

  18. Characterizing regulatory path motifs in integrated networks using perturbational data

    OpenAIRE

    Joshi, Anagha Madhusudan; Van Parys, Thomas; de Peer, Yves Van; Michoel, Tom

    2010-01-01

    We introduce Pathicular http://bioinformatics.psb.ugent.be/software/details/Pathicular, a Cytoscape plugin for studying the cellular response to perturbations of transcription factors by integrating perturbational expression data with transcriptional, protein-protein and phosphorylation networks. Pathicular searches for 'regulatory path motifs', short paths in the integrated physical networks which occur significantly more often than expected between transcription factors and their targets in...

  19. Exon silencing by UAGG motifs in response to neuronal excitation.

    Directory of Open Access Journals (Sweden)

    Ping An

    2007-02-01

    Full Text Available Alternative pre-mRNA splicing plays fundamental roles in neurons by generating functional diversity in proteins associated with the communication and connectivity of the synapse. The CI cassette of the NMDA R1 receptor is one of a variety of exons that show an increase in exon skipping in response to cell excitation, but the molecular nature of this splicing responsiveness is not yet understood. Here we investigate the molecular basis for the induced changes in splicing of the CI cassette exon in primary rat cortical cultures in response to KCl-induced depolarization using an expression assay with a tight neuron-specific readout. In this system, exon silencing in response to neuronal excitation was mediated by multiple UAGG-type silencing motifs, and transfer of the motifs to a constitutive exon conferred a similar responsiveness by gain of function. Biochemical analysis of protein binding to UAGG motifs in extracts prepared from treated and mock-treated cortical cultures showed an increase in nuclear hnRNP A1-RNA binding activity in parallel with excitation. Evidence for the role of the NMDA receptor and calcium signaling in the induced splicing response was shown by the use of specific antagonists, as well as cell-permeable inhibitors of signaling pathways. Finally, a wider role for exon-skipping responsiveness is shown to involve additional exons with UAGG-related silencing motifs, and transcripts involved in synaptic functions. These results suggest that, at the post-transcriptional level, excitable exons such as the CI cassette may be involved in strategies by which neurons mount adaptive responses to hyperstimulation.

  20. Neoanalysis, Orality, and Intertextuality: An Examination of Homeric Motif Transference

    Directory of Open Access Journals (Sweden)

    Jonathan Burgess

    2006-03-01

    Full Text Available In Homeric studies scholars have speculated on the influence of (non-surviving preHomeric material on the Iliad. This article expands this line of argument from an oralist perspective, with reference to modern intertextual theory. It concludes that preHomeric and nonHomeric motifs from oral traditions were transferred into the epic poem, creating an intertextually allusive poetics that would have been recognizable to an early Greek audience informed of mythological traditions.

  1. A Cooperative Approach for the Extraction of Protein Motifs

    Institute of Scientific and Technical Information of China (English)

    Chao CHEN; Yuan Xin TIAN; Xiao Yong ZOU; Pei Xiang CAI; Jin Yuan MO

    2006-01-01

    By integrating the concept of cooperative approach, an extension of the fast annealing coevolutionary algorithm is presented in this paper. It outperformed the original algorithm in the domain of function optimization, especially in terms of convergence rate. It was also applied to a real optimization problem, protein motif extraction. And a satisfactory result has been obtained with the accuracy of prediction achieving 67.0%, which is in agreement with the result in the PROSITE database.

  2. The leitmotif racket in Lolita—marginal notes on Nabokov’s use of motifs

    OpenAIRE

    2013-01-01

    This is a study of Nabokov’s use of leitmotifs in Lolita, a study of how they intertwine and interact, and the problems Nabokov’s stylistic dexterity pose to the reader and critic. It traces prominent occurrences of the toilet and telephone motifs, and their connection with motifs like the slipper and the racket motif.

  3. Distinct configurations of protein complexes and biochemical pathways revealed by epistatic interaction network motifs

    LENUS (Irish Health Repository)

    Casey, Fergal

    2011-08-22

    Abstract Background Gene and protein interactions are commonly represented as networks, with the genes or proteins comprising the nodes and the relationship between them as edges. Motifs, or small local configurations of edges and nodes that arise repeatedly, can be used to simplify the interpretation of networks. Results We examined triplet motifs in a network of quantitative epistatic genetic relationships, and found a non-random distribution of particular motif classes. Individual motif classes were found to be associated with different functional properties, suggestive of an underlying biological significance. These associations were apparent not only for motif classes, but for individual positions within the motifs. As expected, NNN (all negative) motifs were strongly associated with previously reported genetic (i.e. synthetic lethal) interactions, while PPP (all positive) motifs were associated with protein complexes. The two other motif classes (NNP: a positive interaction spanned by two negative interactions, and NPP: a negative spanned by two positives) showed very distinct functional associations, with physical interactions dominating for the former but alternative enrichments, typical of biochemical pathways, dominating for the latter. Conclusion We present a model showing how NNP motifs can be used to recognize supportive relationships between protein complexes, while NPP motifs often identify opposing or regulatory behaviour between a gene and an associated pathway. The ability to use motifs to point toward underlying biological organizational themes is likely to be increasingly important as more extensive epistasis mapping projects in higher organisms begin.

  4. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  5. Institute of Geophysics, Planetary Physics, and Signatures

    Data.gov (United States)

    Federal Laboratory Consortium — The Institute of Geophysics, Planetary Physics, and Signatures at Los Alamos National Laboratory is committed to promoting and supporting high quality, cutting-edge...

  6. Secure Obfuscation for Encrypted Group Signatures.

    Directory of Open Access Journals (Sweden)

    Yang Shi

    Full Text Available In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts. In other words, these schemes suppose that (the implementation of the group signature generation algorithm is running in a platform that is perfectly protected from various intrusions and attacks. As a complementary to existing studies, how to generate group signatures securely in a more austere security context, such as a white-box attack context, is studied in this paper. We use obfuscation as an approach to acquire a higher level of security. Concretely, we introduce a special group signature functionality-an encrypted group signature, and then provide an obfuscator for the proposed functionality. A series of new security notions for both the functionality and its obfuscator has been introduced. The most important one is the average-case secure virtual black-box property w.r.t. dependent oracles and restricted dependent oracles which captures the requirement of protecting the output of the proposed obfuscator against collision attacks from group members. The security notions fit for many other specialized obfuscators, such as obfuscators for identity-based signatures, threshold signatures and key-insulated signatures. Finally, the correctness and security of the proposed obfuscator have been proven. Thereby, the obfuscated encrypted group signature functionality can be applied to variants of privacy-preserving security schemes and enhance the security level of these schemes.

  7. Nonrepudiable Proxy Multi-Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    LI JiGuo(李继国); CAO ZhenFu(曹珍富); ZHANG YiChen(张亦辰)

    2003-01-01

    The concept of proxy signature introduced by Mambo, Usuda, and Okamotoallows a designated person, called a proxy signer, to sign on behalf of an original signer. However,most existing proxy signature schemes do not support nonrepudiation. In this paper, two securenonrepudiable proxy multi-signature schemes are proposed that overcome disadvantages of theexisting schemes. The proposed schemes can withstand public key substitution attack. In addition,the new schemes have some other advantages such as proxy signature key generation and updatingusing insecure channels. This approach can also be applied to other ElGamal-like proxy signatureschemes.

  8. MAR characteristic motifs mediate episomal vector in CHO cells.

    Science.gov (United States)

    Lin, Yan; Li, Zhaoxi; Wang, Tianyun; Wang, Xiaoyin; Wang, Li; Dong, Weihua; Jing, Changqin; Yang, Xianjun

    2015-04-01

    An ideal gene therapy vector should enable persistent transgene expression without limitations in safety and reproducibility. Recent researches' insight into the ability of chromosomal matrix attachment regions (MARs) to mediate episomal maintenance of genetic elements allowed the development of a circular episomal vector. Although a MAR-mediated engineered vector has been developed, little is known on which motifs of MAR confer this function during interaction with the host genome. Here, we report an artificially synthesized DNA fragment containing only characteristic motif sequences that served as an alternative to human beta-interferon matrix attachment region sequence. The potential of the vector to mediate gene transfer in CHO cells was investigated. The short synthetic MAR motifs were found to mediate episomal vector at a low copy number for many generations without integration into the host genome. Higher transgene expression was maintained for at least 4 months. In addition, MAR was maintained episomally and conferred sustained EGFP expression even in nonselective CHO cells. All the results demonstrated that MAR characteristic sequence-based vector can function as stable episomes in CHO cells, supporting long-term and effective transgene expression.

  9. Process-based network decomposition reveals backbone motif structure.

    Science.gov (United States)

    Wang, Guanyu; Du, Chenghang; Chen, Hao; Simha, Rahul; Rong, Yongwu; Xiao, Yi; Zeng, Chen

    2010-06-08

    A central challenge in systems biology today is to understand the network of interactions among biomolecules and, especially, the organizing principles underlying such networks. Recent analysis of known networks has identified small motifs that occur ubiquitously, suggesting that larger networks might be constructed in the manner of electronic circuits by assembling groups of these smaller modules. Using a unique process-based approach to analyzing such networks, we show for two cell-cycle networks that each of these networks contains a giant backbone motif spanning all the network nodes that provides the main functional response. The backbone is in fact the smallest network capable of providing the desired functionality. Furthermore, the remaining edges in the network form smaller motifs whose role is to confer stability properties rather than provide function. The process-based approach used in the above analysis has additional benefits: It is scalable, analytic (resulting in a single analyzable expression that describes the behavior), and computationally efficient (all possible minimal networks for a biological process can be identified and enumerated).

  10. THE MOTIF OF THE PRODIGAL SON IN IVAN TURGENEV'S NOVELS

    Directory of Open Access Journals (Sweden)

    Valentina Ivanovna Gabdullina

    2013-11-01

    Full Text Available The author questions the perception of Ivan Turgenev as a “non- Christian writer” and studies the problem of the prodigal son motif functioning in a series of his novels. In his novels, Turgenev pictured different phases of the archetypal story, originating from the Gospel parable of the prodigal son. In the novel Rudin he depicted the phase of spiritual wanderings of the hero who had lost touch with his native land — Russia. In his next novels (Home of the Gentry, Fathers and Sons and Smoke, after leading his hero in circles and sending him back to his paternal home, Turgenev reconstructs the model of human behavior, represented in the parable, thereby recognizing the immutability of the idea formalized in the Gospel. The motif of the return to Russian land gets its completion in Turgenev's last novel Virgin Soil, in which the author paradoxically connects the Westernist idea with the Gospel imperative. Solomin, the son of a deacon, sent by his wise father out to Europe “to get education”, studies in England, masters the European knowledge and returns back “to his native land” to establish his own business in inland Russia. Thus, a series of Turgenev's novels, in which he portrayed different phases of social life, are interlinked with the motif of the prodigal son, who is represented by novels' main characters.

  11. Motif structure and cooperation in real-world complex networks

    Science.gov (United States)

    Salehi, Mostafa; Rabiee, Hamid R.; Jalili, Mahdi

    2010-12-01

    Networks of dynamical nodes serve as generic models for real-world systems in many branches of science ranging from mathematics to physics, technology, sociology and biology. Collective behavior of agents interacting over complex networks is important in many applications. The cooperation between selfish individuals is one of the most interesting collective phenomena. In this paper we address the interplay between the motifs’ cooperation properties and their abundance in a number of real-world networks including yeast protein-protein interaction, human brain, protein structure, email communication, dolphins’ social interaction, Zachary karate club and Net-science coauthorship networks. First, the amount of cooperativity for all possible undirected subgraphs with three to six nodes is calculated. To this end, the evolutionary dynamics of the Prisoner’s Dilemma game is considered and the cooperativity of each subgraph is calculated as the percentage of cooperating agents at the end of the simulation time. Then, the three- to six-node motifs are extracted for each network. The significance of the abundance of a motif, represented by a Z-value, is obtained by comparing them with some properly randomized versions of the original network. We found that there is always a group of motifs showing a significant inverse correlation between their cooperativity amount and Z-value, i.e. the more the Z-value the less the amount of cooperativity. This suggests that networks composed of well-structured units do not have good cooperativity properties.

  12. Insertion of tetracysteine motifs into dopamine transporter extracellular domains.

    Directory of Open Access Journals (Sweden)

    Deanna M Navaroli

    Full Text Available The neuronal dopamine transporter (DAT is a major determinant of extracellular dopamine (DA levels and is the primary target for a variety of addictive and therapeutic psychoactive drugs. DAT is acutely regulated by protein kinase C (PKC activation and amphetamine exposure, both of which modulate DAT surface expression by endocytic trafficking. In order to use live imaging approaches to study DAT endocytosis, methods are needed to exclusively label the DAT surface pool. The use of membrane impermeant, sulfonated biarsenic dyes holds potential as one such approach, and requires introduction of an extracellular tetracysteine motif (tetraCys; CCPGCC to facilitate dye binding. In the current study, we took advantage of intrinsic proline-glycine (Pro-Gly dipeptides encoded in predicted DAT extracellular domains to introduce tetraCys motifs into DAT extracellular loops 2, 3, and 4. [(3H]DA uptake studies, surface biotinylation and fluorescence microscopy in PC12 cells indicate that tetraCys insertion into the DAT second extracellular loop results in a functional transporter that maintains PKC-mediated downregulation. Introduction of tetraCys into extracellular loops 3 and 4 yielded DATs with severely compromised function that failed to mature and traffic to the cell surface. This is the first demonstration of successful introduction of a tetracysteine motif into a DAT extracellular domain, and may hold promise for use of biarsenic dyes in live DAT imaging studies.

  13. Event Networks and the Identification of Crime Pattern Motifs.

    Directory of Open Access Journals (Sweden)

    Toby Davies

    Full Text Available In this paper we demonstrate the use of network analysis to characterise patterns of clustering in spatio-temporal events. Such clustering is of both theoretical and practical importance in the study of crime, and forms the basis for a number of preventative strategies. However, existing analytical methods show only that clustering is present in data, while offering little insight into the nature of the patterns present. Here, we show how the classification of pairs of events as close in space and time can be used to define a network, thereby generalising previous approaches. The application of graph-theoretic techniques to these networks can then offer significantly deeper insight into the structure of the data than previously possible. In particular, we focus on the identification of network motifs, which have clear interpretation in terms of spatio-temporal behaviour. Statistical analysis is complicated by the nature of the underlying data, and we provide a method by which appropriate randomised graphs can be generated. Two datasets are used as case studies: maritime piracy at the global scale, and residential burglary in an urban area. In both cases, the same significant 3-vertex motif is found; this result suggests that incidents tend to occur not just in pairs, but in fact in larger groups within a restricted spatio-temporal domain. In the 4-vertex case, different motifs are found to be significant in each case, suggesting that this technique is capable of discriminating between clustering patterns at a finer granularity than previously possible.

  14. A novel Bayesian DNA motif comparison method for clustering and retrieval.

    Directory of Open Access Journals (Sweden)

    Naomi Habib

    2008-02-01

    Full Text Available Characterizing the DNA-binding specificities of transcription factors is a key problem in computational biology that has been addressed by multiple algorithms. These usually take as input sequences that are putatively bound by the same factor and output one or more DNA motifs. A common practice is to apply several such algorithms simultaneously to improve coverage at the price of redundancy. In interpreting such results, two tasks are crucial: clustering of redundant motifs, and attributing the motifs to transcription factors by retrieval of similar motifs from previously characterized motif libraries. Both tasks inherently involve motif comparison. Here we present a novel method for comparing and merging motifs, based on Bayesian probabilistic principles. This method takes into account both the similarity in positional nucleotide distributions of the two motifs and their dissimilarity to the background distribution. We demonstrate the use of the new comparison method as a basis for motif clustering and retrieval procedures, and compare it to several commonly used alternatives. Our results show that the new method outperforms other available methods in accuracy and sensitivity. We incorporated the resulting motif clustering and retrieval procedures in a large-scale automated pipeline for analyzing DNA motifs. This pipeline integrates the results of various DNA motif discovery algorithms and automatically merges redundant motifs from multiple training sets into a coherent annotated library of motifs. Application of this pipeline to recent genome-wide transcription factor location data in S. cerevisiae successfully identified DNA motifs in a manner that is as good as semi-automated analysis reported in the literature. Moreover, we show how this analysis elucidates the mechanisms of condition-specific preferences of transcription factors.

  15. Holographic signatures of cosmological singularities.

    Science.gov (United States)

    Engelhardt, Netta; Hertog, Thomas; Horowitz, Gary T

    2014-09-19

    To gain insight into the quantum nature of cosmological singularities, we study anisotropic Kasner solutions in gauge-gravity duality. The dual description of the bulk evolution towards the singularity involves N=4 super Yang-Mills theory on the expanding branch of deformed de Sitter space and is well defined. We compute two-point correlators of Yang-Mills operators of large dimensions using spacelike geodesics anchored on the boundary. The correlators show a strong signature of the singularity around horizon scales and decay at large boundary separation at different rates in different directions. More generally, the boundary evolution exhibits a process of particle creation similar to that in inflation. This leads us to conjecture that information on the quantum nature of cosmological singularities is encoded in long-wavelength features of the boundary wave function.

  16. Predicting tissue specific cis-regulatory modules in the human genome using pairs of co-occurring motifs

    Directory of Open Access Journals (Sweden)

    Girgis Hani Z

    2012-02-01

    Full Text Available Abstract Background Researchers seeking to unlock the genetic basis of human physiology and diseases have been studying gene transcription regulation. The temporal and spatial patterns of gene expression are controlled by mainly non-coding elements known as cis-regulatory modules (CRMs and epigenetic factors. CRMs modulating related genes share the regulatory signature which consists of transcription factor (TF binding sites (TFBSs. Identifying such CRMs is a challenging problem due to the prohibitive number of sequence sets that need to be analyzed. Results We formulated the challenge as a supervised classification problem even though experimentally validated CRMs were not required. Our efforts resulted in a software system named CrmMiner. The system mines for CRMs in the vicinity of related genes. CrmMiner requires two sets of sequences: a mixed set and a control set. Sequences in the vicinity of the related genes comprise the mixed set, whereas the control set includes random genomic sequences. CrmMiner assumes that a large percentage of the mixed set is made of background sequences that do not include CRMs. The system identifies pairs of closely located motifs representing vertebrate TFBSs that are enriched in the training mixed set consisting of 50% of the gene loci. In addition, CrmMiner selects a group of the enriched pairs to represent the tissue-specific regulatory signature. The mixed and the control sets are searched for candidate sequences that include any of the selected pairs. Next, an optimal Bayesian classifier is used to distinguish candidates found in the mixed set from their control counterparts. Our study proposes 62 tissue-specific regulatory signatures and putative CRMs for different human tissues and cell types. These signatures consist of assortments of ubiquitously expressed TFs and tissue-specific TFs. Under controlled settings, CrmMiner identified known CRMs in noisy sets up to 1:25 signal-to-noise ratio. CrmMiner was

  17. Leucine-based receptor sorting motifs are dependent on the spacing relative to the plasma membrane

    DEFF Research Database (Denmark)

    Geisler, C; Dietrich, J; Nielsen, B L;

    1998-01-01

    amino acid, is constitutively active. In this study, we have investigated how the spacing relative to the plasma membrane affects the function of both types of leucine-based motifs. For phosphorylation-dependent leucine-based motifs, a minimal spacing of 7 residues between the plasma membrane...... and the phospho-acceptor was required for phosphorylation and thereby activation of the motifs. For constitutively active leucine-based motifs, a minimal spacing of 6 residues between the plasma membrane and the acidic residue was required for optimal activity of the motifs. In addition, we found that the acidic...

  18. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Electronic signature components and controls. 11... SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Signatures § 11.200 Electronic signature components and controls. (a) Electronic signatures that are not based upon biometrics shall:...

  19. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their...

  20. Arbitrated Quantum Signature protocol using EPR pairs

    Directory of Open Access Journals (Sweden)

    Jun Zhang

    2012-11-01

    Full Text Available Arbitrated signature provides that the signatory signs a message with his private key by quantum cryptography, while the signature receiver verifies the signature with the arbitrator’s assistance. In this work, security analysis was given to the arbitrated quantum signature (AQS and results showed that the receiver Bob and the attacker can forge the signature. Then this paper gives a new quantum one-time pads encryption method, which is suit for the quantum signature. At last, a new AQS protocol using Einstein-Podoisky-Rosen (EPR pairs is proposed. By using of  quantum key distribution (QKD and new quantum one-time pads, the new scheme can resist Shor’s attack. The new scheme has following advantages: (1 The scheme reduces the complexity of implementation and provides a higher efficiency in transmission; (2 Compares with some AQS schemes, the scheme can avoid being disavowed by the receiver; (3 Compares with other AQS schemes, the scheme also guarantees the arbitrator cannot forge the signature and it also ensure the receiver and other attacker cannot forge the signature.

  1. UAV visual signature suppression via adaptive materials

    NARCIS (Netherlands)

    Barrett, R.; Melkert, J.

    2005-01-01

    Visual signature suppression (VSS) methods for several classes of aircraft from WWII on are examined and historically summarized. This study shows that for some classes of uninhabited aerial vehicles (UAVs), primary mission threats do not stem from infrared or radar signatures, but from the amount t

  2. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  3. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall...

  4. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the...

  5. Does Social Work Have a Signature Pedagogy?

    Science.gov (United States)

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  6. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and superstructur

  7. A New Dynamic Group Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    HE Yefeng

    2006-01-01

    In this paper, a new dynamic group signature scheme is proposed. It allows the group manager to increase or delete group members flexibly. Furthermore, the length of group signatures, as well as the computational effort for signing, verifying and opening are very small and independent of the number of group members and deleted group members. So it is efficient.

  8. Security Weaknesses in Arbitrated Quantum Signature Protocols

    Science.gov (United States)

    Liu, Feng; Zhang, Kejia; Cao, Tianqing

    2014-01-01

    Arbitrated quantum signature (AQS) is a cryptographic scenario in which the sender (signer), Alice, generates the signature of a message and then a receiver (verifier), Bob, can verify the signature with the help of a trusted arbitrator, Trent. In this paper, we point out there exist some security weaknesses in two AQS protocols. Our analysis shows Alice can successfully disavow any of her signatures by a simple attack in the first protocol. Furthermore, we study the security weaknesses of the second protocol from the aspects of forgery and disavowal. Some potential improvements of this kind of protocols are given. We also design a new method to authenticate a signature or a message, which makes AQS protocols immune to Alice's disavowal attack and Bob's forgery attack effectively.

  9. An ECC-Based Blind Signature Scheme

    Directory of Open Access Journals (Sweden)

    Fuh-Gwo Jeng

    2010-08-01

    Full Text Available Cryptography is increasingly applied to the E-commerce world, especially to the untraceable payment system and the electronic voting system. Protocols for these systems strongly require the anonymous digital signature property, and thus a blind signature strategy is the answer to it. Chaum stated that every blind signature protocol should hold two fundamental properties, blindness and intractableness. All blind signature schemes proposed previously almost are based on the integer factorization problems, discrete logarithm problems, or the quadratic residues, which are shown by Lee et al. that none of the schemes is able to meet the two fundamental properties above. Therefore, an ECC-based blind signature scheme that possesses both the above properties is proposed in this paper.

  10. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  11. DNA nanotechnology based on i-motif structures.

    Science.gov (United States)

    Dong, Yuanchen; Yang, Zhongqiang; Liu, Dongsheng

    2014-06-17

    CONSPECTUS: Most biological processes happen at the nanometer scale, and understanding the energy transformations and material transportation mechanisms within living organisms has proved challenging. To better understand the secrets of life, researchers have investigated artificial molecular motors and devices over the past decade because such systems can mimic certain biological processes. DNA nanotechnology based on i-motif structures is one system that has played an important role in these investigations. In this Account, we summarize recent advances in functional DNA nanotechnology based on i-motif structures. The i-motif is a DNA quadruplex that occurs as four stretches of cytosine repeat sequences form C·CH(+) base pairs, and their stabilization requires slightly acidic conditions. This unique property has produced the first DNA molecular motor driven by pH changes. The motor is reliable, and studies show that it is capable of millisecond running speeds, comparable to the speed of natural protein motors. With careful design, the output of these types of motors was combined to drive micrometer-sized cantilevers bend. Using established DNA nanostructure assembly and functionalization methods, researchers can easily integrate the motor within other DNA assembled structures and functional units, producing DNA molecular devices with new functions such as suprahydrophobic/suprahydrophilic smart surfaces that switch, intelligent nanopores triggered by pH changes, molecular logic gates, and DNA nanosprings. Recently, researchers have produced motors driven by light and electricity, which have allowed DNA motors to be integrated within silicon-based nanodevices. Moreover, some devices based on i-motif structures have proven useful for investigating processes within living cells. The pH-responsiveness of the i-motif structure also provides a way to control the stepwise assembly of DNA nanostructures. In addition, because of the stability of the i-motif, this

  12. Recurrent signature patterns in HIV-1 B clade envelope glycoproteins associated with either early or chronic infections.

    Directory of Open Access Journals (Sweden)

    S Gnanakaran

    2011-09-01

    Full Text Available Here we have identified HIV-1 B clade Envelope (Env amino acid signatures from early in infection that may be favored at transmission, as well as patterns of recurrent mutation in chronic infection that may reflect common pathways of immune evasion. To accomplish this, we compared thousands of sequences derived by single genome amplification from several hundred individuals that were sampled either early in infection or were chronically infected. Samples were divided at the outset into hypothesis-forming and validation sets, and we used phylogenetically corrected statistical strategies to identify signatures, systematically scanning all of Env. Signatures included single amino acids, glycosylation motifs, and multi-site patterns based on functional or structural groupings of amino acids. We identified signatures near the CCR5 co-receptor-binding region, near the CD4 binding site, and in the signal peptide and cytoplasmic domain, which may influence Env expression and processing. Two signatures patterns associated with transmission were particularly interesting. The first was the most statistically robust signature, located in position 12 in the signal peptide. The second was the loss of an N-linked glycosylation site at positions 413-415; the presence of this site has been recently found to be associated with escape from potent and broad neutralizing antibodies, consistent with enabling a common pathway for immune escape during chronic infection. Its recurrent loss in early infection suggests it may impact fitness at the time of transmission or during early viral expansion. The signature patterns we identified implicate Env expression levels in selection at viral transmission or in early expansion, and suggest that immune evasion patterns that recur in many individuals during chronic infection when antibodies are present can be selected against when the infection is being established prior to the adaptive immune response.

  13. Analysis of septins across kingdoms reveals orthology and new motifs

    Directory of Open Access Journals (Sweden)

    Malmberg Russell L

    2007-07-01

    Full Text Available Abstract Background Septins are cytoskeletal GTPase proteins first discovered in the fungus Saccharomyces cerevisiae where they organize the septum and link nuclear division with cell division. More recently septins have been found in animals where they are important in processes ranging from actin and microtubule organization to embryonic patterning and where defects in septins have been implicated in human disease. Previous studies suggested that many animal septins fell into independent evolutionary groups, confounding cross-kingdom comparison. Results In the current work, we identified 162 septins from fungi, microsporidia and animals and analyzed their phylogenetic relationships. There was support for five groups of septins with orthology between kingdoms. Group 1 (which includes S. cerevisiae Cdc10p and human Sept9 and Group 2 (which includes S. cerevisiae Cdc3p and human Sept7 contain sequences from fungi and animals. Group 3 (which includes S. cerevisiae Cdc11p and Group 4 (which includes S. cerevisiae Cdc12p contain sequences from fungi and microsporidia. Group 5 (which includes Aspergillus nidulans AspE contains sequences from filamentous fungi. We suggest a modified nomenclature based on these phylogenetic relationships. Comparative sequence alignments revealed septin derivatives of already known G1, G3 and G4 GTPase motifs, four new motifs from two to twelve amino acids long and six conserved single amino acid positions. One of these new motifs is septin-specific and several are group specific. Conclusion Our studies provide an evolutionary history for this important family of proteins and a framework and consistent nomenclature for comparison of septin orthologs across kingdoms.

  14. Short sequence motifs, overrepresented in mammalian conservednon-coding sequences

    Energy Technology Data Exchange (ETDEWEB)

    Minovitsky, Simon; Stegmaier, Philip; Kel, Alexander; Kondrashov,Alexey S.; Dubchak, Inna

    2007-02-21

    Background: A substantial fraction of non-coding DNAsequences of multicellular eukaryotes is under selective constraint. Inparticular, ~;5 percent of the human genome consists of conservednon-coding sequences (CNSs). CNSs differ from other genomic sequences intheir nucleotide composition and must play important functional roles,which mostly remain obscure.Results: We investigated relative abundancesof short sequence motifs in all human CNSs present in the human/mousewhole-genome alignments vs. three background sets of sequences: (i)weakly conserved or unconserved non-coding sequences (non-CNSs); (ii)near-promoter sequences (located between nucleotides -500 and -1500,relative to a start of transcription); and (iii) random sequences withthe same nucleotide composition as that of CNSs. When compared tonon-CNSs and near-promoter sequences, CNSs possess an excess of AT-richmotifs, often containing runs of identical nucleotides. In contrast, whencompared to random sequences, CNSs contain an excess of GC-rich motifswhich, however, lack CpG dinucleotides. Thus, abundance of short sequencemotifs in human CNSs, taken as a whole, is mostly determined by theiroverall compositional properties and not by overrepresentation of anyspecific short motifs. These properties are: (i) high AT-content of CNSs,(ii) a tendency, probably due to context-dependent mutation, of A's andT's to clump, (iii) presence of short GC-rich regions, and (iv) avoidanceof CpG contexts, due to their hypermutability. Only a small number ofshort motifs, overrepresented in all human CNSs are similar to bindingsites of transcription factors from the FOX family.Conclusion: Human CNSsas a whole appear to be too broad a class of sequences to possess strongfootprints of any short sequence-specific functions. Such footprintsshould be studied at the level of functional subclasses of CNSs, such asthose which flank genes with a particular pattern of expression. Overallproperties of CNSs are affected by

  15. Sequence-based classification using discriminatory motif feature selection.

    Directory of Open Access Journals (Sweden)

    Hao Xiong

    Full Text Available Most existing methods for sequence-based classification use exhaustive feature generation, employing, for example, all k-mer patterns. The motivation behind such (enumerative approaches is to minimize the potential for overlooking important features. However, there are shortcomings to this strategy. First, practical constraints limit the scope of exhaustive feature generation to patterns of length ≤ k, such that potentially important, longer (> k predictors are not considered. Second, features so generated exhibit strong dependencies, which can complicate understanding of derived classification rules. Third, and most importantly, numerous irrelevant features are created. These concerns can compromise prediction and interpretation. While remedies have been proposed, they tend to be problem-specific and not broadly applicable. Here, we develop a generally applicable methodology, and an attendant software pipeline, that is predicated on discriminatory motif finding. In addition to the traditional training and validation partitions, our framework entails a third level of data partitioning, a discovery partition. A discriminatory motif finder is used on sequences and associated class labels in the discovery partition to yield a (small set of features. These features are then used as inputs to a classifier in the training partition. Finally, performance assessment occurs on the validation partition. Important attributes of our approach are its modularity (any discriminatory motif finder and any classifier can be deployed and its universality (all data, including sequences that are unaligned and/or of unequal length, can be accommodated. We illustrate our approach on two nucleosome occupancy datasets and a protein solubility dataset, previously analyzed using enumerative feature generation. Our method achieves excellent performance results, with and without optimization of classifier tuning parameters. A Python pipeline implementing the approach is

  16. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature....

  17. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  18. Indonesian Traditional Toys and the Development of Batik Motifs

    Directory of Open Access Journals (Sweden)

    Bagus Indrayana

    2016-06-01

    Full Text Available There is a wide array of traditional toys in Indonesia. In the past, traditional toys played an important role for skill and creativity development of children. Today, the position of traditional toys in the society is displaced by toys from large-scale manufacturers. Given the critical role of traditional toys for children’s motoric and social development, there is a need to develop media that can be used to promote these traditional products and strengthen their position in the public. We propose to use Batik as a way to effectively disseminate and promote traditional toys to the general public. Apart from this, using traditional toys to create new Batik motifs can have an economic value for the producers of Batik, promote Indonesian products and enrich the Indonesian Batik. This study aims to explore the variety of traditional toys, mainly from Klaten and Magelang, in the Central Java province of Indonesia, and use them as the basis for the development of Batik motif creation. This study used Trilogi Keseimbangan (or Harmony Trilogy aesthetic theory analytical approach that explains the creation of craft consists of the following phases: exploration, design, and materialization. The creation method in this study adopts Tiga Tahap Enam Langkah (Three Phases, Six Steps method offered in the theory. The finding in the field found that the traditional toys material used in Klaten and Magelang, mostly made from waste wood, plywood, and zinc. The manufacturing process is done manually by two or three craftsmen using a simple technology. The traditional toys are designed by the artisans mostly, although there may be designs from the clients. In addition, we also found that the traditional toys have never been used as a Batik motif. The traditional toys Batik motif presented in this work is researcher’s design. For the purposes of this study, we first research the variety of traditional toys available in the market today in Indonesia. We look

  19. Core signalling motif displaying multistability through multi-state enzymes

    DEFF Research Database (Denmark)

    Feng, Song; Saez Cornellana, Meritxell; Wiuf, Carsten Henrik

    2016-01-01

    Bistability, and more generally multistability, is a key system dynamics feature enabling decision-making and memory in cells. Deciphering the molecular determinants of multistability is thus crucial for a better understanding of cellular pathways and their (re)engineering in synthetic biology......-state kinases and the described competition-based motif are part of several natural signalling systems and thereby could enable them to implement complex information processing through multistability. These results indicate that multi-state kinases in signalling systems are readily exploited by natural...

  20. Discovering sequence motifs in quantitative and qualitative pepetide data

    DEFF Research Database (Denmark)

    Andreatta, Massimo

    -dimensional, as binding sites normally consist of a pocket or a groove on the protein surface. However, in many cases such interactions contain a linear component and can be more conveniently represented, or approximated, by a protein-peptide interaction. Whereas time-consuming structural studies are necessary in systems...... and interpret such data. The first paper in this thesis presents a new, publicly available method based on artificial neural networks that allows custom analysis of quantitative peptide data. The online NNAlign web-server provides a simple yet powerful tool for the discovery of sequence motifs in large...

  1. Nucleic Acid i-Motif Structures in Analytical Chemistry.

    Science.gov (United States)

    Alba, Joan Josep; Sadurní, Anna; Gargallo, Raimundo

    2016-09-02

    Under the appropriate experimental conditions of pH and temperature, cytosine-rich segments in DNA or RNA sequences may produce a characteristic folded structure known as an i-motif. Besides its potential role in vivo, which is still under investigation, this structure has attracted increasing interest in other fields due to its sharp, fast and reversible pH-driven conformational changes. This "on/off" switch at molecular level is being used in nanotechnology and analytical chemistry to develop nanomachines and sensors, respectively. This paper presents a review of the latest applications of this structure in the field of chemical analysis.

  2. Present status of quinoxaline motifs: excellent pathfinders in therapeutic medicine.

    Science.gov (United States)

    Ajani, Olayinka Oyewale

    2014-10-01

    Quinoxalines belong to a class of excellent heterocyclic scaffolds owing to their wide biological properties and diverse therapeutic applications in medicinal research. They are complementary in shapes and charges to numerous biomolecules they interact with, thereby resulting in increased binding affinity. The pharmacokinetic properties of drugs bearing quinoxaline cores have shown them to be relatively easy to administer either as intramuscular solutions, oral capsules or rectal suppositories. This work deals with recent advances in the synthesis and pharmacological diversities of quinoxaline motifs which might pave ways for novel drugs development.

  3. Evolving DNA motifs to predict GeneChip probe performance

    Directory of Open Access Journals (Sweden)

    Harrison AP

    2009-03-01

    Full Text Available Abstract Background Affymetrix High Density Oligonuclotide Arrays (HDONA simultaneously measure expression of thousands of genes using millions of probes. We use correlations between measurements for the same gene across 6685 human tissue samples from NCBI's GEO database to indicated the quality of individual HG-U133A probes. Low correlation indicates a poor probe. Results Regular expressions can be automatically created from a Backus-Naur form (BNF context-free grammar using strongly typed genetic programming. Conclusion The automatically produced motif is better at predicting poor DNA sequences than an existing human generated RE, suggesting runs of Cytosine and Guanine and mixtures should all be avoided.

  4. Fast and Accurate Discovery of Degenerate Linear Motifs in Protein Sequences

    Science.gov (United States)

    Levy, Emmanuel D.; Michnick, Stephen W.

    2014-01-01

    Linear motifs mediate a wide variety of cellular functions, which makes their characterization in protein sequences crucial to understanding cellular systems. However, the short length and degenerate nature of linear motifs make their discovery a difficult problem. Here, we introduce MotifHound, an algorithm particularly suited for the discovery of small and degenerate linear motifs. MotifHound performs an exact and exhaustive enumeration of all motifs present in proteins of interest, including all of their degenerate forms, and scores the overrepresentation of each motif based on its occurrence in proteins of interest relative to a background (e.g., proteome) using the hypergeometric distribution. To assess MotifHound, we benchmarked it together with state-of-the-art algorithms. The benchmark consists of 11,880 sets of proteins from S. cerevisiae; in each set, we artificially spiked-in one motif varying in terms of three key parameters, (i) number of occurrences, (ii) length and (iii) the number of degenerate or “wildcard” positions. The benchmark enabled the evaluation of the impact of these three properties on the performance of the different algorithms. The results showed that MotifHound and SLiMFinder were the most accurate in detecting degenerate linear motifs. Interestingly, MotifHound was 15 to 20 times faster at comparable accuracy and performed best in the discovery of highly degenerate motifs. We complemented the benchmark by an analysis of proteins experimentally shown to bind the FUS1 SH3 domain from S. cerevisiae. Using the full-length protein partners as sole information, MotifHound recapitulated most experimentally determined motifs binding to the FUS1 SH3 domain. Moreover, these motifs exhibited properties typical of SH3 binding peptides, e.g., high intrinsic disorder and evolutionary conservation, despite the fact that none of these properties were used as prior information. MotifHound is available (http://michnick.bcm.umontreal.ca or http

  5. Transcription factor motif quality assessment requires systematic comparative analysis [version 2; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Caleb Kipkurui Kibet

    2016-03-01

    Full Text Available Transcription factor (TF binding site prediction remains a challenge in gene regulatory research due to degeneracy and potential variability in binding sites in the genome. Dozens of algorithms designed to learn binding models (motifs have generated many motifs available in research papers with a subset making it to databases like JASPAR, UniPROBE and Transfac. The presence of many versions of motifs from the various databases for a single TF and the lack of a standardized assessment technique makes it difficult for biologists to make an appropriate choice of binding model and for algorithm developers to benchmark, test and improve on their models. In this study, we review and evaluate the approaches in use, highlight differences and demonstrate the difficulty of defining a standardized motif assessment approach. We review scoring functions, motif length, test data and the type of performance metrics used in prior studies as some of the factors that influence the outcome of a motif assessment. We show that the scoring functions and statistics used in motif assessment influence ranking of motifs in a TF-specific manner. We also show that TF binding specificity can vary by source of genomic binding data. We also demonstrate that information content of a motif is not in isolation a measure of motif quality but is influenced by TF binding behaviour. We conclude that there is a need for an easy-to-use tool that presents all available evidence for a comparative analysis.

  6. Finding a Leucine in a Haystack: Searching the Proteome for ambigous Leucine-Aspartic Acid motifs

    KAUST Repository

    Arold, Stefan T.

    2016-01-25

    Leucine-aspartic acid (LD) motifs are short helical protein-protein interaction motifs involved in cell motility, survival and communication. LD motif interactions are also implicated in cancer metastasis and are targeted by several viruses. LD motifs are notoriously difficult to detect because sequence pattern searches lead to an excessively high number of false positives. Hence, despite 20 years of research, only six LD motif–containing proteins are known in humans, three of which are close homologues of the paxillin family. To enable the proteome-wide discovery of LD motifs, we developed LD Motif Finder (LDMF), a web tool based on machine learning that combines sequence information with structural predictions to detect LD motifs with high accuracy. LDMF predicted 13 new LD motifs in humans. Using biophysical assays, we experimentally confirmed in vitro interactions for four novel LD motif proteins. Thus, LDMF allows proteome-wide discovery of LD motifs, despite a highly ambiguous sequence pattern. Functional implications will be discussed.

  7. Motif Discovery in Tissue-Specific Regulatory Sequences Using Directed Information

    Directory of Open Access Journals (Sweden)

    States David

    2007-01-01

    Full Text Available Motif discovery for the identification of functional regulatory elements underlying gene expression is a challenging problem. Sequence inspection often leads to discovery of novel motifs (including transcription factor sites with previously uncharacterized function in gene expression. Coupled with the complexity underlying tissue-specific gene expression, there are several motifs that are putatively responsible for expression in a certain cell type. This has important implications in understanding fundamental biological processes such as development and disease progression. In this work, we present an approach to the identification of motifs (not necessarily transcription factor sites and examine its application to some questions in current bioinformatics research. These motifs are seen to discriminate tissue-specific gene promoter or regulatory regions from those that are not tissue-specific. There are two main contributions of this work. Firstly, we propose the use of directed information for such classification constrained motif discovery, and then use the selected features with a support vector machine (SVM classifier to find the tissue specificity of any sequence of interest. Such analysis yields several novel interesting motifs that merit further experimental characterization. Furthermore, this approach leads to a principled framework for the prospective examination of any chosen motif to be discriminatory motif for a group of coexpressed/coregulated genes, thereby integrating sequence and expression perspectives. We hypothesize that the discovery of these motifs would enable the large-scale investigation for the tissue-specific regulatory role of any conserved sequence element identified from genome-wide studies.

  8. Signature geometry and quantum engineering

    Science.gov (United States)

    Samociuk, Stefan

    2013-09-01

    As the operating frequency of electromagnetic based devices increase, physical design geometry is playing an ever more important role. Evidence is considered in support of a relationship between the dimensionality of primitive geometric forms, such as transistors, and corresponding electromagnetic coupling efficiency. The industry of electronics is defined as the construction of devices by the patterning of primitive forms to physical materials. Examples are given to show the evolution of these primitives, down to nano scales, are requiring exacting geometry and three dimensional content. Consideration of microwave monolithic integrated circuits,(MMIC), photonics and metamaterials,(MM), support this trend and also add new requirements of strict geometric periodicity and multiplicity. Signature geometries,(SG), are characterized by distinctive attributes and examples are given. The transcendent form transcode algorithm, (TTA) is introduced as a multi dimensional SG and its use in designing photonic integrated circuits and metamaterials is discussed . A creative commons licensed research database, TRANSFORM, containing TTA geometries in OASIS file formats is described. An experimental methodology for using the database is given. Multidimensional SG and extraction of three dimensional cross sections as primitive forms is discussed as a foundation for quantum engineering and the exploitation of phenomena other than the electromagnetic.

  9. Transduction motif analysis of gastric cancer based on a human signaling network

    Energy Technology Data Exchange (ETDEWEB)

    Liu, G.; Li, D.Z.; Jiang, C.S.; Wang, W. [Fuzhou General Hospital of Nanjing Command, Department of Gastroenterology, Fuzhou, China, Department of Gastroenterology, Fuzhou General Hospital of Nanjing Command, Fuzhou (China)

    2014-04-04

    To investigate signal regulation models of gastric cancer, databases and literature were used to construct the signaling network in humans. Topological characteristics of the network were analyzed by CytoScape. After marking gastric cancer-related genes extracted from the CancerResource, GeneRIF, and COSMIC databases, the FANMOD software was used for the mining of gastric cancer-related motifs in a network with three vertices. The significant motif difference method was adopted to identify significantly different motifs in the normal and cancer states. Finally, we conducted a series of analyses of the significantly different motifs, including gene ontology, function annotation of genes, and model classification. A human signaling network was constructed, with 1643 nodes and 5089 regulating interactions. The network was configured to have the characteristics of other biological networks. There were 57,942 motifs marked with gastric cancer-related genes out of a total of 69,492 motifs, and 264 motifs were selected as significantly different motifs by calculating the significant motif difference (SMD) scores. Genes in significantly different motifs were mainly enriched in functions associated with cancer genesis, such as regulation of cell death, amino acid phosphorylation of proteins, and intracellular signaling cascades. The top five significantly different motifs were mainly cascade and positive feedback types. Almost all genes in the five motifs were cancer related, including EPOR, MAPK14, BCL2L1, KRT18, PTPN6, CASP3, TGFBR2, AR, and CASP7. The development of cancer might be curbed by inhibiting signal transductions upstream and downstream of the selected motifs.

  10. Signature Based Intrusion Detection System Using SNORT

    Directory of Open Access Journals (Sweden)

    Vinod Kumar

    2012-11-01

    Full Text Available Now a day’s Intrusion Detection systems plays very important role in Network security. As the use of internet is growing rapidly the possibility of attack is also increasing in that ratio. People are using signature based IDS’s. Snort is mostly used signature based IDS because of it is open source software. World widely it is used in intrusion detection and prevention domain. Basic analysis and security engine (BASE is also used to see the alerts generated by Snort. In the paper we have implementation the signature based intrusion detection using Snort. Our work will help to novel user to understand the concept of Snort based IDS.

  11. Improved Quantum Signature Scheme with Weak Arbitrator

    Science.gov (United States)

    Su, Qi; Li, Wen-Min

    2013-09-01

    In this paper, we find a man-in-the-middle attack on the quantum signature scheme with a weak arbitrator (Luo et al., Int. J. Theor. Phys., 51:2135, 2012). In that scheme, the authors proposed a quantum signature based on quantum one way function which contains both verifying the signer phase and verifying the signed message phase. However, after our analysis we will show that Eve can adopt different strategies in respective phases to forge the signature without being detected. Then we present an improved scheme to increase the security.

  12. Arbitrated quantum signature with an untrusted arbitrator

    Science.gov (United States)

    Yang, Yu-Guang; Zhou, Zheng; Teng, Yi-Wei; Wen, Qiao-Yan

    2011-02-01

    In an arbitrated signature scheme, all communications involve a so called arbitrator who has access to the contents of the messages. The security of most arbitrated signature schemes depends heavily on the trustworthiness of the arbitrators. In this paper we show how to construct an arbitrated quantum signature protocol of classical messages with an untrusted arbitrator. Its security is analyzed and it is proved to be secure even if the arbitrator is compromised. In addition, the proposed protocol does not require a direct quantum link between any two communicating users, which is an appealing advantage in the implementation of a practical quantum distributed communication network.

  13. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  14. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  15. Structural conservation of a short, functional, peptide-sequence motif

    OpenAIRE

    Fox-Erlich, Susan; Schiller, Martin R; Gryk, Michael R.

    2009-01-01

    Full length, eukaryotic proteins generally consist of several autonomously folding and functioning domains. Many of these domains are known to function by binding and/or modifying other partner proteins based on the recognition of a short, linear amino sequence contained within the target protein. This article reviews the many bioinformatic tools and resources which discover, define and catalogue the various, known protein domains as well as assist users by identifying domain signatures withi...

  16. Synchronization patterns: from network motifs to hierarchical networks

    Science.gov (United States)

    Krishnagopal, Sanjukta; Lehnert, Judith; Poel, Winnie; Zakharova, Anna; Schöll, Eckehard

    2017-03-01

    We investigate complex synchronization patterns such as cluster synchronization and partial amplitude death in networks of coupled Stuart-Landau oscillators with fractal connectivities. The study of fractal or self-similar topology is motivated by the network of neurons in the brain. This fractal property is well represented in hierarchical networks, for which we present three different models. In addition, we introduce an analytical eigensolution method and provide a comprehensive picture of the interplay of network topology and the corresponding network dynamics, thus allowing us to predict the dynamics of arbitrarily large hierarchical networks simply by analysing small network motifs. We also show that oscillation death can be induced in these networks, even if the coupling is symmetric, contrary to previous understanding of oscillation death. Our results show that there is a direct correlation between topology and dynamics: hierarchical networks exhibit the corresponding hierarchical dynamics. This helps bridge the gap between mesoscale motifs and macroscopic networks. This article is part of the themed issue 'Horizons of cybernetical physics'.

  17. Graph animals, subgraph sampling and motif search in large networks

    CERN Document Server

    Baskerville, Kim; Paczuski, Maya

    2007-01-01

    We generalize a sampling algorithm for lattice animals (connected clusters on a regular lattice) to a Monte Carlo algorithm for `graph animals', i.e. connected subgraphs in arbitrary networks. As with the algorithm in [N. Kashtan et al., Bioinformatics 20, 1746 (2004)], it provides a weighted sample, but the computation of the weights is much faster (linear in the size of subgraphs, instead of super-exponential). This allows subgraphs with up to ten or more nodes to be sampled with very high statistics, from arbitrarily large networks. Using this together with a heuristic algorithm for rapidly classifying isomorphic graphs, we present results for two protein interaction networks obtained using the TAP high throughput method: one of Escherichia coli with 230 nodes and 695 links, and one for yeast (Saccharomyces cerevisiae) with roughly ten times more nodes and links. We find in both cases that most connected subgraphs are strong motifs (Z-scores >10) or anti-motifs (Z-scores <-10) when the null model is the...

  18. Prevalent RNA recognition motif duplication in the human genome.

    Science.gov (United States)

    Tsai, Yihsuan S; Gomez, Shawn M; Wang, Zefeng

    2014-05-01

    The sequence-specific recognition of RNA by proteins is mediated through various RNA binding domains, with the RNA recognition motif (RRM) being the most frequent and present in >50% of RNA-binding proteins (RBPs). Many RBPs contain multiple RRMs, and it is unclear how each RRM contributes to the binding specificity of the entire protein. We found that RRMs within the same RBP (i.e., sibling RRMs) tend to have significantly higher similarity than expected by chance. Sibling RRM pairs from RBPs shared by multiple species tend to have lower similarity than those found only in a single species, suggesting that multiple RRMs within the same protein might arise from domain duplication followed by divergence through random mutations. This finding is exemplified by a recent RRM domain duplication in DAZ proteins and an ancient duplication in PABP proteins. Additionally, we found that different similarities between sibling RRMs are associated with distinct functions of an RBP and that the RBPs tend to contain repetitive sequences with low complexity. Taken together, this study suggests that the number of RBPs with multiple RRMs has expanded in mammals and that the multiple sibling RRMs may recognize similar target motifs in a cooperative manner.

  19. The discodermolide hairpin structure flows from conformationally stable modular motifs.

    Science.gov (United States)

    Jogalekar, Ashutosh S; Kriel, Frederik H; Shi, Qi; Cornett, Ben; Cicero, Daniel; Snyder, James P

    2010-01-14

    (+)-Discodermolide (DDM), a polyketide macrolide from marine sponge, is a potent microtubule assembly promoter. Reported solid-state, solution, and protein-bound DDM conformations reveal the unusual result that a common hairpin conformational motif exists in all three microenvironments. No other flexible microtubule binding agent exhibits such constancy of conformation. In the present study, we combine force-field conformational searches with NMR deconvolution in different solvents to compare DDM conformers with those observed in other environments. While several conformational families are perceived, the hairpin form dominates. The stability of this motif is dictated primarily by steric factors arising from repeated modular segments in DDM composed of the C(Me)-CHX-C(Me) fragment. Furthermore, docking protocols were utilized to probe the DDM binding mode in beta-tubulin. A previously suggested pose is substantiated (Pose-1), while an alternative (Pose-2) has been identified. SAR analysis for DDM analogues differentiates the two poses and suggests that Pose-2 is better able to accommodate the biodata.

  20. The Origin of Motif Families in Food Webs

    CERN Document Server

    Klaise, Janis

    2016-01-01

    Food webs have been found to exhibit remarkable motif profiles, patterns in the relative prevalences of all possible three-species sub-graphs, and this has been related to ecosystem properties such as stability and robustness. Analysing 46 food webs of various kinds, we find that most food webs fall into one of two distinct motif families. The separation between the families is well predicted by a global measure of hierarchical order in directed networks - trophic coherence. We find that trophic coherence is also a good predictor for the extent of omnivory, defined as the tendency of species to feed on multiple trophic levels. We compare our results to a network assembly model that admits tunable trophic coherence via a single free parameter. The model is able to generate food webs in either of the two families by varying this parameter, and correctly classifies almost all the food webs in our database. This establishes a link between global order and local preying patterns in food webs.

  1. Phosphotyrosine Substrate Sequence Motifs for Dual Specificity Phosphatases.

    Directory of Open Access Journals (Sweden)

    Bryan M Zhao

    Full Text Available Protein tyrosine phosphatases dephosphorylate tyrosine residues of proteins, whereas, dual specificity phosphatases (DUSPs are a subgroup of protein tyrosine phosphatases that dephosphorylate not only Tyr(P residue, but also the Ser(P and Thr(P residues of proteins. The DUSPs are linked to the regulation of many cellular functions and signaling pathways. Though many cellular targets of DUSPs are known, the relationship between catalytic activity and substrate specificity is poorly defined. We investigated the interactions of peptide substrates with select DUSPs of four types: MAP kinases (DUSP1 and DUSP7, atypical (DUSP3, DUSP14, DUSP22 and DUSP27, viral (variola VH1, and Cdc25 (A-C. Phosphatase recognition sites were experimentally determined by measuring dephosphorylation of 6,218 microarrayed Tyr(P peptides representing confirmed and theoretical phosphorylation motifs from the cellular proteome. A broad continuum of dephosphorylation was observed across the microarrayed peptide substrates for all phosphatases, suggesting a complex relationship between substrate sequence recognition and optimal activity. Further analysis of peptide dephosphorylation by hierarchical clustering indicated that DUSPs could be organized by substrate sequence motifs, and peptide-specificities by phylogenetic relationships among the catalytic domains. The most highly dephosphorylated peptides represented proteins from 29 cell-signaling pathways, greatly expanding the list of potential targets of DUSPs. These newly identified DUSP substrates will be important for examining structure-activity relationships with physiologically relevant targets.

  2. Sequence Length Limits for Controlling False Positives in Discovering Nucleotide Sequence Motifs

    Institute of Scientific and Technical Information of China (English)

    CHEN Lei; QiAN Zi-liang

    2008-01-01

    In the study of motif discovery, especially the transcription factor DNA binding sites discovery, a too long input sequence would return non-informative motifs rather than those biological functional motifs. This paper gave theoretical analyses and computational experiments to suggest the length limits of the input sequence. When the sequence length exceeds a certain critical point, the probability of discovering the motif decreases sharply. The work not only gave an explanation on the unsatisfying results of the existed motif discovery problems that the input sequence length might be too long and exceed the point, but also provided an estimation of input sequence length we should accept to get more meaningful and reliable results in motif discovery.

  3. Exhaustive Search for Over-represented DNA Sequence Motifs with CisFinder

    Science.gov (United States)

    Sharov, Alexei A.; Ko, Minoru S.H.

    2009-01-01

    We present CisFinder software, which generates a comprehensive list of motifs enriched in a set of DNA sequences and describes them with position frequency matrices (PFMs). A new algorithm was designed to estimate PFMs directly from counts of n-mer words with and without gaps; then PFMs are extended over gaps and flanking regions and clustered to generate non-redundant sets of motifs. The algorithm successfully identified binding motifs for 12 transcription factors (TFs) in embryonic stem cells based on published chromatin immunoprecipitation sequencing data. Furthermore, CisFinder successfully identified alternative binding motifs of TFs (e.g. POU5F1, ESRRB, and CTCF) and motifs for known and unknown co-factors of genes associated with the pluripotent state of ES cells. CisFinder also showed robust performance in the identification of motifs that were only slightly enriched in a set of DNA sequences. PMID:19740934

  4. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2016-12-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  5. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  6. Secure quantum signatures using insecure quantum channels

    Science.gov (United States)

    Amiri, Ryan; Wallden, Petros; Kent, Adrian; Andersson, Erika

    2016-03-01

    Digital signatures are widely used in modern communication to guarantee authenticity and transferability of messages. The security of currently used classical schemes relies on computational assumptions. We present a quantum signature scheme that does not require trusted quantum channels. We prove that it is unconditionally secure against the most general coherent attacks, and show that it requires the transmission of significantly fewer quantum states than previous schemes. We also show that the quantum channel noise threshold for our scheme is less strict than for distilling a secure key using quantum key distribution. This shows that "direct" quantum signature schemes can be preferable to signature schemes relying on secret shared keys generated using quantum key distribution.

  7. Probabilistic Model for Dynamic Signature Verification System

    Directory of Open Access Journals (Sweden)

    Chai Tong Yuen

    2011-11-01

    Full Text Available This study has proposed the algorithm for signature verification system using dynamic parameters of the signature: pen pressure, velocity and position. The system is proposed to read, analyze and verify the signatures from the SUSig online database. Firstly, the testing and reference samples will have to be normalized, re-sampled and smoothed through pre-processing stage. In verification stage, the difference between reference and testing signatures will be calculated based on the proposed thresholded standard deviation method. A probabilistic acceptance model has been designed to enhance the performance of the verification system. The proposed algorithm has reported False Rejection Rate (FRR of 14.8% and False Acceptance Rate (FAR of 2.64%. Meanwhile, the classification rate of the system is around 97%.

  8. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  9. Computing negentropy based signatures for texture recognition

    Directory of Open Access Journals (Sweden)

    Daniela COLTUC

    2007-12-01

    Full Text Available The proposed method aims to provide a new tool for texture recognition. For this purpose, a set of texture samples are decomposed by using the FastICA algorithm and characterized by a negentropy based signature. In order to do recognition, the texture signatures are compared by means of Minkowski distance. The recognition rates, computed for a set of 320 texture samples, show a medium recognition accuracy and the method may be further improved.

  10. Signcryption scheme based on schnorr digital signature

    CERN Document Server

    Savu, Laura

    2012-01-01

    This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life.

  11. Democratic Group Signatures with Threshold Traceability

    Institute of Scientific and Technical Information of China (English)

    LI Xiang-xue; QIAN Hai-feng; LI Jian-hua

    2009-01-01

    This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold trace-ability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of the signer. Any active adversary cannot do this even if he can corrupt up to t - 1 group members.

  12. The value of position-specific priors in motif discovery using MEME

    Directory of Open Access Journals (Sweden)

    Whitington Tom

    2010-04-01

    Full Text Available Abstract Background Position-specific priors have been shown to be a flexible and elegant way to extend the power of Gibbs sampler-based motif discovery algorithms. Information of many types–including sequence conservation, nucleosome positioning, and negative examples–can be converted into a prior over the location of motif sites, which then guides the sequence motif discovery algorithm. This approach has been shown to confer many of the benefits of conservation-based and discriminative motif discovery approaches on Gibbs sampler-based motif discovery methods, but has not previously been studied with methods based on expectation maximization (EM. Results We extend the popular EM-based MEME algorithm to utilize position-specific priors and demonstrate their effectiveness for discovering transcription factor (TF motifs in yeast and mouse DNA sequences. Utilizing a discriminative, conservation-based prior dramatically improves MEME's ability to discover motifs in 156 yeast TF ChIP-chip datasets, more than doubling the number of datasets where it finds the correct motif. On these datasets, MEME using the prior has a higher success rate than eight other conservation-based motif discovery approaches. We also show that the same type of prior improves the accuracy of motifs discovered by MEME in mouse TF ChIP-seq data, and that the motifs tend to be of slightly higher quality those found by a Gibbs sampling algorithm using the same prior. Conclusions We conclude that using position-specific priors can substantially increase the power of EM-based motif discovery algorithms such as MEME algorithm.

  13. Exhaustive Search for Over-represented DNA Sequence Motifs with CisFinder

    OpenAIRE

    Sharov, Alexei A; Minoru S.H. Ko

    2009-01-01

    We present CisFinder software, which generates a comprehensive list of motifs enriched in a set of DNA sequences and describes them with position frequency matrices (PFMs). A new algorithm was designed to estimate PFMs directly from counts of n-mer words with and without gaps; then PFMs are extended over gaps and flanking regions and clustered to generate non-redundant sets of motifs. The algorithm successfully identified binding motifs for 12 transcription factors (TFs) in embryonic stem cel...

  14. NestedMICA as an ab initio protein motif discovery tool

    Directory of Open Access Journals (Sweden)

    Down Thomas A

    2008-01-01

    Full Text Available Abstract Background Discovering overrepresented patterns in amino acid sequences is an important step in protein functional element identification. We adapted and extended NestedMICA, an ab initio motif finder originally developed for finding transcription binding site motifs, to find short protein signals, and compared its performance with another popular protein motif finder, MEME. NestedMICA, an open source protein motif discovery tool written in Java, is driven by a Monte Carlo technique called Nested Sampling. It uses multi-class sequence background models to represent different "uninteresting" parts of sequences that do not contain motifs of interest. In order to assess NestedMICA as a protein motif finder, we have tested it on synthetic datasets produced by spiking instances of known motifs into a randomly selected set of protein sequences. NestedMICA was also tested using a biologically-authentic test set, where we evaluated its performance with respect to varying sequence length. Results Generally NestedMICA recovered most of the short (3–9 amino acid long test protein motifs spiked into a test set of sequences at different frequencies. We showed that it can be used to find multiple motifs at the same time, too. In all the assessment experiments we carried out, its overall motif discovery performance was better than that of MEME. Conclusion NestedMICA proved itself to be a robust and sensitive ab initio protein motif finder, even for relatively short motifs that exist in only a small fraction of sequences. Availability NestedMICA is available under the Lesser GPL open-source license from: http://www.sanger.ac.uk/Software/analysis/nmica/

  15. Chemical and Physical Signatures for Microbial Forensics

    Energy Technology Data Exchange (ETDEWEB)

    Cliff, John B.; Kreuzer, Helen W.; Ehrhardt, Christopher J.; Wunschel, David S.

    2012-01-03

    Chemical and physical signatures for microbial forensics John Cliff and Helen Kreuzer-Martin, eds. Humana Press Chapter 1. Introduction: Review of history and statement of need. Randy Murch, Virginia Tech Chapter 2. The Microbe: Structure, morphology, and physiology of the microbe as they relate to potential signatures of growth conditions. Joany Jackman, Johns Hopkins University Chapter 3. Science for Forensics: Special considerations for the forensic arena - quality control, sample integrity, etc. Mark Wilson (retired FBI): Western Carolina University Chapter 4. Physical signatures: Light and electron microscopy, atomic force microscopy, gravimetry etc. Joseph Michael, Sandia National Laboratory Chapter 5. Lipids: FAME, PLFA, steroids, LPS, etc. James Robertson, Federal Bureau of Investigation Chapter 6. Carbohydrates: Cell wall components, cytoplasm components, methods Alvin Fox, University of South Carolina School of Medicine David Wunschel, Pacific Northwest National Laboratory Chapter 7. Peptides: Peptides, proteins, lipoproteins David Wunschel, Pacific Northwest National Laboratory Chapter 8. Elemental content: CNOHPS (treated in passing), metals, prospective cell types John Cliff, International Atomic Energy Agency Chapter 9. Isotopic signatures: Stable isotopes C,N,H,O,S, 14C dating, potential for heavy elements. Helen Kreuzer-Martin, Pacific Northwest National Laboratory Michaele Kashgarian, Lawrence Livermore National Laboratory Chapter 10. Extracellular signatures: Cellular debris, heme, agar, headspace, spent media, etc Karen Wahl, Pacific Northwest National Laboratory Chapter 11. Data Reduction and Integrated Microbial Forensics: Statistical concepts, parametric and multivariate statistics, integrating signatures Kristin Jarman, Pacific Northwest National Laboratory

  16. A motif extraction algorithm based on hashing and modulo-4 arithmetic.

    Science.gov (United States)

    Sheng, Huitao; Mehrotra, Kishan; Mohan, Chilukuri; Raina, Ramesh

    2008-01-01

    We develop an algorithm to identify cis-elements in promoter regions of coregulated genes. This algorithm searches for subsequences of desired length whose frequency of occurrence is relatively high, while accounting for slightly perturbed variants using hash table and modulo arithmetic. Motifs are evaluated using profile matrices and higher-order Markov background model. Simulation results show that our algorithm discovers more motifs present in the test sequences, when compared with two well-known motif-discovery tools (MDScan and AlignACE). The algorithm produces very promising results on real data set; the output of the algorithm contained many known motifs.

  17. Mapping network motif tunability and robustness in the design of synthetic signaling circuits.

    Directory of Open Access Journals (Sweden)

    Sergio Iadevaia

    Full Text Available Cellular networks are highly dynamic in their function, yet evolutionarily conserved in their core network motifs or topologies. Understanding functional tunability and robustness of network motifs to small perturbations in function and structure is vital to our ability to synthesize controllable circuits. In establishing core sets of network motifs, we selected topologies that are overrepresented in mammalian networks, including the linear, feedback, feed-forward, and bifan circuits. Static and dynamic tunability of network motifs were defined as the motif ability to respectively attain steady-state or transient outputs in response to pre-defined input stimuli. Detailed computational analysis suggested that static tunability is insensitive to the circuit topology, since all of the motifs displayed similar ability to attain predefined steady-state outputs in response to constant inputs. Dynamic tunability, in contrast, was tightly dependent on circuit topology, with some motifs performing superiorly in achieving observed time-course outputs. Finally, we mapped dynamic tunability onto motif topologies to determine robustness of motif structures to changes in topology and identify design principles for the rational assembly of robust synthetic networks.

  18. Sequential dynamics in the motif of excitatory coupled elements

    Science.gov (United States)

    Korotkov, Alexander G.; Kazakov, Alexey O.; Osipov, Grigory V.

    2015-11-01

    In this article a new model of motif (small ensemble) of neuron-like elements is proposed. It is built with the use of the generalized Lotka-Volterra model with excitatory couplings. The main motivation for this work comes from the problems of neuroscience where excitatory couplings are proved to be the predominant type of interaction between neurons of the brain. In this paper it is shown that there are two modes depending on the type of coupling between the elements: the mode with a stable heteroclinic cycle and the mode with a stable limit cycle. Our second goal is to examine the chaotic dynamics of the generalized three-dimensional Lotka-Volterra model.

  19. Study on online community user motif using web usage mining

    Science.gov (United States)

    Alphy, Meera; Sharma, Ajay

    2016-04-01

    The Web usage mining is the application of data mining, which is used to extract useful information from the online community. The World Wide Web contains at least 4.73 billion pages according to Indexed Web and it contains at least 228.52 million pages according Dutch Indexed web on 6th august 2015, Thursday. It’s difficult to get needed data from these billions of web pages in World Wide Web. Here is the importance of web usage mining. Personalizing the search engine helps the web user to identify the most used data in an easy way. It reduces the time consumption; automatic site search and automatic restore the useful sites. This study represents the old techniques to latest techniques used in pattern discovery and analysis in web usage mining from 1996 to 2015. Analyzing user motif helps in the improvement of business, e-commerce, personalisation and improvement of websites.

  20. Sulfur-induced structural motifs on copper and gold surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Walen, Holly [Iowa State Univ., Ames, IA (United States)

    2016-01-01

    The interaction of sulfur with copper and gold surfaces plays a fundamental role in important phenomena that include coarsening of surface nanostructures, and self-assembly of alkanethiols. Here, we identify and analyze unique sulfur-induced structural motifs observed on the low-index surfaces of these two metals. We seek out these structures in an effort to better understand the fundamental interactions between these metals and sulfur that lends to the stability and favorability of metal-sulfur complexes vs. chemisorbed atomic sulfur. The experimental observations presented here—made under identical conditions—together with extensive DFT analyses, allow comparisons and insights into factors that favor the existence of metal-sulfur complexes, vs. chemisorbed atomic sulfur, on metal terraces. We believe this data will be instrumental in better understanding the complex phenomena occurring between the surfaces of coinage metals and sulfur.

  1. The sword motif 'n Matthew 10:34

    Directory of Open Access Journals (Sweden)

    David C. Sim

    2000-01-01

    Full Text Available 'n Mathew 10:34 Jesus uters a very dificult saying. He claims that he has not come to bring peace, but a sword. The form of this saying does not trace back to the historical Jesus; it is the product of Matthew's redaction of a Q passage which is found 'n a more original form 'n Luke 12:51. What did the evangelist mean when he wrote that Jesus brought a sword? 'n the Hebrew scriptures the sword was acommon symbol for the judgement and punishment of God, and 'n later times it represented a number of themes associated with the eschaton. It is argued 'n this study that Mathew, who was fully immersed 'n the apocalyptic-eschatological traditions of his day, probably used the sword motif 'n Matthew 10:34 to symbolise anumber of important eschatological events.

  2. Topological defect motifs in two-dimensional Coulomb clusters

    CERN Document Server

    Radzvilavičius, A; 10.1088/0953-8984/23/38/385301

    2012-01-01

    The most energetically favourable arrangement of low-density electrons in an infinite two-dimensional plane is the ordered triangular Wigner lattice. However, in most instances of contemporary interest one deals instead with finite clusters of strongly interacting particles localized in potential traps, for example, in complex plasmas. In the current contribution we study distribution of topological defects in two-dimensional Coulomb clusters with parabolic lateral confinement. The minima hopping algorithm based on molecular dynamics is used to efficiently locate the ground- and low-energy metastable states, and their structure is analyzed by means of the Delaunay triangulation. The size, structure and distribution of geometry-induced lattice imperfections strongly depends on the system size and the energetic state. Besides isolated disclinations and dislocations, classification of defect motifs includes defect compounds --- grain boundaries, rosette defects, vacancies and interstitial particles. Proliferatio...

  3. Bacteria-mimicking nanoparticle surface functionalization with targeting motifs

    Science.gov (United States)

    Lai, Mei-Hsiu; Clay, Nicholas E.; Kim, Dong Hyun; Kong, Hyunjoon

    2015-04-01

    In recent years, surface modification of nanocarriers with targeting motifs has been explored to modulate delivery of various diagnostic, sensing and therapeutic molecular cargo to desired sites of interest in in vitro bioengineering platforms and in vivo pathologic tissue. However, most surface functionalization approaches are often plagued by complex chemical modifications and effortful purifications. To resolve such challenges, this study demonstrates a unique method to immobilize antibodies that can act as targeting motifs on the surfaces of nanocarriers, inspired by a process that bacteria use for immobilization of the host's antibodies. We hypothesized that alkylated Staphylococcus aureus protein A (SpA) would self-assemble with micelles and subsequently induce stable coupling of antibodies to the micelles. We examined this hypothesis by using poly(2-hydroxyethyl-co-octadecyl aspartamide) (PHEA-g-C18) as a model polymer to form micelles. The self-assembly between the micelles and alkylated SpA became more thermodynamically favorable by increasing the degree of substitution of octadecyl chains to PHEA-g-C18, due to a positive entropy change. Lastly, the mixing of SpA-PA-coupled micelles with antibodies resulted in the coating of micelles with antibodies, as confirmed with a fluorescence resonance energy transfer (FRET) assay. The micelles coated with antibodies to VCAM-1 or integrin αv displayed a higher binding affinity to substrates coated with VCAM-1 and integrin αvβ3, respectively, than other controls, as evaluated with surface plasmon resonance (SPR) spectroscopy and a circulation-simulating flow chamber. We envisage that this bacteria-inspired protein immobilization approach will be useful to improve the quality of targeted delivery of nanoparticles, and can be extended to modify the surface of a wide array of nanocarriers.In recent years, surface modification of nanocarriers with targeting motifs has been explored to modulate delivery of various

  4. Proofs of Security for Improved Rabin Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    DONG Xiao-lei; LU Rong-xing; CAO Zhen-fu

    2006-01-01

    The improved RSA signature scheme can be strictly proved to be equivalent to the factoring problem. In the improved RSA signature scheme, when the public exponent e= 1, the scheme becomes the improved Rabin signature. Such an improved Rabin signature scheme is reviewed and the techniques from the provable security is applied to analyze its security.

  5. Secure Batch Verification Protocol for RSA Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    JIAZongpu; LIQingchao; LIZichen

    2005-01-01

    Harn, in 1998, proposed an efficient batch verification scheme for multiple RSA digital signatures.However, the scheme has a weakness, that is a signer can generate multiple signatures which can pass the batch verification scheme, but every one of these multiple signatures is not a valid signature. To avoid this disadvantage, we propose an improved batch verification scheme.

  6. A Formal Model for the Security of Proxy Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    GU Chun-xiang; ZHU Yue-fei; ZHANG Ya-juan

    2005-01-01

    This paper provides theoretical foundations for the secure proxy signature primitive. We present a formal model for the security of proxy signature schemes, which defines the capabilities of the adversary and the security goals to capture which mean for a proxy signature scheme to be secure. Then, we present an example of proxy signature scheme that can be proven secure in the standard model.

  7. Polyproline and triple helix motifs in host-pathogen recognition.

    Science.gov (United States)

    Berisio, Rita; Vitagliano, Luigi

    2012-12-01

    Secondary structure elements often mediate protein-protein interactions. Despite their low abundance in folded proteins, polyproline II (PPII) and its variant, the triple helix, are frequently involved in protein-protein interactions, likely due to their peculiar propensity to be solvent-exposed. We here review the role of PPII and triple helix in mediating hostpathogen interactions, with a particular emphasis to the structural aspects of these processes. After a brief description of the basic structural features of these elements, examples of host-pathogen interactions involving these motifs are illustrated. Literature data suggest that the role played by PPII motif in these processes is twofold. Indeed, PPII regions may directly mediate interactions between proteins of the host and the pathogen. Alternatively, PPII may act as structural spacers needed for the correct positioning of the elements needed for adhesion and infectivity. Recent investigations have highlighted that collagen triple helix is also a common target for bacterial adhesins. Although structural data on complexes between adhesins and collagen models are rather limited, experimental and theoretical studies have unveiled some interesting clues of the recognition process. Interestingly, very recent data show that not only is the triple helix used by pathogens as a target in the host-pathogen interaction but it may also act as a bait in these processes since bacterial proteins containing triple helix regions have been shown to interact with host proteins. As both PPII and triple helix expose several main chain non-satisfied hydrogen bond acceptors and donors, both elements are highly solvated. The preservation of the solvation state of both PPII and triple helix upon protein-protein interaction is an emerging aspect that will be here thoroughly discussed.

  8. Untraceable partially blind signature based on DLOG problem

    Institute of Scientific and Technical Information of China (English)

    黄征; 陈克非; 冠卫东

    2004-01-01

    This paper proposes a new untraceable Partially Blind Signature scheme which is a cross between the traditional signature scheme and the blind signature scheme. In this proposed scheme, the message M that the signer signed can be divided into two parts. The first part can be known to the signer (like that in the traditional signature scheme) while the other part cannot be known to the signer (like that in the blind signature scheme). After having signed M, the signer cannot determine if he has made the signature of M except through the part that he knows. We draw ideas from Brands' "Restricted Blind Signature" to solve the Untraceable Partially Blind Signature problem. Our scheme is a probabilistic signature scheme and the security of our Untraceable Partially Blind Signature scheme relies on the difficulty of computing discrete logarithm.

  9. On ULF Signatures of Lightning Discharges

    Science.gov (United States)

    Bösinger, T.; Shalimov, S. L.

    2008-06-01

    Recent works on magnetic signatures due to distant lightning discharges are reviewed. Emphasis is laid on magnetic signatures in the ULF range (in the old definition from less than 1 mHz up to 1 Hz), that is in the frequency range below the Schumann resonance. These signatures are known to be of importance for the excitation of the ionospheric Alfvén resonator (IAR) which works only at night time conditions. This emphasizes the difference between night and day time ULF signatures of lightning. The IAR forms a link between the atmosphere and magnetosphere. Similarities and differences of this link in the VLF (Trimpi effect) and ULF range are worked out. A search for a unique signature of sprite-associated positive cloud-to-ground (+CG) lightning discharges ended with a negative result. In this context, however, a new model of lightning-associated induced mesospheric currents was built. Depending on mesospheric condition it can produce magnetic signatures in the entire frequency range from VLF, ELF to ULF. In the latter case it can explain signatures known as the Ultra Slow Tail of +CG lightning discharges. A current problem on the magnetic background noise intensity has been solved by taking more seriously the contribution of +CG lightning discharges to the overall background noise. Their low occurrence rate is more than compensated by their large and long lasting continuing currents. By superposed epoch analysis it could be shown that the ULF response to -CG is one to two orders smaller that in case of +CG with similar peak current values of the return stroke.

  10. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  11. Structural fragment clustering reveals novel structural and functional motifs in α-helical transmembrane proteins

    Directory of Open Access Journals (Sweden)

    Vassilev Boris

    2010-04-01

    Full Text Available Abstract Background A large proportion of an organism's genome encodes for membrane proteins. Membrane proteins are important for many cellular processes, and several diseases can be linked to mutations in them. With the tremendous growth of sequence data, there is an increasing need to reliably identify membrane proteins from sequence, to functionally annotate them, and to correctly predict their topology. Results We introduce a technique called structural fragment clustering, which learns sequential motifs from 3D structural fragments. From over 500,000 fragments, we obtain 213 statistically significant, non-redundant, and novel motifs that are highly specific to α-helical transmembrane proteins. From these 213 motifs, 58 of them were assigned to function and checked in the scientific literature for a biological assessment. Seventy percent of the motifs are found in co-factor, ligand, and ion binding sites, 30% at protein interaction interfaces, and 12% bind specific lipids such as glycerol or cardiolipins. The vast majority of motifs (94% appear across evolutionarily unrelated families, highlighting the modularity of functional design in membrane proteins. We describe three novel motifs in detail: (1 a dimer interface motif found in voltage-gated chloride channels, (2 a proton transfer motif found in heme-copper oxidases, and (3 a convergently evolved interface helix motif found in an aspartate symporter, a serine protease, and cytochrome b. Conclusions Our findings suggest that functional modules exist in membrane proteins, and that they occur in completely different evolutionary contexts and cover different binding sites. Structural fragment clustering allows us to link sequence motifs to function through clusters of structural fragments. The sequence motifs can be applied to identify and characterize membrane proteins in novel genomes.

  12. Assembly of supramolecular DNA complexes containing both G-quadruplexes and i-motifs by enhancing the G-repeat-bearing capacity of i-motifs

    Science.gov (United States)

    Cao, Yanwei; Gao, Shang; Yan, Yuting; Bruist, Michael F.; Wang, Bing; Guo, Xinhua

    2017-01-01

    The single-step assembly of supramolecular complexes containing both i-motifs and G-quadruplexes (G4s) is demonstrated. This can be achieved because the formation of four-stranded i-motifs appears to be little affected by certain terminal residues: a five-cytosine tetrameric i-motif can bear ten-base flanking residues. However, things become complex when different lengths of guanine-repeats are added at the 3′ or 5′ ends of the cytosine-repeats. Here, a series of oligomers d(XGiXC5X) and d(XC5XGiX) (X = A, T or none; i < 5) are designed to study the impact of G-repeats on the formation of tetrameric i-motifs. Our data demonstrate that tetramolecular i-motif structure can tolerate specific flanking G-repeats. Assemblies of these oligonucleotides are polymorphic, but may be controlled by solution pH and counter ion species. Importantly, we find that the sequences d(TGiAC5) can form the tetrameric i-motif in large quantities. This leads to the design of two oligonucleotides d(TG4AC7) and d(TGBrGGBrGAC7) that self-assemble to form quadruplex supramolecules under certain conditions. d(TG4AC7) forms supramolecules under acidic conditions in the presence of K+ that are mainly V-shaped or ring-like containing parallel G4s and antiparallel i-motifs. d(TGBrGGBrGAC7) forms long linear quadruplex wires under acidic conditions in the presence of Na+ that consist of both antiparallel G4s and i-motifs. PMID:27899568

  13. Person Identification System using Static-dynamic signatures fusion

    OpenAIRE

    S.A Daramola; T.S Ibiyemi

    2010-01-01

    Off-line signature verification systems rely on static image of signature for person identification. Imposter can easily imitate the static image of signature of the genuine user due to lack of dynamic features. This paper proposes person identity verification system using fused static-dynamic signature features. Computational efficient technique is developed to extract and fuse static and dynamic features extracted from offline and online signatures of the same person. The training stage use...

  14. An Identity-Based Strong Designated Verifier Proxy Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    WANG Qin; CAO Zhenfu

    2006-01-01

    In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements.

  15. Identification of coupling DNA motif pairs on long-range chromatin interactions in human K562 cells

    KAUST Repository

    Wong, Ka-Chun

    2015-09-27

    Motivation: The protein-DNA interactions between transcription factors (TFs) and transcription factor binding sites (TFBSs, also known as DNA motifs) are critical activities in gene transcription. The identification of the DNA motifs is a vital task for downstream analysis. Unfortunately, the long-range coupling information between different DNA motifs is still lacking. To fill the void, as the first-of-its-kind study, we have identified the coupling DNA motif pairs on long-range chromatin interactions in human. Results: The coupling DNA motif pairs exhibit substantially higher DNase accessibility than the background sequences. Half of the DNA motifs involved are matched to the existing motif databases, although nearly all of them are enriched with at least one gene ontology term. Their motif instances are also found statistically enriched on the promoter and enhancer regions. Especially, we introduce a novel measurement called motif pairing multiplicity which is defined as the number of motifs that are paired with a given motif on chromatin interactions. Interestingly, we observe that motif pairing multiplicity is linked to several characteristics such as regulatory region type, motif sequence degeneracy, DNase accessibility and pairing genomic distance. Taken into account together, we believe the coupling DNA motif pairs identified in this study can shed lights on the gene transcription mechanism under long-range chromatin interactions. © The Author 2015. Published by Oxford University Press.

  16. New Extensions of Pairing-based Signatures into Universal (Multi) Designated Verifier Signatures

    CERN Document Server

    Vergnaud, Damien

    2008-01-01

    The concept of universal designated verifier signatures was introduced by Steinfeld, Bull, Wang and Pieprzyk at Asiacrypt 2003. These signatures can be used as standard publicly verifiable digital signatures but have an additional functionality which allows any holder of a signature to designate the signature to any desired verifier. This designated verifier can check that the message was indeed signed, but is unable to convince anyone else of this fact. We propose new efficient constructions for pairing-based short signatures. Our first scheme is based on Boneh-Boyen signatures and its security can be analyzed in the standard security model. We prove its resistance to forgery assuming the hardness of the so-called strong Diffie-Hellman problem, under the knowledge-of-exponent assumption. The second scheme is compatible with the Boneh-Lynn-Shacham signatures and is proven unforgeable, in the random oracle model, under the assumption that the computational bilinear Diffie-Hellman problem is untractable. Both s...

  17. Spectroscopic Signature of a Ubiquitous Metal Binding Site in the Metallo-beta-lactamase Superfamily

    Energy Technology Data Exchange (ETDEWEB)

    V Campos-Bermudez; J Gonzalez; D Tierney; A Vila

    2011-12-31

    The metallo-{beta}-lactamase (M{beta}L) superfamily is a functionally diverse group of metalloproteins sharing a distinctive {alpha}{beta}/{alpha}{beta} fold and a characteristic metal binding motif. A large number of open reading frames identified in genomic sequencing efforts have been annotated as members of this superfamily through sequence comparisons. However, structural and functional studies performed on purified proteins are normally needed to unequivocally include a newly discovered protein in the M{beta}L superfamily. Here we report the spectroscopic characterization of recombinant YcbL, a gene product annotated as a member of the M{beta}L superfamily whose function in vivo remains unknown. By taking advantage of the structural features characterizing the M{beta}L superfamily metal binding motif, we performed spectroscopic studies on Zn(II)- and Co(II)-substituted YcbL to structurally interrogate the metal binding site. The dinuclear center in Co(II)-YcbL was shown to display characteristic electronic absorption features in the visible region, which were also observed in an engineered M{beta}L aimed at mimicking this metal site. Thus, the spectroscopic features reported herein can be employed as a signature to readily identify and characterize the presence of these ubiquitous metal binding sites.

  18. The signature package on Witt spaces

    CERN Document Server

    Albin, Pierre; Mazzeo, Rafe; Piazza, Paolo

    2011-01-01

    In this paper we prove a variety of results about the signature operator on Witt spaces. First, we give a parametrix construction for the signature operator on any compact, oriented, stratified pseudomanifold X which satisfies the Witt condition. This construction, which is inductive over the `depth' of the singularity, is then used to show that the signature operator is essentially self-adjoint and has discrete spectrum of finite multiplicity, so that its index -- the analytic signature of X -- is well-defined. This provides an alternate approach to some well-known results due to Cheeger. We then prove some new results. By coupling this parametrix construction to a C*_r\\Gamma-Mishchenko bundle associated to any Galois covering of X with covering group \\Gamma, we prove analogues of the same analytic results, from which it follows that one may define an analytic signature index class as an element of the K-theory of C*_r\\Gamma. We go on to establish in this setting and for this class the full range of conclusi...

  19. MOMFER: A Search Engine of Thompson's Motif-Index of Folk Literature

    NARCIS (Netherlands)

    Karsdorp, F.B.; van der Meulen, Marten; Meder, Theo; van den Bosch, Antal

    2015-01-01

    More than fifty years after the first edition of Thompson's seminal Motif-Indexof Folk Literature, we present an online search engine tailored to fully disclose the index digitally. This search engine, called MOMFER, greatly enhances the searchability of the Motif-Index and provides exciting new way

  20. Observed and predicted hydrogen bond motifs in crystal structures of hydantoins, dihydrouracils and uracils

    NARCIS (Netherlands)

    Cruz-Cabeza, A.J.; Schwalbe, C.H.

    2012-01-01

    A survey of crystal structures containing hydantoin, dihydrouracil and uracil derivatives in the Cambridge Structural Database revealed four main types of hydrogen bond motifs when derivatives with extra substituents able to interfere with the main motif are excluded. All these molecules contain two

  1. Mining minimal motif pair sets maximally covering interactions in a protein-protein interaction network

    NARCIS (Netherlands)

    Boyen, P.; Neven, F.; Valentim, F.L.; Dijk, van A.D.J.

    2013-01-01

    Correlated motif covering (CMC) is the problem of finding a set of motif pairs, i.e., pairs of patterns, in the sequences of proteins from a protein-protein interaction network (PPI-network) that describe the interactions in the network as concisely as possible. In other words, a perfect solution fo

  2. Wayward Warriors: The Viking Motif in Swedish and English Children's Literature

    Science.gov (United States)

    Sundmark, Björn

    2014-01-01

    In this article the Viking motif in children's literature is explored--from its roots in (adult) nationalist and antiquarian discourse, over pedagogical and historical texts for children, to the eventual diversification (or dissolution) of the motif into different genres and forms. The focus is on Swedish Viking narratives, but points of…

  3. The EDLL motif: a potent plant transcriptional activation domain from AP2/ERF transcription factors.

    Science.gov (United States)

    Tiwari, Shiv B; Belachew, Alemu; Ma, Siu Fong; Young, Melinda; Ade, Jules; Shen, Yu; Marion, Colleen M; Holtan, Hans E; Bailey, Adina; Stone, Jeffrey K; Edwards, Leslie; Wallace, Andreah D; Canales, Roger D; Adam, Luc; Ratcliffe, Oliver J; Repetti, Peter P

    2012-06-01

    In plants, the ERF/EREBP family of transcriptional regulators plays a key role in adaptation to various biotic and abiotic stresses. These proteins contain a conserved AP2 DNA-binding domain and several uncharacterized motifs. Here, we describe a short motif, termed 'EDLL', that is present in AtERF98/TDR1 and other clade members from the same AP2 sub-family. We show that the EDLL motif, which has a unique arrangement of acidic amino acids and hydrophobic leucines, functions as a strong activation domain. The motif is transferable to other proteins, and is active at both proximal and distal positions of target promoters. As such, the EDLL motif is able to partly overcome the repression conferred by the AtHB2 transcription factor, which contains an ERF-associated amphiphilic repression (EAR) motif. We further examined the activation potential of EDLL by analysis of the regulation of flowering time by NF-Y (nuclear factor Y) proteins. Genetic evidence indicates that NF-Y protein complexes potentiate the action of CONSTANS in regulation of flowering in Arabidopsis; we show that the transcriptional activation function of CONSTANS can be substituted by direct fusion of the EDLL activation motif to NF-YB subunits. The EDLL motif represents a potent plant activation domain that can be used as a tool to confer transcriptional activation potential to heterologous DNA-binding proteins.

  4. Evolutionary dynamics of a conserved sequence motif in the ribosomal genes of the ciliate Paramecium

    Directory of Open Access Journals (Sweden)

    Lynch Michael

    2010-05-01

    Full Text Available Abstract Background In protozoa, the identification of preserved motifs by comparative genomics is often impeded by difficulties to generate reliable alignments for non-coding sequences. Moreover, the evolutionary dynamics of regulatory elements in 3' untranslated regions (both in protozoa and metazoa remains a virtually unexplored issue. Results By screening Paramecium tetraurelia's 3' untranslated regions for 8-mers that were previously found to be preserved in mammalian 3' UTRs, we detect and characterize a motif that is distinctly conserved in the ribosomal genes of this ciliate. The motif appears to be conserved across Paramecium aurelia species but is absent from the ribosomal genes of four additional non-Paramecium species surveyed, including another ciliate, Tetrahymena thermophila. Motif-free ribosomal genes retain fewer paralogs in the genome and appear to be lost more rapidly relative to motif-containing genes. Features associated with the discovered preserved motif are consistent with this 8-mer playing a role in post-transcriptional regulation. Conclusions Our observations 1 shed light on the evolution of a putative regulatory motif across large phylogenetic distances; 2 are expected to facilitate the understanding of the modulation of ribosomal genes expression in Paramecium; and 3 reveal a largely unexplored--and presumably not restricted to Paramecium--association between the presence/absence of a DNA motif and the evolutionary fate of its host genes.

  5. Distinct recognition modes of FXXLF and LXXLL motifs by the androgen receptor.

    NARCIS (Netherlands)

    H.J. Dubbink (Erik Jan); R. Hersmus (Remko); C.S. Verma (Chandra); H.A.G.M. van der Korput (Hetty); C.A. Berrevoets (Cor); J. van Tol (Judith); A.C.J. Ziel-van der Made (Angelique); A.O. Brinkmann (Albert); A.C. Pike (Ashley); J. Trapman (Jan)

    2004-01-01

    textabstractAmong nuclear receptors, the androgen receptor (AR) is unique in that its ligand-binding domain (LBD) interacts with the FXXLF motif in the N-terminal domain, resembling coactivator LXXLL motifs. We compared AR- and estrogen receptor alpha-LBD interactions of the wild-t

  6. High affinity recognition of a Phytophthora protein by Arabidopsis via an RGD motif

    NARCIS (Netherlands)

    Senchou, V.; Weide, R.L.; Carrasco, A.; Bouyssou, H.; Pont-Lezica, R.; Govers, F.; Canut, H.

    2004-01-01

    The RGD tripeptide sequence, a cell adhesion motif present in several extracellular matrix proteins of mammalians, is involved in numerous plant processes. In plant-pathogen interactions, the RGD motif is believed to reduce plant defence responses by disrupting adhesions between the cell wall and pl

  7. Seed storage protein gene promoters contain conserved DNA motifs in Brassicaceae, Fabaceae and Poaceae

    Directory of Open Access Journals (Sweden)

    Fauteux François

    2009-10-01

    Full Text Available Abstract Background Accurate computational identification of cis-regulatory motifs is difficult, particularly in eukaryotic promoters, which typically contain multiple short and degenerate DNA sequences bound by several interacting factors. Enrichment in combinations of rare motifs in the promoter sequence of functionally or evolutionarily related genes among several species is an indicator of conserved transcriptional regulatory mechanisms. This provides a basis for the computational identification of cis-regulatory motifs. Results We have used a discriminative seeding DNA motif discovery algorithm for an in-depth analysis of 54 seed storage protein (SSP gene promoters from three plant families, namely Brassicaceae (mustards, Fabaceae (legumes and Poaceae (grasses using backgrounds based on complete sets of promoters from a representative species in each family, namely Arabidopsis (Arabidopsis thaliana (L. Heynh., soybean (Glycine max (L. Merr. and rice (Oryza sativa L. respectively. We have identified three conserved motifs (two RY-like and one ACGT-like in Brassicaceae and Fabaceae SSP gene promoters that are similar to experimentally characterized seed-specific cis-regulatory elements. Fabaceae SSP gene promoter sequences are also enriched in a novel, seed-specific E2Fb-like motif. Conserved motifs identified in Poaceae SSP gene promoters include a GCN4-like motif, two prolamin-box-like motifs and an Skn-1-like motif. Evidence of the presence of a variant of the TATA-box is found in the SSP gene promoters from the three plant families. Motifs discovered in SSP gene promoters were used to score whole-genome sets of promoters from Arabidopsis, soybean and rice. The highest-scoring promoters are associated with genes coding for different subunits or precursors of seed storage proteins. Conclusion Seed storage protein gene promoter motifs are conserved in diverse species, and different plant families are characterized by a distinct combination

  8. Mitoxantrone and Analogues Bind and Stabilize i-Motif Forming DNA Sequences

    Science.gov (United States)

    Wright, Elisé P.; Day, Henry A.; Ibrahim, Ali M.; Kumar, Jeethendra; Boswell, Leo J. E.; Huguin, Camille; Stevenson, Clare E. M.; Pors, Klaus; Waller, Zoë A. E.

    2016-12-01

    There are hundreds of ligands which can interact with G-quadruplex DNA, yet very few which target i-motif. To appreciate an understanding between the dynamics between these structures and how they can be affected by intervention with small molecule ligands, more i-motif binding compounds are required. Herein we describe how the drug mitoxantrone can bind, induce folding of and stabilise i-motif forming DNA sequences, even at physiological pH. Additionally, mitoxantrone was found to bind i-motif forming sequences preferentially over double helical DNA. We also describe the stabilisation properties of analogues of mitoxantrone. This offers a new family of ligands with potential for use in experiments into the structure and function of i-motif forming DNA sequences.

  9. Selection for the G4 DNA motif at the 5' end of human genes.

    Science.gov (United States)

    Eddy, Johanna; Maizels, Nancy

    2009-04-01

    Formation of G4 DNA may occur in the course of replication and transcription, and contribute to genomic instability. We have quantitated abundance of G4 motifs and potential for G4 DNA formation of the nontemplate strand of 5' exons and introns of transcripts of human genes. We find that, for all human genes, G4 motifs are enriched in 5' regions of transcripts relative to downstream regions; and in 5' regulatory regions relative to coding regions. Notably, although tumor suppressor genes are depleted and proto-oncogenes enriched in G4 motifs, abundance of G4 motifs in the 5' regions of transcripts of genes in these categories does not differ. These results support the hypothesis that G4 motifs are under selection in the human genome. They further show that for tumor suppressor genes and proto-oncogenes, independent selection determines potential for G4 DNA formation of 5' regulatory regions of transcripts and downstream coding regions.

  10. Cryptanalysis of the arbitrated quantum signature protocols

    Science.gov (United States)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-08-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  11. Cryptanalysis of the arbitrated quantum signature protocols

    CERN Document Server

    Gao, Fei; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-01-01

    As a new model for signing quantum message, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver Bob can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender Alice can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics in future study on AQS protocols.

  12. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  13. Molecular signature in HCV-positive lymphomas.

    Science.gov (United States)

    De Re, Valli; Caggiari, Laura; Garziera, Marica; De Zorzi, Mariangela; Repetto, Ombretta

    2012-01-01

    Hepatitis C virus (HCV) is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL). Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  14. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  15. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  16. Bioinformatics Study of Cancer-Related Mutations within p53 Phosphorylation Site Motifs

    Directory of Open Access Journals (Sweden)

    Xiaona Ji

    2014-07-01

    Full Text Available p53 protein has about thirty phosphorylation sites located at the N- and C-termini and in the core domain. The phosphorylation sites are relatively less mutated than other residues in p53. To understand why and how p53 phosphorylation sites are rarely mutated in human cancer, using a bioinformatics approaches, we examined the phosphorylation site and its nearby flanking residues, focusing on the consensus phosphorylation motif pattern, amino-acid correlations within the phosphorylation motifs, the propensity of structural disorder of the phosphorylation motifs, and cancer mutations observed within the phosphorylation motifs. Many p53 phosphorylation sites are targets for several kinases. The phosphorylation sites match 17 consensus sequence motifs out of the 29 classified. In addition to proline, which is common in kinase specificity-determining sites, we found high propensity of acidic residues to be adjacent to phosphorylation sites. Analysis of human cancer mutations in the phosphorylation motifs revealed that motifs with adjacent acidic residues generally have fewer mutations, in contrast to phosphorylation sites near proline residues. p53 phosphorylation motifs are mostly disordered. However, human cancer mutations within phosphorylation motifs tend to decrease the disorder propensity. Our results suggest that combination of acidic residues Asp and Glu with phosphorylation sites provide charge redundancy which may safe guard against loss-of-function mutations, and that the natively disordered nature of p53 phosphorylation motifs may help reduce mutational damage. Our results further suggest that engineering acidic amino acids adjacent to potential phosphorylation sites could be a p53 gene therapy strategy.

  17. The Land of the Dead – International Motifs in the Oldest Work of Japanese Literature

    Directory of Open Access Journals (Sweden)

    Danijela Vasić

    2010-02-01

    Full Text Available Il existe dans le Kojiki (712, la plus ancienne œuvre littéraire du Japon, une abondance de motifs que l’on peut retrouver dans les cultures de nombreux peuples dans le monde entier. Cet article traite des motifs internationaux tissés dans deux mythes du premier tome, formant une image poétique du Pays des morts, la partie souterraine d’une structure cosmique tripartite. Sont abordés, entre autres, le motif largement connu de Perséphone, le motif orphique ou encore le motif de la fuite du Pays des morts.In the Kojiki (712, the oldest literary work of Japan, there is a plethora of motifs which could be found in the cultures of many peoples all over the world. This paper deals with the international motifs interwoven in two myths from the first volume, forming a poetic picture of the Land of the Dead, the underworld part of the trichotomic cosmic structure. Among other things, we find the widely known Persephone motif, the Orphic motif or the motif of the successful escape from the Land of the Dead.En Kojiki (712, la obra literaria más antigua de Japón, abundan motivos que pueden encontrarse en numerosas culturas de todo el mundo. Este artículo analiza los motivos internacionales entretejidos en dos mitos del primer volumen, los cuales forman una imagen poética del País de los Muertos, la sección subterránea de una estructura cósmica tripartita. Se abordan, entre otros, el famoso motivo de Perséfone, el motivo órfico de la huída exitosa del País de los Muertos.

  18. Threshold Signature Scheme Based on Discrete Logarithm and Quadratic Residue

    Institute of Scientific and Technical Information of China (English)

    FEI Ru-chun; WANG Li-na

    2004-01-01

    Digital signature scheme is a very important research field in computer security and modern cryptography.A(k,n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir secret sharing scheme.It can realize group-oriented digital signature, and its security is based on the difficulty in computing discrete logarithm and quadratic residue on some special conditions.In this scheme, effective digital signature can not be generated by any k-1 or fewer legal users, or only by signature executive.In addition, this scheme can identify any legal user who presents incorrect partial digital signature to disrupt correct signature, or any illegal user who forges digital signature.A method of extending this scheme to an Abelian group such as elliptical curve group is also discussed.The extended scheme can provide rapider computing speed and stronger security in the case of using shorter key.

  19. Transient thermal camouflage and heat signature control

    Science.gov (United States)

    Yang, Tian-Zhi; Su, Yishu; Xu, Weikai; Yang, Xiao-Dong

    2016-09-01

    Thermal metamaterials have been proposed to manipulate heat flux as a new way to cloak or camouflage objects in the infrared world. To date, however, thermal metamaterials only operate in the steady-state and exhibit detectable, transient heat signatures. In this letter, the theoretical basis for a thermal camouflaging technique with controlled transient diffusion is presented. This technique renders an object invisible in real time. More importantly, the thermal camouflaging device instantaneously generates a pre-designed heat signature and behaves as a perfect thermal illusion device. A metamaterial coating with homogeneous and isotropic thermal conductivity, density, and volumetric heat capacity was fabricated and very good camouflaging performance was achieved.

  20. Security problem on arbitrated quantum signature schemes

    Science.gov (United States)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-12-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  1. Security problem on arbitrated quantum signature schemes

    CERN Document Server

    Choi, Jeong Woon; Hong, Dowon

    2011-01-01

    Until now, there have been developed many arbitrated quantum signature schemes implemented with a help of a trusted third party. In order to guarantee the unconditional security, most of them take advantage of the optimal quantum one-time encryption method based on Pauli operators. However, we in this paper point out that the previous schemes only provides a security against total break and actually show that there exists a simple existential forgery attack to validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover the security against the proposed attack.

  2. Reflectance signature on sunlit crown of conifers

    Institute of Scientific and Technical Information of China (English)

    王锦地; 李小文; 项月琴

    1997-01-01

    Based on the field measurements of the reflected radiation distribution on sunlit crown surface and crown structure, the analytical approximation model of path-scattering of light in a homogeneous layer is applied to the calculation of the reflectance signature of sunlit crown. The reflectance on the sunlit crown surface is considered as the weighted sum of the direct-to-hemisphere reflectance and the hemisphere-to-hemisphere reflectance. The validation results show that the calculated reflectance signature fits the field measurement very well This paper presents details of the validation and the feasibility of the model application to nonuniform medium, such as tree crown canopies.

  3. State of the Art: Signature Biometrics Verification

    Directory of Open Access Journals (Sweden)

    Nourddine Guersi

    2010-04-01

    Full Text Available This paper presents a comparative analysis of the performance of three estimation algorithms: Expectation Maximization (EM, Greedy EM Algorithm (GEM and Figueiredo-Jain Algorithm (FJ - based on the Gaussian mixture models (GMMs for signature biometrics verification. The simulation results have shown significant performance achievements. The test performance of EER=5.49 % for "EM", EER=5.04 % for "GEM" and EER=5.00 % for "FJ", shows that the behavioral information scheme of signature biometrics is robust and has a discriminating power, which can be explored for identity authentication.

  4. Attack and improvements of fair quantum blind signature schemes

    Science.gov (United States)

    Zou, Xiangfu; Qiu, Daowen

    2013-06-01

    Blind signature schemes allow users to obtain the signature of a message while the signer learns neither the message nor the resulting signature. Therefore, blind signatures have been used to realize cryptographic protocols providing the anonymity of some participants, such as: secure electronic payment systems and electronic voting systems. A fair blind signature is a form of blind signature which the anonymity could be removed with the help of a trusted entity, when this is required for legal reasons. Recently, a fair quantum blind signature scheme was proposed and thought to be safe. In this paper, we first point out that there exists a new attack on fair quantum blind signature schemes. The attack shows that, if any sender has intercepted any valid signature, he (she) can counterfeit a valid signature for any message and can not be traced by the counterfeited blind signature. Then, we construct a fair quantum blind signature scheme by improved the existed one. The proposed fair quantum blind signature scheme can resist the preceding attack. Furthermore, we demonstrate the security of the proposed fair quantum blind signature scheme and compare it with the other one.

  5. One motif to bind them: A small-XXX-small motif affects transmembrane domain 1 oligomerization, function, localization, and cross-talk between two yeast GPCRs.

    Science.gov (United States)

    Lock, Antonia; Forfar, Rachel; Weston, Cathryn; Bowsher, Leo; Upton, Graham J G; Reynolds, Christopher A; Ladds, Graham; Dixon, Ann M

    2014-12-01

    G protein-coupled receptors (GPCRs) are the largest family of cell-surface receptors in mammals and facilitate a range of physiological responses triggered by a variety of ligands. GPCRs were thought to function as monomers, however it is now accepted that GPCR homo- and hetero-oligomers also exist and influence receptor properties. The Schizosaccharomyces pombe GPCR Mam2 is a pheromone-sensing receptor involved in mating and has previously been shown to form oligomers in vivo. The first transmembrane domain (TMD) of Mam2 contains a small-XXX-small motif, overrepresented in membrane proteins and well-known for promoting helix-helix interactions. An ortholog of Mam2 in Saccharomyces cerevisiae, Ste2, contains an analogous small-XXX-small motif which has been shown to contribute to receptor homo-oligomerization, localization and function. Here we have used experimental and computational techniques to characterize the role of the small-XXX-small motif in function and assembly of Mam2 for the first time. We find that disruption of the motif via mutagenesis leads to reduction of Mam2 TMD1 homo-oligomerization and pheromone-responsive cellular signaling of the full-length protein. It also impairs correct targeting to the plasma membrane. Mutation of the analogous motif in Ste2 yielded similar results, suggesting a conserved mechanism for assembly. Using co-expression of the two fungal receptors in conjunction with computational models, we demonstrate a functional change in G protein specificity and propose that this is brought about through hetero-dimeric interactions of Mam2 with Ste2 via the complementary small-XXX-small motifs. This highlights the potential of these motifs to affect a range of properties that can be investigated in other GPCRs.

  6. Eukaryotic penelope-like retroelements encode hammerhead ribozyme motifs.

    Science.gov (United States)

    Cervera, Amelia; De la Peña, Marcos

    2014-11-01

    Small self-cleaving RNAs, such as the paradigmatic Hammerhead ribozyme (HHR), have been recently found widespread in DNA genomes across all kingdoms of life. In this work, we found that new HHR variants are preserved in the ancient family of Penelope-like elements (PLEs), a group of eukaryotic retrotransposons regarded as exceptional for encoding telomerase-like retrotranscriptases and spliceosomal introns. Our bioinformatic analysis revealed not only the presence of minimalist HHRs in the two flanking repeats of PLEs but also their massive and widespread occurrence in metazoan genomes. The architecture of these ribozymes indicates that they may work as dimers, although their low self-cleavage activity in vitro suggests the requirement of other factors in vivo. In plants, however, PLEs show canonical HHRs, whereas fungi and protist PLEs encode ribozyme variants with a stable active conformation as monomers. Overall, our data confirm the connection of self-cleaving RNAs with eukaryotic retroelements and unveil these motifs as a significant fraction of the encoded information in eukaryotic genomes.

  7. Dystroglycan versatility in cell adhesion: a tale of multiple motifs

    Directory of Open Access Journals (Sweden)

    Winder Steve J

    2010-02-01

    Full Text Available Abstract Dystroglycan is a ubiquitously expressed heterodimeric adhesion receptor. The extracellular α-subunit makes connections with a number of laminin G domain ligands including laminins, agrin and perlecan in the extracellular matrix and the transmembrane β-subunit makes connections to the actin filament network via cytoskeletal linkers including dystrophin, utrophin, ezrin and plectin, depending on context. Originally discovered as part of the dystrophin glycoprotein complex of skeletal muscle, dystroglycan is an important adhesion molecule and signalling scaffold in a multitude of cell types and tissues and is involved in several diseases. Dystroglycan has emerged as a multifunctional adhesion platform with many interacting partners associating with its short unstructured cytoplasmic domain. Two particular hotspots are the cytoplasmic juxtamembrane region and at the very carboxy terminus of dystroglycan. Regions which between them have several overlapping functions: in the juxtamembrane region; a nuclear localisation signal, ezrin/radixin/moesin protein, rapsyn and ERK MAP Kinase binding function, and at the C terminus a regulatory tyrosine governing WW, SH2 and SH3 domain interactions. We will discuss the binding partners for these motifs and how their interactions and regulation can modulate the involvement of dystroglycan in a range of different adhesion structures and functions depending on context. Thus dystroglycan presents as a multifunctional scaffold involved in adhesion and adhesion-mediated signalling with its functions under exquisite spatio-temporal regulation.

  8. Peptide motif analysis predicts alphaviruses as triggers for rheumatoid arthritis.

    Science.gov (United States)

    Hogeboom, Charissa

    2015-12-01

    Rheumatoid arthritis (RA) develops in response to both genetic and environmental factors. The strongest genetic determinant is HLA-DR, where polymorphisms within the P4 and P6 binding pockets confer elevated risk. However, low disease concordance across monozygotic twin pairs underscores the importance of an environmental factor, probably infectious. The goal of this investigation was to predict the microorganism most likely to interact with HLA-DR to trigger RA under the molecular mimicry hypothesis. A set of 185 structural proteins from viruses or intracellular bacteria was scanned for regions of sequence homology with a collagen peptide that binds preferentially to DR4; candidates were then evaluated against a motif required for T cell cross-reactivity. The plausibility of the predicted agent was evaluated by comparison of microbial prevalence patterns to epidemiological characteristics of RA. Peptides from alphavirus capsid proteins provided the closest fit. Variations in the P6 position suggest that the HLA binding preference may vary by species, with Ross River virus, Chikungunya virus, and Mayaro virus peptides binding preferentially to DR4, and peptides from Sindbis/Ockelbo virus showing stronger affinity to DR1. The predicted HLA preference is supported by epidemiological studies of post-infection chronic arthralgia. Parallels between the cytokine profiles of RA and chronic alphavirus infection are discussed.

  9. VAMP subfamilies identified by specific R-SNARE motifs.

    Science.gov (United States)

    Rossi, Valeria; Picco, Raffaella; Vacca, Marcella; D'Esposito, Maurizio; D'Urso, Michele; Galli, Thierry; Filippini, Francesco

    2004-05-01

    In eukaryotes, interactions among the alpha-helical coiled-coil domains (CCDs) of soluble N-ethylmaleimide-sensitive factor attachment protein receptors (SNAREs) play a pivotal role in mediating the fusion among vesicles and target membranes. Surface residues of such CCDs are major candidates to regulate the specificity of membrane fusion, as they may alter local charge at the interaction layers and surface of the fusion complex, possibly modulating its formation and/or the binding of non-SNARE regulatory factors. Based on alternate patterns in surface residues, we have identified two motifs which group vesicular SNAREs in two novel subfamilies: RG-SNAREs and RD-SNAREs. The RG-SNARE CCD is common to all members of the widely conserved family of long VAMPs or longins and to yeast and non-neuronal VAMPs, possibly mediating "basic" fusion mechanisms; instead, only synaptobrevins from Bilateria share an RD-SNARE CCD, which is likely to mediate interactions to specific, yet unknown, regulatory factors and/or be the landmark of rapid fusion reactions like that mediating the release of neurotransmitters.

  10. Complexe de Poids, Dualit\\'e et Motifs de Beilinson

    CERN Document Server

    Hébert, David

    2010-01-01

    In the article [GS96], Gillet and Soul\\'e define a weight complex on the category of Voevodsky motives over a field of characteristic 0. In [Bon07], Bondarko generalizes this construction for any f-category with a bounded weight structure, as is the case for Beilinson motives (following Cisinski-D\\'eglise ; [CD09]). The first purpose of this note is to generalize [GS96, thm. 2] in the world of Beilinson motives. This done, we will naturally be led to define the motivic Euler characteristic dual to that considered by Bondarko in [Bon10]. This fact will motivate the second line of this note : proving that the duality operation exchanges the weight as is the case for t-structure ([BBD, 5.1.14.(iii)]). ----- Dans l'article [GS96], Gillet et Soul\\'e d\\'efinissent un complexe de poids sur la cat\\'egorie des motifs de Voevodsky d\\'efinie sur un corps de caract\\'eristique 0. Dans [Bon07], Bondarko g\\'en\\'eralise cette construction pour toute f-cat\\'egorie munie d'une structure de poids born\\'ee, comme c'est le cas po...

  11. The bridge: suggestions about the meaning of a pictorial motif

    Directory of Open Access Journals (Sweden)

    Omar Calabrese

    2011-12-01

    Full Text Available Developing research begun at the Warburg Institute in 1983, this paper reflects on the construction of meaning in a work of art, through the analysis of the bridge’s function in painting. It tries to reply to some objections the author received there from Gombrich, about the chance of finding a stable content in the configuration of the bridge. Hence, the study reconsiders the concept of ‘motif’ applied to this structure. In a semiotic perspective a motif is partially independent as regards to a single textual organization, because it has a mobile and migrant feature. However, it is also partially flexible as it depends upon the same organization. The inquiry shows that bridge’s internal structure corresponds to the category of a ‘junction’, with two opposite items, ‘conjunction’ and ‘disjunction’. The development of this theoretical object can be carried out also by figures that are not ‘bridges’, in the natural sense of the word. Furthermore, its meaning does not depend upon the number of examples we can find but only upon their relevance for constructing a ‘grammar of cases’. Differently from the traditional iconographical approach, but also from panofskian iconology, the analysis moves not only towards the simple or complex content of a figure but also towards its description.

  12. Quantum multi-signature protocol based on teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiao-jun; Liu Yun; Sun Yu [Beijing Jiaotong Univ., Beijing (China). School of Electronic Information Engineering

    2007-03-15

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  13. Feasibility analysis of two identity- based proxy ring signature schemes

    Institute of Scientific and Technical Information of China (English)

    Wang Huaqun; Zhang Lijun; Zhao Junxi

    2007-01-01

    Recently , proxy ring signature schemes have been shown to be useful in various applications , such as electronic polling, electronic payment, etc. Although many proxy ring signature schemes have been proposed, there are only two identity- based proxy ring signature schemes have been proposed until now, I.e., Cheng's scheme and Lang's scheme. It's unlucky that the two identity- based proxy ring signature schemes are unfeasible . This paper points out the reasons why the two identity- based proxy ring signature schemes are unfeasible. In order to design feasible and efficient identity-based proxy ring signature schemes from bilinear pairings , we have to search for other methods .

  14. A NEW MULTI-PROXY SIGNATURE FROM BILINEAR PAIRING

    Institute of Scientific and Technical Information of China (English)

    Li Sujuan; Zhang Futai

    2007-01-01

    Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other parties. In this paper, a new multi-proxy signature scheme is proposed. The new scheme is constructed from bilinear pairings using Boneh, Lynn, and Shacham's (BLS) short signatures. The proxy key for the proxy group is just a short signature on the proxy warrant generated by the original signer. Due to the use of short signatures, our scheme is not only efficient, but also satisfies all the security requirements of the strong proxy signature.

  15. A New Batch Verifying Scheme for Identifying Illegal Signatures

    Institute of Scientific and Technical Information of China (English)

    Adrian Atanasiu

    2013-01-01

    The concept of batch verifying multiple digital signatures is to find a method by which multiple digital signatures can be verified simultaneously in a lower time complexity than separately verifying all the signatures.In this article,we analyze the complexity of the batch verifying schemes defined by Li,Hwang and Chen in 2010,and propose a new batch verifying multiple digital signature scheme,in two variants:one for RSA-by completing the Harn's schema with an identifying illegal signatures algorithm,and the other adapted for a modified Elliptic Curve Digital Signature Algorithm protocol.

  16. A New ID-Based Proxy Blind Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    LANG Wei-min; YANG Zong-kai; CHENG Wen-qing; TAN Yun-meng

    2005-01-01

    An identity-based proxy blind signature scheme from bilinear pairings is introduced, which combines the advantages of proxy signature and blind signature. Furthermore, our scheme can prevent the original signer from generating the proxy blind signature, thus the profits of the proxy signer are guaranteed. We introduce bilinear pairings to minimize computational overhead and to improve the related performance of our scheme. In addition, the proxy blind signature presented is non-repudiable and it fulfills perfectly the security requirements of a proxy blind signature.

  17. Arbitrated quantum signature scheme with message recovery

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-02-16

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission.

  18. Quantum Signature Scheme with Weak Arbitrator

    Science.gov (United States)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-07-01

    In this paper, we propose one quantum signature scheme with a weak arbitrator to sign classical messages. This scheme can preserve the merits in the original arbitrated scheme with some entanglement resources, and provide a higher efficiency in transmission and reduction the complexity of implementation. The arbitrator is costless and only involved in the disagreement case.

  19. An Arbitrated Quantum Signature with Bell States

    Science.gov (United States)

    Liu, Feng; Qin, Su-Juan; Huang, Wei

    2014-05-01

    Entanglement is the main resource in quantum communication. The main aims of the arbitrated quantum signature (AQS) scheme are to present an application of the entanglement in cryptology and to prove the possibility of the quantum signature. More specifically, the main function of quantum entangled states in the existing AQS schemes is to assist the signatory to transfer quantum states to the receiver. However, teleportation and the Leung quantum one-time pad (L-QOTP) algorithm are not enough to design a secure AQS scheme. For example, Pauli operations commute or anticommute with each other, which makes the implementation of attacks easily from the aspects of forgery and disavowal. To conquer this shortcoming, we construct an improved AQS scheme using a new QOTP algorithm. This scheme has three advantages: it randomly uses the Hadamard operation in the new QOTP to resist attacks by using the anticommutativity of nontrivial Pauli operators and it preserves almost all merits in the existing AQS schemes; even in the process of handling disputes, no party has chance to change the message and its signature without being discovered; the receiver can verify the integrity of the signature and discover the disavow of the signatory even in the last step of verification.

  20. Observational signatures of self-destructive civilizations

    Science.gov (United States)

    Stevens, Adam; Forgan, Duncan; James, Jack O'malley

    2016-10-01

    We address the possibility that intelligent civilizations that destroy themselves could present signatures observable by humanity. Placing limits on the number of self-destroyed civilizations in the Milky Way has strong implications for the final three terms in Drake's Equation, and would allow us to identify which classes of solution to Fermi's Paradox fit with the evidence (or lack thereof). Using the Earth as an example, we consider a variety of scenarios in which humans could extinguish their own technological civilization. Each scenario presents some form of observable signature that could be probed by astronomical campaigns to detect and characterize extrasolar planetary systems. Some observables are unlikely to be detected at interstellar distances, but some scenarios are likely to produce significant changes in atmospheric composition that could be detected serendipitously with next-generation telescopes. In some cases, the timing of the observation would prove crucial to detection, as the decay of signatures is rapid compared with humanity's communication lifetime. In others, the signatures persist on far longer timescales.

  1. Signatures of black holes at the LHC

    Science.gov (United States)

    Cavaglià, Marco; Godang, Romulus; Cremaldi, Lucien M.; Summers, Donald J.

    2007-06-01

    Signatures of black hole events at CERN's Large Hadron Collider are discussed. Event simulations are carried out with the Fortran Monte Carlo generator CATFISH. Inelasticity effects, exact field emissivities, color and charge conservation, corrections to semiclassical black hole evaporation, gravitational energy loss at formation and possibility of a black hole remnant are included in the analysis.

  2. Signatures of black holes at the LHC

    CERN Document Server

    Cavaglia, Marco; Cremaldi, Lucien M; Summers, Donald J

    2007-01-01

    Signatures of black hole events at CERN's Large Hadron Collider are discussed. Event simulations are carried out with the Fortran Monte Carlo generator CATFISH. Inelasticity effects, exact field emissivities, color and charge conservation, corrections to semiclassical black hole evaporation, gravitational energy loss at formation and possibility of a black hole remnant are included in the analysis.

  3. Quantum signatures of breather-breather interactions

    CERN Document Server

    Dorignac, J; Salerno, M; Scott, A C

    2003-01-01

    The spectrum of the Quantum Discrete Nonlinear Schr\\"odinger equation on a periodic 1D lattice shows some interesting detailed band structure which may be interpreted as the quantum signature of a two-breather interaction in the classical case. We show that this fine structure can be interpreted using degenerate perturbation theory.

  4. CERN Member States signatures at LEP inauguration

    CERN Multimedia

    1989-01-01

    The signatures of the dignitaries who represented CERN's Member States on the occasion of the Inauguration of LEP on 13 November 1989. The Large Electron-Positron (LEP) collider was inaugurated in the presence of some 1500 guests, including Heads of State and Ministers from all of CERN's 14 Member States.

  5. Nucleon-decay like signatures of Hylogenesis

    CERN Document Server

    Demidov, S V

    2015-01-01

    We consider nucleon-decay like signatures of the hylogenesis, a variant of antibaryonic dark matter model. For the interaction between visible and dark matter sectors through the neutron portal, we calculate rates of dark matter scatterings off neutron which mimic neutron-decay processes $n\\to \

  6. The Pedagogic Signature of Special Needs Education

    Science.gov (United States)

    Weiß, Sabine; Kollmannsberger, Markus; Lerche, Thomas; Oubaid, Viktor; Kiel, Ewald

    2014-01-01

    The goal of the following study is to identify a pedagogic signature, according to LS Shulman, for working with students who have special educational needs. Special educational needs are defined as significant limitations in personal development and learning which require particular educational measures beyond regular education. The development of…

  7. Exploring Signature Pedagogies in Undergraduate Leadership Education

    Science.gov (United States)

    Jenkins, Daniel M.

    2012-01-01

    This research explores the instructional strategies most frequently used by leadership educators who teach academic credit-bearing undergraduate leadership studies courses through a national survey and identifies signature pedagogies within the leadership discipline. Findings from this study suggest that class discussion--whether in the form of…

  8. Comparative Analysis of Regulatory Motif Discovery Tools for Transcription Factor Binding Sites

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In the post-genomic era, identification of specific regulatory motifs or transcription factor binding sites (TFBSs) in non-coding DNA sequences, which is essential to elucidate transcriptional regulatory networks, has emerged as an obstacle that frustrates many researchers. Consequently, numerous motif discovery tools and correlated databases have been applied to solving this problem. However, these existing methods, based on different computational algorithms, show diverse motif prediction efficiency in non-coding DNA sequences. Therefore, understanding the similarities and differences of computational algorithms and enriching the motif discovery literatures are important for users to choose the most appropriate one among the online available tools. Moreover, there still lacks credible criterion to assess motif discovery tools and instructions for researchers to choose the best according to their own projects. Thus integration of the related resources might be a good approach to improve accuracy of the application. Recent studies integrate regulatory motif discovery tools with experimental methods to offer a complementary approach for researchers, and also provide a much-needed model for current researches on transcriptional regulatory networks. Here we present a comparative analysis of regulatory motif discovery tools for TFBSs.

  9. Trend Motif: A Graph Mining Approach for Analysis of Dynamic Complex Networks

    Energy Technology Data Exchange (ETDEWEB)

    Jin, R; McCallen, S; Almaas, E

    2007-05-28

    Complex networks have been used successfully in scientific disciplines ranging from sociology to microbiology to describe systems of interacting units. Until recently, studies of complex networks have mainly focused on their network topology. However, in many real world applications, the edges and vertices have associated attributes that are frequently represented as vertex or edge weights. Furthermore, these weights are often not static, instead changing with time and forming a time series. Hence, to fully understand the dynamics of the complex network, we have to consider both network topology and related time series data. In this work, we propose a motif mining approach to identify trend motifs for such purposes. Simply stated, a trend motif describes a recurring subgraph where each of its vertices or edges displays similar dynamics over a userdefined period. Given this, each trend motif occurrence can help reveal significant events in a complex system; frequent trend motifs may aid in uncovering dynamic rules of change for the system, and the distribution of trend motifs may characterize the global dynamics of the system. Here, we have developed efficient mining algorithms to extract trend motifs. Our experimental validation using three disparate empirical datasets, ranging from the stock market, world trade, to a protein interaction network, has demonstrated the efficiency and effectiveness of our approach.

  10. MODA: an efficient algorithm for network motif discovery in biological networks.

    Science.gov (United States)

    Omidi, Saeed; Schreiber, Falk; Masoudi-Nejad, Ali

    2009-10-01

    In recent years, interest has been growing in the study of complex networks. Since Erdös and Rényi (1960) proposed their random graph model about 50 years ago, many researchers have investigated and shaped this field. Many indicators have been proposed to assess the global features of networks. Recently, an active research area has developed in studying local features named motifs as the building blocks of networks. Unfortunately, network motif discovery is a computationally hard problem and finding rather large motifs (larger than 8 nodes) by means of current algorithms is impractical as it demands too much computational effort. In this paper, we present a new algorithm (MODA) that incorporates techniques such as a pattern growth approach for extracting larger motifs efficiently. We have tested our algorithm and found it able to identify larger motifs with more than 8 nodes more efficiently than most of the current state-of-the-art motif discovery algorithms. While most of the algorithms rely on induced subgraphs as motifs of the networks, MODA is able to extract both induced and non-induced subgraphs simultaneously. The MODA source code is freely available at: http://LBB.ut.ac.ir/Download/LBBsoft/MODA/

  11. Introducing Dunaliella LIP promoter containing light-inducible motifs improves transgenic expression in Chlamydomonas reinhardtii.

    Science.gov (United States)

    Baek, Kwangryul; Lee, Yew; Nam, Onyou; Park, Seunghye; Sim, Sang Jun; Jin, EonSeon

    2016-03-01

    Promoter of the light-inducible protein gene (LIP) of Dunaliella was recently isolated in our laboratory. The aim of this work is to find the light-inducible motif in the Dunaliella LIP promoter and verify its regulatory motif with a Gaussia luciferase reporter gene transformed in Chlamydomonas reinhardtii. 400 bp upstream to the translational start site of the Dunaliella LIP gene was gradually truncated and analyzed for the luciferase expression. Furthermore, this promoter comprising duplicated or triplicated light-responsive motifs was tested for its augmentation of light response. Two putative light-responsive motifs, GT-1 binding motif and sequences over-represented in light-repressed promoters (SORLIP) located in the 200 bp LIP promoter fragment were analyzed for their light responsibility. It is turned out that SORLIP was responsible for the light-inducible activity. With the copy number of SORLIP up to three showed stronger high light response compared with the native LIP promoter fragment. Therefore, we found a light-responsive DNA motif operating in Chlamydomonas and confirm a synthetic promoter including this motif displayed light inducibility in heterologously transformed green algae for the first time. This light-inducible expression system will be applied to various area of algal research including algal biotechnology.

  12. A Novel Protein Interaction between Nucleotide Binding Domain of Hsp70 and p53 Motif

    Directory of Open Access Journals (Sweden)

    Asita Elengoe

    2015-01-01

    Full Text Available Currently, protein interaction of Homo sapiens nucleotide binding domain (NBD of heat shock 70 kDa protein (PDB: 1HJO with p53 motif remains to be elucidated. The NBD-p53 motif complex enhances the p53 stabilization, thereby increasing the tumor suppression activity in cancer treatment. Therefore, we identified the interaction between NBD and p53 using STRING version 9.1 program. Then, we modeled the three-dimensional structure of p53 motif through homology modeling and determined the binding affinity and stability of NBD-p53 motif complex structure via molecular docking and dynamics (MD simulation. Human DNA binding domain of p53 motif (SCMGGMNR retrieved from UniProt (UniProtKB: P04637 was docked with the NBD protein, using the Autodock version 4.2 program. The binding energy and intermolecular energy for the NBD-p53 motif complex were −0.44 Kcal/mol and −9.90 Kcal/mol, respectively. Moreover, RMSD, RMSF, hydrogen bonds, salt bridge, and secondary structure analyses revealed that the NBD protein had a strong bond with p53 motif and the protein-ligand complex was stable. Thus, the current data would be highly encouraging for designing Hsp70 structure based drug in cancer therapy.

  13. Recurrent motifs as resonant attractor states in the narrative field: a testable model of archetype.

    Science.gov (United States)

    Goodwyn, Erik

    2013-06-01

    At the most basic level, archetypes represented Jung's attempt to explain the phenomenon of recurrent myths and folktale motifs (Jung 1956, 1959, para. 99). But the archetype remains controversial as an explanation of recurrent motifs, as the existence of recurrent motifs does not prove that archetypes exist. Thus, the challenge for contemporary archetype theory is not merely to demonstrate that recurrent motifs exist, since that is not disputed, but to demonstrate that archetypes exist and cause recurrent motifs. The present paper proposes a new model which is unlike others in that it postulates how the archetype creates resonant motifs. This model necessarily clarifies and adapts some of Jung's seminal ideas on archetype in order to provide a working framework grounded in contemporary practice and methodologies. For the first time, a model of archetype is proposed that can be validated on empirical, rather than theoretical grounds. This is achieved by linking the archetype to the hard data of recurrent motifs rather than academic trends in other fields.

  14. Minimal motif peptide structure of metzincin clan zinc peptidases in micelles.

    Science.gov (United States)

    Onoda, Akira; Suzuki, Takako; Ishizuka, Hiroaki; Sugiyama, Rumiko; Ariyasu, Shinya; Yamamura, Takeshi

    2009-12-01

    It is well known that the functions of metalloproteins generally originate from their metal-binding motifs. However, the intrinsic nature of individual motifs remains unknown, particularly the details about metal-binding effects on the folding of motifs; the converse is also unknown, although there is no doubt that the motif is the core of the reactivity for each metalloprotein. In this study, we focused our attention on the zinc-binding motif of the metzincin clan family, HEXXHXXGXXH; this family contains the general zinc-binding sequence His-Glu-Xaa-Xaa-His (HEXXH) and the extended GXXH region. We adopted the motif sequence of stromelysin-1 and investigated the folding properties of the Trp-labeled peptides WAHEIAHSLGLFHA (STR-W1), AWHEIAHSLGLFHA (STR-W2), AHEIAHSLGWFHA (STR-W11), and AHEIAHSLGLFHWA (STR-W14) in the presence and absence of zinc ions in hydrophobic micellar environments by circular dichroism (CD) measurements. We accessed successful incorporation of these zinc peptides into micelles using quenching of Trp fluorescence. Results of CD studies indicated that two of the Trp-incorporated peptides, STR-W1 and STR-W14, exhibited helical folding in the hydrophobic region of cetyltrimethylammonium chloride micelle. The NMR structural analysis of the apo STR-W14 revealed that the conformation in the C-terminus GXXH region significantly differred between the apo state in the micelle and the reported Zn-bound state of stromelysin-1 in crystal structures. The structural analyses of the qualitative Zn-binding properties of this motif peptide provide an interesting Zn-binding mechanism: the minimum consensus motif in the metzincin clan, a basic zinc-binding motif with an extended GXXH region, has the potential to serve as a preorganized Zn binding scaffold in a hydrophobic environment.

  15. Characterization of the tandem CWCH2 sequence motif: a hallmark of inter-zinc finger interactions

    Directory of Open Access Journals (Sweden)

    Aruga Jun

    2010-02-01

    Full Text Available Abstract Background The C2H2 zinc finger (ZF domain is widely conserved among eukaryotic proteins. In Zic/Gli/Zap1 C2H2 ZF proteins, the two N-terminal ZFs form a single structural unit by sharing a hydrophobic core. This structural unit defines a new motif comprised of two tryptophan side chains at the center of the hydrophobic core. Because each tryptophan residue is located between the two cysteine residues of the C2H2 motif, we have named this structure the tandem CWCH2 (tCWCH2 motif. Results Here, we characterized 587 tCWCH2-containing genes using data derived from public databases. We categorized genes into 11 classes including Zic/Gli/Glis, Arid2/Rsc9, PacC, Mizf, Aebp2, Zap1/ZafA, Fungl, Zfp106, Twincl, Clr1, and Fungl-4ZF, based on sequence similarity, domain organization, and functional similarities. tCWCH2 motifs are mostly found in organisms belonging to the Opisthokonta (metazoa, fungi, and choanoflagellates and Amoebozoa (amoeba, Dictyostelium discoideum. By comparison, the C2H2 ZF motif is distributed widely among the eukaryotes. The structure and organization of the tCWCH2 motif, its phylogenetic distribution, and molecular phylogenetic analysis suggest that prototypical tCWCH2 genes existed in the Opisthokonta ancestor. Within-group or between-group comparisons of the tCWCH2 amino acid sequence identified three additional sequence features (site-specific amino acid frequencies, longer linker sequence between two C2H2 ZFs, and frequent extra-sequences within C2H2 ZF motifs. Conclusion These features suggest that the tCWCH2 motif is a specialized motif involved in inter-zinc finger interactions.

  16. Application of a case–control study design to investigate genotypic signatures of HIV-1 transmission

    Directory of Open Access Journals (Sweden)

    Mota Talia M

    2012-06-01

    Full Text Available Abstract Background The characterization of HIV-1 transmission strains may inform the design of an effective vaccine. Shorter variable loops with fewer predicted glycosites have been suggested as signatures enriched in envelope sequences derived during acute HIV-1 infection. Specifically, a transmission-linked lack of glycosites within the V1 and V2 loops of gp120 provides greater access to an α4β7 binding motif, which promotes the establishment of infection. Also, a histidine at position 12 in the leader sequence of Env has been described as a transmission signature that is selected against during chronic infection. The purpose of this study is to measure the association of the presence of an α4β7 binding motif, the number of N-linked glycosites, the length of the variable loops, and the prevalence of histidine at position 12 with HIV-1 transmission. A case–control study design was used to measure the prevalence of these variables between subtype B and C transmission sequences and frequency-matched randomly-selected sequences derived from chronically infected controls. Results Subtype B transmission strains had shorter V3 regions than chronic strains (p = 0.031; subtype C transmission strains had shorter V1 loops than chronic strains (p = 0.047; subtype B transmission strains had more V3 loop glycosites (p = 0.024 than chronic strains. Further investigation showed that these statistically significant results were unlikely to be biologically meaningful. Also, there was no difference observed in the prevalence of a histidine at position 12 among transmission strains and controls of either subtype. Conclusions Although a genetic bottleneck is observed after HIV-1 transmission, our results indicate that summary characteristics of Env hypothesised to be important in transmission are not divergent between transmission and chronic strains of either subtype. The success of a transmission strain to initiate infection may be a random

  17. Evaluation of subgraph searching algorithms for detecting network motifs in biological networks

    Institute of Scientific and Technical Information of China (English)

    Jialu HU; Lin GAO; Guimin QIN

    2009-01-01

    Despite several algorithms for searching sub-graphs in motif detection presented in the literature, no ef-fort has been done for characterizing their performance till now. This paper presents a methodology to evaluate the performance of three algorithms: edge sampling algorithm (ESA), enumerate subgraphs (ESU) and randomly enumer-ate subgraphs (RAND-ESU). A series of experiments are performed to test sampling speed and sampling quality. The results show that RAND-ESU is more efficient and has less computational cost than other algorithms for large-size mo-tif detection, and ESU has its own advantage in small-size motif detection.

  18. ELM 2016—data update and new functionality of the eukaryotic linear motif resource

    Science.gov (United States)

    Dinkel, Holger; Van Roey, Kim; Michael, Sushama; Kumar, Manjeet; Uyar, Bora; Altenberg, Brigitte; Milchevskaya, Vladislava; Schneider, Melanie; Kühn, Helen; Behrendt, Annika; Dahl, Sophie Luise; Damerell, Victoria; Diebel, Sandra; Kalman, Sara; Klein, Steffen; Knudsen, Arne C.; Mäder, Christina; Merrill, Sabina; Staudt, Angelina; Thiel, Vera; Welti, Lukas; Davey, Norman E.; Diella, Francesca; Gibson, Toby J.

    2016-01-01

    The Eukaryotic Linear Motif (ELM) resource (http://elm.eu.org) is a manually curated database of short linear motifs (SLiMs). In this update, we present the latest additions to this resource, along with more improvements to the web interface. ELM 2016 contains more than 240 different motif classes with over 2700 experimentally validated instances, manually curated from more than 2400 scientific publications. In addition, more data have been made available as individually searchable pages and are downloadable in various formats. PMID:26615199

  19. Discovering structural motifs using a structural alphabet: Application to magnesium-binding sites

    Directory of Open Access Journals (Sweden)

    Lim Carmay

    2007-03-01

    Full Text Available Abstract Background For many metalloproteins, sequence motifs characteristic of metal-binding sites have not been found or are so short that they would not be expected to be metal-specific. Striking examples of such metalloproteins are those containing Mg2+, one of the most versatile metal cofactors in cellular biochemistry. Even when Mg2+-proteins share insufficient sequence homology to identify Mg2+-specific sequence motifs, they may still share similarity in the Mg2+-binding site structure. However, no structural motifs characteristic of Mg2+-binding sites have been reported. Thus, our aims are (i to develop a general method for discovering structural patterns/motifs characteristic of ligand-binding sites, given the 3D protein structures, and (ii to apply it to Mg2+-proteins sharing 2+-structural motifs are identified as recurring structural patterns. Results The structural alphabet-based motif discovery method has revealed the structural preference of Mg2+-binding sites for certain local/secondary structures: compared to all residues in the Mg2+-proteins, both first and second-shell Mg2+-ligands prefer loops to helices. Even when the Mg2+-proteins share no significant sequence homology, some of them share a similar Mg2+-binding site structure: 4 Mg2+-structural motifs, comprising 21% of the binding sites, were found. In particular, one of the Mg2+-structural motifs found maps to a specific functional group, namely, hydrolases. Furthermore, 2 of the motifs were not found in non metalloproteins or in Ca2+-binding proteins. The structural motifs discovered thus capture some essential biochemical and/or evolutionary properties, and hence may be useful for discovering proteins where Mg2+ plays an important biological role. Conclusion The structural motif discovery method presented herein is general and can be applied to any set of proteins with known 3D structures. This new method is timely considering the increasing number of structures for

  20. Elongated polyproline motifs facilitate enamel evolution through matrix subunit compaction.

    Directory of Open Access Journals (Sweden)

    Tianquan Jin

    2009-12-01

    Full Text Available Vertebrate body designs rely on hydroxyapatite as the principal mineral component of relatively light-weight, articulated endoskeletons and sophisticated tooth-bearing jaws, facilitating rapid movement and efficient predation. Biological mineralization and skeletal growth are frequently accomplished through proteins containing polyproline repeat elements. Through their well-defined yet mobile and flexible structure polyproline-rich proteins control mineral shape and contribute many other biological functions including Alzheimer's amyloid aggregation and prolamine plant storage. In the present study we have hypothesized that polyproline repeat proteins exert their control over biological events such as mineral growth, plaque aggregation, or viscous adhesion by altering the length of their central repeat domain, resulting in dramatic changes in supramolecular assembly dimensions. In order to test our hypothesis, we have used the vertebrate mineralization protein amelogenin as an exemplar and determined the biological effect of the four-fold increased polyproline tandem repeat length in the amphibian/mammalian transition. To study the effect of polyproline repeat length on matrix assembly, protein structure, and apatite crystal growth, we have measured supramolecular assembly dimensions in various vertebrates using atomic force microscopy, tested the effect of protein assemblies on crystal growth by electron microscopy, generated a transgenic mouse model to examine the effect of an abbreviated polyproline sequence on crystal growth, and determined the structure of polyproline repeat elements using 3D NMR. Our study shows that an increase in PXX/PXQ tandem repeat motif length results (i in a compaction of protein matrix subunit dimensions, (ii reduced conformational variability, (iii an increase in polyproline II helices, and (iv promotion of apatite crystal length. Together, these findings establish a direct relationship between polyproline tandem

  1. The GTP binding motif: variations on a theme.

    Science.gov (United States)

    Kjeldgaard, M; Nyborg, J; Clark, B F

    1996-10-01

    GTP binding proteins (G-proteins) have wide-ranging functions in biology, being involved in cell proliferation, signal transduction, protein synthesis, and protein targeting. Common to their functioning is that they are active in the GTP-bound form and inactive in the GDP-bound form. The protein synthesis elongation factor EF-Tu was the first G-protein whose nucleotide binding domain was solved structurally by X-ray crystallography to yield a structural definition of the GDP-bound form, but a still increasing number of new structures of G-proteins are appearing in the literature, in both GDP and GTP bound forms. A common structural core for nucleotide binding is present in all these structures, and this core has long been known to include common consensus sequence elements involved in binding of the nucleotide. Nevertheless, subtle changes in the common sequences reflect functional differences. Therefore, it becomes increasingly important to focus on how these differences are reflected in the structures, and how these structural differences are related to function. The aim of this review is to describe to what extent this structural motif for GDP/GTP binding is common to other known structures of this class of proteins. We first describe the common structural core of the G-proteins. Next, examples are based on information available on the Ras protein superfamily, the targeting protein ARF, elongation factors EF-Tu and EF-G, and the heterotrimeric G-proteins. Finally, we discuss the important structures of complexes between GTP binding proteins and their substrates that have appeared in the literature recently.

  2. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials.

  3. Methods and apparatus for multi-parameter acoustic signature inspection

    Science.gov (United States)

    Diaz, Aaron A.; Samuel, Todd J.; Valencia, Juan D.; Gervais, Kevin L.; Tucker, Brian J.; Kirihara, Leslie J.; Skorpik, James R.; Reid, Larry D.; Munley, John T.; Pappas, Richard A.; Wright, Bob W.; Panetta, Paul D.; Thompson, Jason S.

    2007-07-24

    A multiparameter acoustic signature inspection device and method are described for non-invasive inspection of containers. Dual acoustic signatures discriminate between various fluids and materials for identification of the same.

  4. A new threshold proxy signature scheme from bilinear pairings

    Institute of Scientific and Technical Information of China (English)

    QIAN Haifeng; CAO Zhenfu; XUE Qingshui

    2004-01-01

    Based on the GDH signature (short signature scheme) a probabilistic signature scheme is proposed in this paper with security proof. Then a new threshold proxy signature from bilinear pairings is proposed as well by using the new probabilistic signature scheme and the properties of the Gap Diffie-Hellman (GDH) group (where the Computational Diffie-Hellman problem is hard but the Decisional Diffie-Hellman problem is easy to solve). Our constructions are based on the recently proposed GDH signature scheme of Bonel et al.'s article. Bilinear pairings could be built from Weil pairing or Tate pairing. So most our constructions would be simpler, but still with high security. The proposed threshold proxy signature is the first one which is built from bilinear pairings. At the end of this paper security and performance of the threshold proxy signature scheme is also analyzed.

  5. A THRESHOLD BLIND SIGNATURE FROM WEIL PAIRING ON ELLIPTIC CURVES

    Institute of Scientific and Technical Information of China (English)

    Cheng Xiangguo; Xu Weidong; Wang Xinmei

    2006-01-01

    The idea behind a (t, n) threshold blind signature is that a user can ask at least t out ofn players of a group to cooperate to generate a signature for a message without revealing its content. This paper first presents a new blind signature scheme from Weil pairing on elliptic curves. Based on this scheme, a threshold blind signature scheme is proposed. It is efficient and has the security properties of robustness and unforgeability. In the proposed scheme, the group manger is introduced to take the role of distributing the group secret key to each player. However, he cannot forge the players to generate partial blind signatures (Each partial blind signature depends on not only the secret key of the player, but also a random number the player picks). Compared with a threshold signature with a trusted third party, its advantage is obvious; Compared with a threshold signature without a trusted third party, it is more simple and efficient.

  6. Verifiable (t, n) Threshold Signature Scheme Based on Elliptic Curve

    Institute of Scientific and Technical Information of China (English)

    WANG Hua-qun; ZHAO Jun-xi; ZHANG Li-jun

    2005-01-01

    Based on the difficulty of solving the ECDLP (elliptic curve discrete logarithm problem) on the finite field,we present a (t, n) threshold signature scheme and a verifiable key agreement scheme without trusted party. Applying a modified elliptic curve signature equation, we get a more efficient signature scheme than the existing ECDSA (elliptic curve digital signature algorithm) from the computability and security view. Our scheme has a shorter key, faster computation, and better security.

  7. Enhancing the Security of He-Kiesler Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    李春辉; 陈一宏

    2003-01-01

    Although the He-Kiesler signature is said to be proposed based on the discrete logarithm problem and the factorization problem, it has been proved that the signature is not as secure as it was stated to be. A new signature scheme is here proposed based on the discrete logarithm problem and the factorization problem to enhance the security of the He-Kiesler signature.

  8. A PROVABLY SECURE PROXY SIGNATURE SCHEME FROM BILINEAR PAIRINGS

    Institute of Scientific and Technical Information of China (English)

    Wang Aiqin; Li Jiguo; Wang Zhijian

    2010-01-01

    A proxy signature allows an entity,called original signer,to delegate its signing power to another entity,called proxy signer,to sign messages on its behalf. Proxy signatures have many practical applications and are very important cryptographic protocol. In this paper,we propose an efficient proxy signature scheme from bilinear pairings. We prove it secure in the random oracle model and analyze computation cost of our scheme. Our scheme satisfies all the properties required for proxy signatures.

  9. An Efficient Attack on a Code-Based Signature Scheme

    OpenAIRE

    Phesso, Aurélie; Tillich, Jean-Pierre

    2016-01-01

    International audience; Baldi et al. have introduced in [BBC + 13] a very novel code based signature scheme. However we will prove here that some of the bits of the signatures are correlated in this scheme and this allows an attack that recovers enough of the underlying secret structure to forge new signatures. This cryptanalysis was performed on the parameters which were devised for 80 bits of security and broke them with 100, 000 signatures originating from the same secret key.

  10. Sephardic signature in haplogroup T mitochondrial DNA

    OpenAIRE

    Bedford, Felice L

    2011-01-01

    A rare combination of mutations within mitochondrial DNA subhaplogroup T2e is identified as affiliated with Sephardic Jews, a group that has received relatively little attention. Four investigations were pursued: Search of the motif in 250 000 control region records across 8 databases, comparison of frequencies of T subhaplogroups (T1, T2b, T2c, T2e, T4, T*) across 11 diverse populations, creation of a phylogenic median-joining network from public T2e control region entries, and analysis of o...

  11. Identification of putative regulatory motifs in the upstream regions of co-expressed functional groups of genes in Plasmodium falciparum

    Directory of Open Access Journals (Sweden)

    Joshi NV

    2009-01-01

    Full Text Available Abstract Background Regulation of gene expression in Plasmodium falciparum (Pf remains poorly understood. While over half the genes are estimated to be regulated at the transcriptional level, few regulatory motifs and transcription regulators have been found. Results The study seeks to identify putative regulatory motifs in the upstream regions of 13 functional groups of genes expressed in the intraerythrocytic developmental cycle of Pf. Three motif-discovery programs were used for the purpose, and motifs were searched for only on the gene coding strand. Four motifs – the 'G-rich', the 'C-rich', the 'TGTG' and the 'CACA' motifs – were identified, and zero to all four of these occur in the 13 sets of upstream regions. The 'CACA motif' was absent in functional groups expressed during the ring to early trophozoite transition. For functional groups expressed in each transition, the motifs tended to be similar. Upstream motifs in some functional groups showed 'positional conservation' by occurring at similar positions relative to the translational start site (TLS; this increases their significance as regulatory motifs. In the ribonucleotide synthesis, mitochondrial, proteasome and organellar translation machinery genes, G-rich, C-rich, CACA and TGTG motifs, respectively, occur with striking positional conservation. In the organellar translation machinery group, G-rich motifs occur close to the TLS. The same motifs were sometimes identified for multiple functional groups; differences in location and abundance of the motifs appear to ensure different modes of action. Conclusion The identification of positionally conserved over-represented upstream motifs throws light on putative regulatory elements for transcription in Pf.

  12. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  13. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  14. 29 CFR 102.116 - Signature of orders.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Signature of orders. 102.116 Section 102.116 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS BOARD RULES AND REGULATIONS, SERIES 8 Certification and Signature of Documents § 102.116 Signature of orders. The executive secretary or the associate...

  15. 22 CFR 92.28 - Signature of affiant on affidavit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section 92.28 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant...

  16. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150.22 Section 1150.22 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a...

  17. 45 CFR 81.32 - Signature of documents.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Signature of documents. 81.32 Section 81.32 Public... UNDER PART 80 OF THIS TITLE Form, Execution, Service and Filing of Documents § 81.32 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certificate...

  18. 17 CFR 240.17Ad-15 - Signature guarantees.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Signature guarantees. 240.17Ad... Securities Exchange Act of 1934 Supervised Investment Bank Holding Company Rules § 240.17Ad-15 Signature... of the signature of the person endorsing a certificated security, or originating an instruction...

  19. 38 CFR 18b.21 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Signature of documents. 18b.21 Section 18b.21 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Documents § 18b.21 Signature of documents. The signature of a party, authorized officer, employee,...

  20. 12 CFR 563g.5 - Filing and signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Filing and signature requirements. 563g.5... OFFERINGS § 563g.5 Filing and signature requirements. (a) Procedures. An offering circular, amendment... required. (c) Signature. (1) Any offering circular, amendment, or consent filed with the Office pursuant...

  1. 43 CFR 1.5 - Signature to constitute certificate.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Signature to constitute certificate. 1.5... OF THE INTERIOR § 1.5 Signature to constitute certificate. When an individual who appears in a representative capacity signs a paper in practice before the Department, his signature shall constitute...

  2. 32 CFR 842.6 - Signature on the claim form.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Signature on the claim form. 842.6 Section 842.6... ADMINISTRATIVE CLAIMS General Information § 842.6 Signature on the claim form. The claimant or authorized agent... authorized agent signing for a claimant shows, after the signature, the title or capacity and...

  3. 48 CFR 204.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents....

  4. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address...

  5. 21 CFR 1309.32 - Application forms; contents; signature.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign...

  6. Infrared ship signature prediction, model validation and sky radiance

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The increased interest during the last decade in the infrared signature of (new) ships results in a clear need of validated infrared signature prediction codes. This paper presents the results of comparing an in-house developed signature prediction code with measurements made in the 3-5 μm band in b

  7. 34 CFR 101.32 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Signature of documents. 101.32 Section 101.32 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION... Documents § 101.32 Signature of documents. The signature of a party, authorized officer, employee...

  8. 37 CFR 2.74 - Form and signature of amendment.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Form and signature of... signature of amendment. (a) Form of Amendment. Amendments should be set forth clearly and completely... record. (b) Signature. A request for amendment of an application must be signed by the applicant,...

  9. The “conflict between good and evil” a motif in Shahnameh and the narrative archetype

    Directory of Open Access Journals (Sweden)

    طالبيان/صرفي/بصيري/جعفري طالبيان/صرفي/بصيري/جعفري

    2008-07-01

    Full Text Available In the classification and structural analysis of Shahnameh, the authors of the article consider the conflict between good and evil (from now on C.G.E. as the main motif of this great epic. This motif has spread all over the epic. The number of the stories being influenced by the myth of C.G.E. is at least twice as many as every other motif in the epic. Considering the antiquity of the myth and motif of C.G.E. in the man’s culture and the definition of structuralists -under the influence of this myth- for the narration, the authors introduce the C.G.E. as the narrative archetype; because this myth is the deep structure of narrative pattern in collective unconscious of mankind. Keywords: Shahnameh, Structuralism, myth, conflict between good and evil, narrative archetype.

  10. Mesoscale infraslow spontaneous membrane potential fluctuations recapitulate high-frequency activity cortical motifs.

    Science.gov (United States)

    Chan, Allen W; Mohajerani, Majid H; LeDue, Jeffrey M; Wang, Yu Tian; Murphy, Timothy H

    2015-07-20

    Neuroimaging of spontaneous, resting-state infraslow (regional connectivity that are analogous to cortical motifs observed from higher-frequency spontaneous activity and reflect the underlying framework of intracortical axonal projections.

  11. Rice bZIP protein, REB, interacts with GCN4 motif in promoter of Waxy gene

    Institute of Scientific and Technical Information of China (English)

    程世军; 王宗阳; 洪孟民

    2002-01-01

    A bifactorial endosperm box (EB), which contains an endosperm motif (EM) and a GCN4 motif, was found in rice Wx promoter. EB was found in 5′ upstream region of many seed storage protein genes accounting for these genes expression exclusive in endosperm among various cereals. Many reports demonstrated that the bZIP transcription activators isolated from wheat, barley and maize, etc. regulate the gene expression through binding to the GCN4 motif. In this research, we showed that GCN4 sequence could be recognized by nuclear proteins extracted from immature rice seeds. Furthermore, a rice bZIP protein, REB was isolated by using PCR method and REB fusion protein was expressed in E. coli. The results of gel shift analysis showed that REB could recognize and bind to the GCN4 motif in the Wx gene in addition to binding to the target sequence in the promoter of α-globulin.

  12. Correlating overrepresented upstream motifs to gene expression a computational approach to regulatory element discovery in eukaryotes

    CERN Document Server

    Caselle, M; Provero, P

    2002-01-01

    Gene regulation in eukaryotes is mainly effected through transcription factors binding to rather short recognition motifs generally located upstream of the coding region. We present a novel computational method to identify regulatory elements in the upstream region of eukaryotic genes. The genes are grouped in sets sharing an overrepresented short motif in their upstream sequence. For each set, the average expression level from a microarray experiment is determined: If this level is significantly higher or lower than the average taken over the whole genome, then the overerpresented motif shared by the genes in the set is likely to play a role in their regulation. The method was tested by applying it to the genome of Saccharomyces cerevisiae, using the publicly available results of a DNA microarray experiment, in which expression levels for virtually all the genes were measured during the diauxic shift from fermentation to respiration. Several known motifs were correctly identified, and a new candidate regulat...

  13. Strategic Lean Organizational Design: Towards Lean World-Small World Configurations through Discrete Dynamic Organizational Motifs

    Directory of Open Access Journals (Sweden)

    Javier Villalba-Diez

    2016-01-01

    Full Text Available Organizations face strong international competition in the global market arena in achieving strategic goals such as high quality of product or service at lower cost while increasing their ability to respond quickly to requirements of the market. These challenges concern strategically designing organizations that can meet global challenges and specialize locally to meet performance constraints. After introducing the concept of organizational functional and structural motifs as small organizational building block, our findings suggest the hypothesis that a strategic organizational design (SOD approach to meet these challenges involves maximizing the number and diversity of functional motifs, while minimizing the repertoire of structural motifs. By detecting characteristic structural motifs, we provide organizational leaders with specific Lean SOD solutions with which to meet local and global challenges simultaneously. As a matter of application, we show the implementation of such an SOD approach in nine US hospitals that form one large health care holding.

  14. The Verrucomicrobia LexA-Binding Motif: Insights into the Evolutionary Dynamics of the SOS Response.

    Science.gov (United States)

    Erill, Ivan; Campoy, Susana; Kılıç, Sefa; Barbé, Jordi

    2016-01-01

    The SOS response is the primary bacterial mechanism to address DNA damage, coordinating multiple cellular processes that include DNA repair, cell division, and translesion synthesis. In contrast to other regulatory systems, the composition of the SOS genetic network and the binding motif of its transcriptional repressor, LexA, have been shown to vary greatly across bacterial clades, making it an ideal system to study the co-evolution of transcription factors and their regulons. Leveraging comparative genomics approaches and prior knowledge on the core SOS regulon, here we define the binding motif of the Verrucomicrobia, a recently described phylum of emerging interest due to its association with eukaryotic hosts. Site directed mutagenesis of the Verrucomicrobium spinosum recA promoter confirms that LexA binds a 14 bp palindromic motif with consensus sequence TGTTC-N4-GAACA. Computational analyses suggest that recognition of this novel motif is determined primarily by changes in base-contacting residues of the third alpha helix of the LexA helix-turn-helix DNA binding motif. In conjunction with comparative genomics analysis of the LexA regulon in the Verrucomicrobia phylum, electrophoretic shift assays reveal that LexA binds to operators in the promoter region of DNA repair genes and a mutagenesis cassette in this organism, and identify previously unreported components of the SOS response. The identification of tandem LexA-binding sites generating instances of other LexA-binding motifs in the lexA gene promoter of Verrucomicrobia species leads us to postulate a novel mechanism for LexA-binding motif evolution. This model, based on gene duplication, successfully addresses outstanding questions in the intricate co-evolution of the LexA protein, its binding motif and the regulatory network it controls.

  15. Noncoding RNA danger motifs bridge innate and adaptive immunity and are potent adjuvants for vaccination

    OpenAIRE

    Wang, Lilin; Smith, Dan; Bot, Simona; Dellamary, Luis; Bloom, Amy; Bot, Adrian

    2002-01-01

    The adaptive immune response is triggered by recognition of T and B cell epitopes and is influenced by “danger” motifs that act via innate immune receptors. This study shows that motifs associated with noncoding RNA are essential features in the immune response reminiscent of viral infection, mediating rapid induction of proinflammatory chemokine expression, recruitment and activation of antigen-presenting cells, modulation of regulatory cytokines, subsequent differentiation of Th1 cells, iso...

  16. The Verrucomicrobia LexA-binding Motif: Insights into the Evolutionary Dynamics of the SOS Response

    Directory of Open Access Journals (Sweden)

    Ivan Erill

    2016-07-01

    Full Text Available The SOS response is the primary bacterial mechanism to address DNA damage, coordinating multiple cellular processes that include DNA repair, cell division and translesion synthesis. In contrast to other regulatory systems, the composition of the SOS genetic network and the binding motif of its transcriptional repressor, LexA, have been shown to vary greatly across bacterial clades, making it an ideal system to study the co-evolution of transcription factors and their regulons. Leveraging comparative genomics approaches and prior knowledge on the core SOS regulon, here we define the binding motif of the Verrucomicrobia, a recently described phylum of emerging interest due to its association with eukaryotic hosts. Site directed mutagenesis of the Verrucomicrobium spinosum recA promoter confirms that LexA binds a 14 bp palindromic motif with consensus sequence TGTTC-N4-GAACA. Computational analyses suggest that recognition of this novel motif is determined primarily by changes in base-contacting residues of the third alpha helix of the LexA helix-turn-helix DNA binding motif. In conjunction with comparative genomics analysis of the LexA regulon in the Verrucomicrobia phylum, electrophoretic shift assays reveal that LexA binds to operators in the promoter region of DNA repair genes and a mutagenesis cassette in this organism, and identify previously unreported components of the SOS response. The identification of tandem LexA-binding sites generating instances of other LexA-binding motifs in the lexA gene promoter of Verrucomicrobia species leads us to postulate a novel mechanism for LexA-binding motif evolution. This model, based on gene duplication, successfully addresses outstanding questions in the intricate co-evolution of the LexA protein, its binding motif and the regulatory network it controls.

  17. CXC motif chemokine receptor 4 gene polymorphism and cancer risk

    Science.gov (United States)

    Wu, Yang; Zhang, Chun; Xu, Weizhang; Zhang, Jianzhong; Zheng, Yuxiao; Lu, Zipeng; Liu, Dongfang; Jiang, Kuirong

    2016-01-01

    Abstract Background: Previous epidemiological studies have reported the relationship between CXC motif chemokine receptor 4 (CXCR4) synonymous polymorphism (rs2228014), and risk of cancer, but the results remained conflicting and controversial. Therefore, this study was devised to evaluate the genetic effects of the rs2228014 polymorphism on cancer risk in a large meta-analysis. Methods: The computer-based databases (EMBASE, Web of Science, and PubMed) were searched for all relevant studies evaluating rs2228014 and susceptibility to cancer. In the analysis, pooled odds ratios (ORs) with its corresponding 95% confidence intervals (CIs) were calculated in 5 genetic models to assess the genetic risk. Egger regression and Begg funnel plots test were conducted to appraise the publication bias. Results: Data on rs2228014 polymorphism and overall cancer risk were available for 3684 cancer patients and 5114 healthy controls participating in 11 studies. Overall, a significantly increased risk of cancer was associated with rs2228014 polymorphism in homozygote model (OR = 2.01, 95% CI: 1.22–3.33) and in recessive model (OR = 1.97, 95% CI: 1.23–3.16). When stratified by ethnicity, the results were positive only in Asian populations (heterozygote model: OR = 1.36, 95% CI: 1.13–1.65; homozygote model: OR = 2.43, 95% CI: 1.21–4.91; dominant model: OR = 1.47, 95% CI: 1.13–1.90; recessive model: OR = 2.25, 95% CI: 1.13–4.48; and allele model: OR = 1.48, 95% CI: 1.10–1.99). Besides, in the subgroup analysis by source of control, the result was significant only in population-based control (homozygote model: OR = 2.39, 95% CI: 1.06–5.40; recessive model: pooled OR = 2.24, 95% CI: 1.02–4.96). Conclusion: In general, our results first indicated that the rs2228014 polymorphism in CXCR4 gene is correlated with an increased risk of cancer, especially among Asian ethnicity. Large, well-designed epidemiological studies are required to verify the current findings. PMID

  18. An Efficient Forward Secure Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    YU Jia; KONG Fan-yu; LI Da-xing

    2006-01-01

    A new efficient forward secure signature scheme based on bilinear pairings is presented in this paper.Each complexity of key generation, key update, signing and verifying algorithms in this scheme is O(1) in terms of the total number of time periods T. Because a new structure in node secret key storage and a unique strategy in key update are employed, the signing and verifying costs don't grow when T increases. At the same time, the key generation and key update algorithms are efficiently constructed thanks to using the pre-order traversal technique of binary trees. Compared with other schemes based on bilinear pairings, the signature size in this scheme is very short, which doesn't change with T increasing. The scheme is forward secure in random oracle model assuming CDH problem is hard.

  19. Signatures of star formation by cold collapse

    CERN Document Server

    Kuznetsova, Aleksandra; Ballesteros-Paredes, Javier

    2015-01-01

    Sub-virial gravitational collapse is one mechanism by which star clusters may form. Here we investigate whether this mechanism can be inferred from observations of young clusters. To address this question, we have computed SPH simulations of the initial formation and evolution of a dynamically young star cluster through cold (sub-virial) collapse, starting with an ellipsoidal, turbulently seeded distribution of gas, and forming sink particles representing (proto)stars. While the initial density distributions of the clouds do not have large initial mass concentrations, gravitational focusing due to the global morphology leads to cluster formation. We use the resulting structures to extract observable morphological and kinematic signatures for the case of sub-virial collapse. We find that the signatures of the initial conditions can be erased rapidly as the gas and stars collapse, suggesting that kinematic observations need to be made either early in cluster formation and/or at larger scales, away from the grow...

  20. Signatures from physics beyond the standard model

    CERN Document Server

    Valle, José W F

    1995-01-01

    A brief review is made of some of the experimental signatures that may be associated to a certain class of extensions of the standard model. The material of these lectures is divided into two sections. After briefly sketching the present observational status of the neutrino masses I consider various schemes of neutrino mass generation including those which are motivated by present experimental hints from solar and atmospheric neutrinos, as well as cosmological data on the amplitude of primordial density fluctuations. Then some of the physics motivations and potential of various extensions of the standard model related to the electroweak breaking sector, such as supersymmetry, and extensions of the gauge boson sector are reviewed. The new signatures associated with both types of extension may all be accessible to experiments performed either at accelerators or at underground installations. The complementarity between these two approaches in the search for signals beyond the standard model is most vividly manif...

  1. Universally Composable Proactive Threshold RSA Signature

    Institute of Scientific and Technical Information of China (English)

    HONG Xuan; CHEN Ke-fei; LONG Yu

    2008-01-01

    Recently some efforts were made towards capturing the security requirements within the composable security framework.This modeling has some significant advantages in designing and analyzing complex systems.The threshold signature was discussed and a definition was given based on the universal composability framework,which is proved to be equivalent to the standard security definition.Furthermore,a simple,efficient and proactive threshold RSA signature protocol was presented.It is proved to be correct,consistent and unforgeable relative to the environment that at most t-1 parties are corrupted in each proactive stage.It is also secure under the universal composability framework.It is a UC based security and is proved to be equivalent to the standard security.

  2. Vibration signature analysis of multistage gear transmission

    Science.gov (United States)

    Choy, F. K.; Tu, Y. K.; Savage, M.; Townsend, D. P.

    1989-01-01

    An analysis is presented for multistage multimesh gear transmission systems. The analysis predicts the overall system dynamics and the transmissibility to the gear box or the enclosed structure. The modal synthesis approach of the analysis treats the uncoupled lateral/torsional model characteristics of each stage or component independently. The vibration signature analysis evaluates the global dynamics coupling in the system. The method synthesizes the interaction of each modal component or stage with the nonlinear gear mesh dynamics and the modal support geometry characteristics. The analysis simulates transient and steady state vibration events to determine the resulting torque variations, speeds, changes, rotor imbalances, and support gear box motion excitations. A vibration signature analysis examines the overall dynamic characteristics of the system, and the individual model component responses. The gear box vibration analysis also examines the spectral characteristics of the support system.

  3. Photostatistics Reconstruction via Loop Detector Signatures

    CERN Document Server

    Webb, J G; 10.1364/OE.17.011799

    2009-01-01

    Photon-number resolving detectors are a fundamental building-block of optical quantum information processing protocols. A loop detector, combined with appropriate statistical processing, can be used to convert a binary on/off photon counter into a photon-number-resolving detector. Here we describe the idea of a signature of photon-counts, which may be used to more robustly reconstruct the photon number distribution of a quantum state. The methodology is applied experimentally in a 9-port loop detector operating at a telecommunications wavelength and compared directly to the approach whereby only the number of photon-counts is used to reconstruct the input distribution. The signature approach is shown to be more robust against calibration errors, exhibit reduced statistical uncertainty, and reduced reliance on a-priori assumptions about the input state.

  4. Observational Signatures of Self-Destructive Civilisations

    CERN Document Server

    Stevens, Adam; O'Malley-James, Jack

    2015-01-01

    We address the possibility that intelligent civilisations that destroy themselves could present signatures observable by humanity. Placing limits on the number of self-destroyed civilisations in the Milky Way has strong implications for the final three terms in Drake's Equation, and would allow us to identify which classes of solution to Fermi's Paradox fit with the evidence (or lack thereof). Using the Earth as an example, we consider a variety of scenarios in which humans could extinguish their own technological civilisation. Each scenario presents some form of observable signature that could be probed by astronomical campaigns to detect and characterise extrasolar planetary systems. Some observables are unlikely to be detected at interstellar distances, but some scenarios are likely to produce significant changes in atmospheric composition that could be detected serendipitously with next-generation telescopes. In some cases, the timing of the observation would prove crucial to detection, as the decay of si...

  5. How to find a leucine in a haystack? Structure, ligand recognition and regulation of leucine-aspartic acid (LD) motifs.

    Science.gov (United States)

    Alam, Tanvir; Alazmi, Meshari; Gao, Xin; Arold, Stefan T

    2014-06-15

    LD motifs (leucine-aspartic acid motifs) are short helical protein-protein interaction motifs that have emerged as key players in connecting cell adhesion with cell motility and survival. LD motifs are required for embryogenesis, wound healing and the evolution of multicellularity. LD motifs also play roles in disease, such as in cancer metastasis or viral infection. First described in the paxillin family of scaffolding proteins, LD motifs and similar acidic LXXLL interaction motifs have been discovered in several other proteins, whereas 16 proteins have been reported to contain LDBDs (LD motif-binding domains). Collectively, structural and functional analyses have revealed a surprising multivalency in LD motif interactions and a wide diversity in LDBD architectures. In the present review, we summarize the molecular basis for function, regulation and selectivity of LD motif interactions that has emerged from more than a decade of research. This overview highlights the intricate multi-level regulation and the inherently noisy and heterogeneous nature of signalling through short protein-protein interaction motifs.

  6. Fast revelation of the motif mode for a yeast protein interaction network through intelligent agent-based distributed computing.

    Science.gov (United States)

    Lee, Wei-Po; Tzou, Wen-Shyong

    2010-09-01

    In the yeast protein-protein interaction network, motif mode, a collection of motifs of special combinations of protein nodes annotated by the molecular function terms of the Gene Ontology, has revealed differences in the conservation constraints within the same topology. In this study, by employing an intelligent agent-based distributed computing method, we are able to discover motif modes in a fast and adaptive manner. Moreover, by focusing on the highly evolutionarily conserved motif modes belonging to the same biological function, we find a large downshift in the distance between nodes belonging to the same motif mode compared with the whole, suggesting that nodes with the same motif mode tend to congregate in a network. Several motif modes with a high conservation of the motif constituents were revealed, but from a new perspective, including that with a three-node motif mode engaged in the protein fate and that with three four-node motif modes involved in the genome maintenance, cellular organization, and transcription. The network motif modes discovered from this method can be linked to the wealth of biological data which require further elucidation with regard to biological functions.

  7. Computational design of model scaffold for anion recognition based on the 'C(α) NN' motif.

    Science.gov (United States)

    Sheet, Tridip; Ghosh, Suvankar; Pal, Debnath; Banerjee, Raja

    2017-01-01

    The 'novel phosphate binding 'C(α) NN' motif', consisting of three consecutive amino acid residues, usually occurs in the protein loop regions preceding a helix. Recent computational and complementary biophysical experiments on a series of chimeric peptides containing the naturally occurring 'C(α) NN' motif at the N-terminus of a designed helix establishes that the motif segment recognizes the anion (sulfate and phosphate ions) through local interaction along with extension of the helical conformation which is thermodynamically favored even in a context-free, nonproteinaceous isolated system. However, the strength of the interaction depends on the amino acid sequence/conformation of the motif. Such a locally-mediated recognition of anions validates its intrinsic affinity towards anions and confirms that the affinity for recognition of anions is embedded within the 'local sequence' of the motif. Based on the knowledge gathered on the sequence/structural aspects of the naturally occurring 'C(α) NN' segment, which provides the guideline for rationally engineering model scaffolds, we have modeled a series of templates and investigated their interactions with anions using computational approach. Two of these designed scaffolds show more efficient anion recognition than those of the naturally occurring 'C(α) NN' motif which have been studied. This may provide an avenue in designing better anion receptors suitable for various biochemical applications.

  8. GPUmotif: an ultra-fast and energy-efficient motif analysis program using graphics processing units.

    Directory of Open Access Journals (Sweden)

    Pooya Zandevakili

    Full Text Available Computational detection of TF binding patterns has become an indispensable tool in functional genomics research. With the rapid advance of new sequencing technologies, large amounts of protein-DNA interaction data have been produced. Analyzing this data can provide substantial insight into the mechanisms of transcriptional regulation. However, the massive amount of sequence data presents daunting challenges. In our previous work, we have developed a novel algorithm called Hybrid Motif Sampler (HMS that enables more scalable and accurate motif analysis. Despite much improvement, HMS is still time-consuming due to the requirement to calculate matching probabilities position-by-position. Using the NVIDIA CUDA toolkit, we developed a graphics processing unit (GPU-accelerated motif analysis program named GPUmotif. We proposed a "fragmentation" technique to hide data transfer time between memories. Performance comparison studies showed that commonly-used model-based motif scan and de novo motif finding procedures such as HMS can be dramatically accelerated when running GPUmotif on NVIDIA graphics cards. As a result, energy consumption can also be greatly reduced when running motif analysis using GPUmotif. The GPUmotif program is freely available at http://sourceforge.net/projects/gpumotif/

  9. An analysis of multi-type relational interactions in FMA using graph motifs with disjointness constraints.

    Science.gov (United States)

    Zhang, Guo-Qiang; Luo, Lingyun; Ogbuji, Chime; Joslyn, Cliff; Mejino, Jose; Sahoo, Satya S

    2012-01-01

    The interaction of multiple types of relationships among anatomical classes in the Foundational Model of Anatomy (FMA) can provide inferred information valuable for quality assurance. This paper introduces a method called Motif Checking (MOCH) to study the effects of such multi-relation type interactions for detecting logical inconsistencies as well as other anomalies represented by the motifs. MOCH represents patterns of multi-type interaction as small labeled (with multiple types of edges) sub-graph motifs, whose nodes represent class variables, and labeled edges represent relational types. By representing FMA as an RDF graph and motifs as SPARQL queries, fragments of FMA are automatically obtained as auditing candidates. Leveraging the scalability and reconfigurability of Semantic Web Technology, we performed exhaustive analyses of a variety of labeled sub-graph motifs. The quality assurance feature of MOCH comes from the distinct use of a subset of the edges of the graph motifs as constraints for disjointness, whereby bringing in rule-based flavor to the approach as well. With possible disjointness implied by antonyms, we performed manual inspection of the resulting FMA fragments and tracked down sources of abnormal inferred conclusions (logical inconsistencies), which are amendable for programmatic revision of the FMA. Our results demonstrate that MOCH provides a unique source of valuable information for quality assurance. Since our approach is general, it is applicable to any ontological system with an OWL representation.

  10. Creation of Hybrid Nanorods From Sequences of Natural Trimeric Fibrous Proteins Using the Fibritin Trimerization Motif

    Science.gov (United States)

    Papanikolopoulou, Katerina; van Raaij, Mark J.; Mitraki, Anna

    Stable, artificial fibrous proteins that can be functionalized open new avenues in fields such as bionanomaterials design and fiber engineering. An important source of inspiration for the creation of such proteins are natural fibrous proteins such as collagen, elastin, insect silks, and fibers from phages and viruses. The fibrous parts of this last class of proteins usually adopt trimeric, β-stranded structural folds and are appended to globular, receptor-binding domains. It has been recently shown that the globular domains are essential for correct folding and trimerization and can be successfully substituted by a very small (27-amino acid) trimerization motif from phage T4 fibritin. The hybrid proteins are correctly folded nanorods that can withstand extreme conditions. When the fibrous part derives from the adenovirus fiber shaft, different tissue-targeting specificities can be engineered into the hybrid proteins, which therefore can be used as gene therapy vectors. The integration of such stable nanorods in devices is also a big challenge in the field of biomechanical design. The fibritin foldon domain is a versatile trimerization motif and can be combined with a variety of fibrous motifs, such as coiled-coil, collagenous, and triple β-stranded motifs, provided the appropriate linkers are used. The combination of different motifs within the same fibrous molecule to create stable rods with multiple functions can even be envisioned. We provide a comprehensive overview of the experimental procedures used for designing, creating, and characterizing hybrid fibrous nanorods using the fibritin trimerization motif.

  11. What determines the assembly of transcriptional network motifs in Escherichia coli?

    Directory of Open Access Journals (Sweden)

    Francisco M Camas

    Full Text Available Transcriptional networks are constituted by a collection of building blocks known as network motifs. Why do motifs appear? An adaptive model of motif emergence was recently questioned in favor of neutralist scenarios. Here, we provide a new picture of motif assembly in Escherichia coli which partially clarifies these contrasting explanations. This is based on characterizing the linkage between motifs and sensing or response specificity of their constituent transcriptional factors (TFs. We find that sensing specificity influences the distribution of autoregulation, while the tendency of a TF to establish feed-forward loops (FFLs depends on response specificity, i.e., regulon size. Analysis of the latter pattern reveals that coregulation between large regulon-size TFs is common under a network neutral model, leading to the assembly of a great number of FFLs and bifans. In addition, neutral exclusive regulation also leads to a collection of single input modules -the fourth basic motif. On the whole, and even under the conservative neutralist scenario considered, a substantial group of regulatory structures revealed adaptive. These structures visibly function as fully-fledged working units.

  12. Pipeline for the Analysis of ChIP-seq Data and New Motif Ranking Procedure

    KAUST Repository

    Ashoor, Haitham

    2011-06-01

    This thesis presents a computational methodology for ab-initio identification of transcription factor binding sites based on ChIP-seq data. This method consists of three main steps, namely ChIP-seq data processing, motif discovery and models selection. A novel method for ranking the models of motifs identified in this process is proposed. This method combines multiple factors in order to rank the provided candidate motifs. It combines the model coverage of the ChIP-seq fragments that contain motifs from which that model is built, the suitable background data made up of shuffled ChIP-seq fragments, and the p-value that resulted from evaluating the model on actual and background data. Two ChIP-seq datasets retrieved from ENCODE project are used to evaluate and demonstrate the ability of the method to predict correct TFBSs with high precision. The first dataset relates to neuron-restrictive silencer factor, NRSF, while the second one corresponds to growth-associated binding protein, GABP. The pipeline system shows high precision prediction for both datasets, as in both cases the top ranked motif closely resembles the known motifs for the respective transcription factors.

  13. Determining activities of radionuclides from coincidence signatures

    Science.gov (United States)

    Warren, Glen A.; Smith, L. Eric; Aalseth, Craig E.; Ellis, Edward; Hossbach, Todd W.; Valsan, Andrei B.

    2006-05-01

    The spectral analysis of simultaneously observed photons in separate detectors may provide an invaluable tool for radioisotope identification applications. A general recursive method to determine the activity of an isotope from the observed coincidence signature rate is discussed. The method coherently accounts for effects of true coincidence summing within a single detector and detection efficiencies. A verification of the approach with computer simulations is also discussed.

  14. Limits and Signatures of Relativistic Spaceflight

    CERN Document Server

    Yurtsever, Ulvi

    2015-01-01

    While special relativity imposes an absolute speed limit at the speed of light, our Universe is not empty Minkowski spacetime. The constituents that fill the interstellar/intergalactic vacuum, including the cosmic microwave background photons, impose a lower speed limit on any object travelling at relativistic velocities. Scattering of cosmic microwave phtotons from an ultra-relativistic object may create radiation with a characteristic signature allowing the detection of such objects at large distances.

  15. Measurement-device-independent quantum digital signatures

    Science.gov (United States)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  16. On psychoanalytic supervision as signature pedagogy.

    Science.gov (United States)

    Watkins, C Edward

    2014-04-01

    What is signature pedagogy in psychoanalytic education? This paper examines that question, considering why psychoanalytic supervision best deserves that designation. In focusing on supervision as signature pedagogy, I accentuate its role in building psychoanalytic habits of mind, habits of hand, and habits of heart, and transforming theory and self-knowledge into practical product. Other facets of supervision as signature pedagogy addressed in this paper include its features of engagement, uncertainty, formation, and pervasiveness, as well as levels of surface, deep, and implicit structure. Epistemological, ontological, and axiological in nature, psychoanalytic supervision engages trainees in learning to do, think, and value what psychoanalytic practitioners in the field do, think, and value: It is, most fundamentally, professional preparation for competent, "good work." In this paper, effort is made to shine a light on and celebrate the pivotal role of supervision in "making" or developing budding psychoanalysts and psychoanalytic psychotherapists. Now over a century old, psychoanalytic supervision remains unparalleled in (1) connecting and integrating conceptualization and practice, (2) transforming psychoanalytic theory and self-knowledge into an informed analyzing instrument, and (3) teaching, transmitting, and perpetuating the traditions, practice, and culture of psychoanalytic treatment.

  17. Visual signature reduction of unmanned aerial vehicles

    Science.gov (United States)

    Zhong, Z. W.; Ma, Z. X.; Jayawijayaningtiyas; Ngoh, J. H. H.

    2016-10-01

    With the emergence of unmanned aerial vehicles (UAVs) in multiple tactical defence missions, there was a need for an efficient visual signature suppression system for a more efficient stealth operation. One of our studies experimentally investigated the visual signature reduction of UAVs achieved through an active camouflage system. A prototype was constructed with newly developed operating software, Cloak, to provide active camouflage to the UAV model. The reduction of visual signature was analysed. Tests of the devices mounted on UAVs were conducted in another study. A series of experiments involved testing of the concept as well as the prototype. The experiments were conducted both in the laboratory and under normal environmental conditions. Results showed certain degrees of blending with the sky to create a camouflage effect. A mini-UAV made mostly out of transparent plastic was also designed and fabricated. Because of the transparency of the plastic material, the visibility of this UAV in the air is very small, and therefore the UAV is difficult to be detected. After re-designs and tests, eventually a practical system to reduce the visibility of UAVs viewed by human observers from the ground was developed. The system was evaluated during various outdoor tests. The scene target-to-background lightness contrast and the scene target-to-background colour contrast of the adaptive control system prototype were smaller than 10% at a stand-off viewing distance of 20-50 m.

  18. SIGNATURES OF LONG-LIVED SPIRAL PATTERNS

    Energy Technology Data Exchange (ETDEWEB)

    Martinez-Garcia, Eric E. [Instituto Nacional de Astrofisica, Optica y Electronica (INAOE), Aptdo. Postal 51 y 216, 72000 Puebla, Pue. (Mexico); Gonzalez-Lopezlira, Rosa A., E-mail: ericmartinez@inaoep.mx, E-mail: martinez@astro.unam.mx, E-mail: r.gonzalez@crya.unam.mx [Centro de Radioastronomia y Astrofisica, UNAM, Campus Morelia, Michoacan, C.P. 58089 (Mexico)

    2013-03-10

    Azimuthal age/color gradients across spiral arms are a signature of long-lived spirals. From a sample of 19 normal (or weakly barred) spirals where we have previously found azimuthal age/color gradient candidates, 13 objects were further selected if a two-armed grand-design pattern survived in a surface density stellar mass map. Mass maps were obtained from optical and near-infrared imaging, by comparison with a Monte Carlo library of stellar population synthesis models that allowed us to obtain the mass-to-light ratio in the J band, (M/L){sub J}, as a function of (g - i) versus (i - J) color. The selected spirals were analyzed with Fourier methods in search of other signatures of long-lived modes related to the gradients, such as the gradient divergence toward corotation, and the behavior of the phase angle of the two-armed spiral in different wavebands, as expected from theory. The results show additional signatures of long-lived spirals in at least 50% of the objects.

  19. The Observable Signatures of GRB Cocoons

    CERN Document Server

    Nakar, Ehud

    2016-01-01

    As a long GRB jet propagates within the surrounding stellar atmosphere it creates a cocoon composed of an outer Newtonian shocked stellar material and an inner (possibly relativistic) shocked jet material. The jet deposits $10^{51}-10^{52}$ erg into this cocoon. This energy is comparable to the GRB's energy and to the energy of the accompanying supernova, yet its signature has been largely neglected so far. A fraction of the cocoon energy is released during its expansion following the breakout from the star and later as it interacts with the surrounding matter. We explore here the possible signatures of the cocoon emission and outline a framework to calculate them from the conditions of the cocoon at the time of the jet breakout. We show that the cocoon signature depends strongly on the level of mixing between the shocked jet and shocked stellar material that fills it, which is currently unknown. We find that if there is no mixing at all then the $\\gamma$-ray emission from the cocoon is so bright that it shou...

  20. A coarse-grained spectral signature generator

    Science.gov (United States)

    Lam, K. P.; Austin, J. C.; Day, C. R.

    2007-01-01

    This paper investigates the method for object fingerprinting in the context of element specific x-ray imaging. In particular, the use of spectral descriptors that are illumination invariant and viewpoint independent for pattern identification was examined in some detail. To improve generating the relevant "signature", the spectral descriptor constructed is enhanced with a differentiator which has built-in noise filtration capability and good localisation properties, thus facilitating the extraction of element specific features at a coarse-grained level. In addition to the demonstrable efficacy in identifying significant image intensity transitions that are associated with the underlying physical process of interest, the method has the distinct advantage of being conceptually simple and computationally efficient. These latter properties allow the descriptor to be further utilised by an intelligent system capable of performing a fine-grained analysis of the extracted pattern signatures. The performance of the spectral descriptor has been studied in terms of the quality of the signature vectors that it generated, quantitatively based on the established framework of Spectral Information Measure (SIM). Early results suggested that such a multiscale approach of image sequence analysis offers a considerable potential for real-time applications.

  1. Lung Cancer Gene Signatures and Clinical Perspectives

    Directory of Open Access Journals (Sweden)

    Ruprecht Kuner

    2013-12-01

    Full Text Available Microarrays have been used for more than two decades in preclinical research. The tumor transcriptional profiles were analyzed to select cancer-associated genes for in-deep functional characterization, to stratify tumor subgroups according to the histopathology or diverse clinical courses, and to assess biological and cellular functions behind these gene sets. In lung cancer—the main type of cancer causing mortality worldwide—biomarker research focuses on different objectives: the early diagnosis of curable tumor diseases, the stratification of patients with prognostic unfavorable operable tumors to assess the need for further therapy regimens, or the selection of patients for the most efficient therapies at early and late stages. In non-small cell lung cancer, gene and miRNA signatures are valuable to differentiate between the two main subtypes’ squamous and non-squamous tumors, a discrimination which has further implications for therapeutic schemes. Further subclassification within adenocarcinoma and squamous cell carcinoma has been done to correlate histopathological phenotype with disease outcome. Those tumor subgroups were assigned by diverse transcriptional patterns including potential biomarkers and therapy targets for future diagnostic and clinical applications. In lung cancer, none of these signatures have entered clinical routine for testing so far. In this review, the status quo of lung cancer gene signatures in preclinical and clinical research will be presented in the context of future clinical perspectives.

  2. Techni-dilaton signatures at LHC

    CERN Document Server

    Matsuzaki, Shinya

    2011-01-01

    We explore discovery signatures of techni-dilaton (TD) at LHC. The TD was predicted long ago as a composite pseudo Nambu-Goldstone boson (pNGB) associated with the spontaneous breaking of the approximate scale symmetry in the walking technicolor (WTC). Being pNGB, whose mass arises from the explicit scale-symmetry breaking due to the dynamical mass generation, the TD should have a mass MTD lighter than other techni-hadrons, say MTD \\simeq 600GeV for the typical WTC model, which is well in the discovery range of the ongoing LHC experiment. We develop a spurion method of nonlinear realization to calculate the TD couplings to the standard model (SM) particles and explicitly evaluate the TD LHC production cross sections at sqrt{s}=7TeV times the branching ratios in terms of MTD as an input parameter for 200GeVWW/ZZ signature with the recent ATLAS and CMS bounds and find that in the case of 1DM the signature is consistent over the whole mass range due to the large suppression of TD couplings, and by the same token...

  3. Observational Signatures of Binary Supermassive Black Holes

    CERN Document Server

    Roedig, Constanze; Miller, M Coleman

    2014-01-01

    Observations indicate that most massive galaxies contain a supermassive black hole, and theoretical studies suggest that when such galaxies have a major merger, the central black holes will form a binary and eventually coalesce. Here we discuss two spectral signatures of such binaries that may help distinguish them from ordinary AGN. These signatures are expected when the mass ratio between the holes is not extreme and the system is fed by a circumbinary disk. One such signature is a notch in the thermal continuum that has been predicted by other authors; we point out that it should be accompanied by a spectral revival at shorter wavelengths and also discuss its dependence on binary properties such as mass, mass ratio, and separation. In particular, we note that the wavelength $\\lambda_n$ at which the notch occurs depends on these three parameters in such a way as to make the number of systems displaying these notches $\\propto \\lambda_n^{16/3}$; longer wavelength searches are therefore strongly favored. A sec...

  4. A New Group Signature Scheme and Its Performance

    Institute of Scientific and Technical Information of China (English)

    MA Jianfeng; YANG Bo; Chiam Tee Chye; Kot Chichung Alex

    2001-01-01

    Group signatures allow every memberof a group to sign some given messages on behalf of thegroup anonymously. Only a designated group man-ager can open a signature to reveal the identity of thesigner. To the best of our knowledge, all known groupsignature solutions have some undesirable properties.In this paper, we propose a new group signaturescheme combining linear codes and known digital sig-nature methods. This scheme possesses all group sig-nature properties including coalition-resistance, andcan be implemented easily. The security of this signa-ture scheme is determined by the difficulty of discretelogarithm problem over finite fields.

  5. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  6. Cyclostationary signature design for common control channel of cognitive radio

    Institute of Scientific and Technical Information of China (English)

    QI Yuan; PENG Tao; WANG Wen-bo; LUO Shi-feng

    2009-01-01

    Embedding specific signatures in transmitted signals for identifying common control channels of cognitive radio are addressed in research laboratories because availability of the spectrum occupied by the common control channel might change in time. A novel solution to embed a unique cyclostationary signature for the common control channel of cognitive radio is proposed in this article. Based on linear periodically time-variant transformation (LPTV) model, the cyclic autocorrelation expression of the proposed signature is derived, which characterizes its cyclostationarity. Analysis of the cyclostationary signature is presented considering effects of additive white Gaussian noise(AWGN)and multiplath channels. Simulation results illustrating the reliability of signatures are given.

  7. A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM

    Institute of Scientific and Technical Information of China (English)

    Hu Bin; Jin Chenhui

    2006-01-01

    Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy signature scheme based on elliptic curve cryptosystem. Contrast with universal proxy signature schemes, they are secure against key substitute attack even if there is not a certificate authority in the system,and also secure against the original signer's forgery attack. Furthermore, based on the elliptic curve crypto system, they are more efficient and have smaller key size than other system. They can be used in electronics transaction and mobile agent environment.

  8. Seismic signature analysis for discrimination of people from animals

    Science.gov (United States)

    Damarla, Thyagaraju; Mehmood, Asif; Sabatier, James M.

    2013-05-01

    Cadence analysis has been the main focus for discriminating between the seismic signatures of people and animals. However, cadence analysis fails when multiple targets are generating the signatures. We analyze the mechanism of human walking and the signature generated by a human walker, and compare it with the signature generated by a quadruped. We develop Fourier-based analysis to differentiate the human signatures from the animal signatures. We extract a set of basis vectors to represent the human and animal signatures using non-negative matrix factorization, and use them to separate and classify both the targets. Grazing animals such as deer, cows, etc., often produce sporadic signals as they move around from patch to patch of grass and one must characterize them so as to differentiate their signatures from signatures generated by a horse steadily walking along a path. These differences in the signatures are used in developing a robust algorithm to distinguish the signatures of animals from humans. The algorithm is tested on real data collected in a remote area.

  9. Pixel Based Off-line Signature Verification System

    Directory of Open Access Journals (Sweden)

    Anik Barua

    2015-01-01

    Full Text Available The verification of handwritten signatures is one of the oldest and the most popular authentication methods all around the world. As technology improved, different ways of comparing and analyzing signatures become more and more sophisticated. Since the early seventies, people have been exploring how computers can fully take over the task of signature verification and tried different methods. However, none of them is satisfactory enough and time consuming too. Therefore, our proposed pixel based offline signature verification system is one of the fastest and easiest ways to authenticate any handwritten signature we have ever found. For signature acquisition, we have used scanner. Then we have divided the signature image into 2D array and calculated the hexadecimal RGB value of each pixel. After that, we have calculated the total percentage of matching. If the percentage of matching is more than 90, the signature is considered as valid otherwise invalid. We have experimented on more than 35 signatures and the result of our experiment is quite impressive. We have made the whole system web based so that the signature can be verified from anywhere. The average execution time for signature verification is only 0.00003545 second only.

  10. Arbitrated quantum signature schemes without using entangled states

    CERN Document Server

    Zou, Xiangfu

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature schemes have being proposed. However, in the existing literature, arbitrated quantum signature schemes depend on entanglement. In this paper, we present two arbitrated quantum signature schemes without utilizing entangled states in the signing phase and the verifying phase. The first proposed scheme can preserve the merits in the existing schemes. Then, we point out, in this scheme and the prior schemes, there exists a problem that Bob can repudiate the integrality of the signatures. To conquer this problem, we construct another arbitrated quantum signature scheme without using quantum entangled states but using a public board. The new scheme has three advantages: it does not utilize entangled states while it can preserve all merits in the existing schemes; the integrality of the signature can avoid being disavowed by the receiver; an...

  11. Merkle Tree Digital Signature and Trusted Computing Platform

    Institute of Scientific and Technical Information of China (English)

    WANG Xiaofei; HONG Fan; TANG Xueming; CUI Guohua

    2006-01-01

    Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signature scheme is constructed, and it is provably existentially unforgeable under adaptive chosen message attack. By decentralizing the initial key generation process of the original scheme within the signature process, a large Merkle tree with 6.87×1010 possible signatures can be initialized in 590 milliseconds. Storing some small Merkle trees in hard disk and memory can speed up Merkle tree signature scheme. Mekle tree signature schemes are fit for trusted computing platform in most scenarios.

  12. A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME

    Institute of Scientific and Technical Information of China (English)

    Ming Yang; Wang Yumin

    2008-01-01

    In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting, e-payment, etc. Recently, Zheng, et al. presented an IDentity (ID)-based proxy blind signature. In this paper, a new efficient ID-based proxy blind signature scheme from bilinear pairings is proposed, which can satisfy the security properties of both the proxy signatures and the blind signature schemes. Analysis of the scheme efficiency shows that the new scheme is more efficient than Zheng, et al.'s scheme. The proposed scheme is more practical in the real world.

  13. Person Identification System using Static-dynamic signatures fusion

    Directory of Open Access Journals (Sweden)

    S.A Daramola

    2010-09-01

    Full Text Available Off-line signature verification systems rely on static image of signature for person identification. Imposter can easily imitate the static image of signature of the genuine user due to lack of dynamic features. This paper proposes person identity verification system using fused static-dynamic signature features. Computational efficient technique is developed to extract and fuse static and dynamic features extracted from offline and online signatures of the same person. The training stage used the fused features to generate couple reference data and classification stage compared the couple test signatures with the reference data based on the set threshold values. The system performance is encouraging against imposter attacker in comparison with previous single sensor offline signature identification systems.

  14. Bridging of anions by hydrogen bonds in nest motifs and its significance for Schellman loops and other larger motifs within proteins.

    Science.gov (United States)

    Afzal, Avid M; Al-Shubailly, Fawzia; Leader, David P; Milner-White, E James

    2014-11-01

    The nest is a protein motif of three consecutive amino acid residues with dihedral angles 1,2-αR αL (RL nests) or 1,2-αL αR (LR nests). Many nests form a depression in which an anion or δ-negative acceptor atom is bound by hydrogen bonds from the main chain NH groups. We have determined the extent and nature of this bridging in a database of protein structures using a computer program written for the purpose. Acceptor anions are bound by a pair of bridging hydrogen bonds in 40% of RL nests and 20% of LR nests. Two thirds of the bridges are between the NH groups at Positions 1 and 3 of the motif (N1N3-bridging)-which confers a concavity to the nest; one third are of the N2N3 type-which does not. In bridged LR nests N2N3-bridging predominates (14% N1N3: 75% N2N3), whereas in bridged RL nests the reverse is true (69% N1N3: 25% N2N3). Most bridged nests occur within larger motifs: 45% in (hexapeptide) Schellman loops with an additional 4 → 0 hydrogen bond (N1N3), 11% in Schellman loops with an additional 5 → 1 hydrogen bond (N2N3), 12% in a composite structure including a type 1β-bulge loop and an asx- or ST- motif (N1N3)-remarkably homologous to the N1N3-bridged Schellman loop-and 3% in a composite structure including a type 2β-bulge loop and an asx-motif (N2N3). A third hydrogen bond is a previously unrecognized feature of Schellman loops as those lacking bridged nests have an additional 4 → 0 hydrogen bond.

  15. Automated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes

    Directory of Open Access Journals (Sweden)

    Frances Bernadette C. De Ocampo

    2015-05-01

    Full Text Available Signature-based Intrusion Detection System (IDS helps in maintaining the integrity of data in a network controlled environment. Unfortunately, this type of IDS depends on predetermined intrusion patterns that are manually created. If the signature database of the Signature-based IDS is not updated, network attacks just pass through this type of IDS without being noticed. To avoid this, an Anomaly-based IDS is used in order to countercheck if a network traffic that is not detected by Signature-based IDS is a true malicious traffic or not. In doing so, the Anomaly-based IDS might come up with several numbers of logs containing numerous network attacks which could possibly be a false positive. This is the reason why the Anomaly-based IDS is not perfect, it would readily alarm the system that a network traffic is an attack just because it is not on its baseline. In order to resolve the problem between these two IDSs, the goal is to correlate data between the logs of the Anomaly-based IDS and the packet that has been captured in order to determine if a network traffic is really malicious or not. With the supervision of a security expert, the malicious network traffic would be verified as malicious. Using machine learning, the researchers can identify which algorithm is better than the other algorithms in classifying if a certain network traffic is really malicious. Upon doing so, the creation of signatures would follow by basing the automated creation of signatures from the detected malicious traffic.

  16. Structural basis for the binding of tryptophan-based motifs by δ-COP.

    Science.gov (United States)

    Suckling, Richard J; Poon, Pak Phi; Travis, Sophie M; Majoul, Irina V; Hughson, Frederick M; Evans, Philip R; Duden, Rainer; Owen, David J

    2015-11-17

    Coatomer consists of two subcomplexes: the membrane-targeting, ADP ribosylation factor 1 (Arf1):GTP-binding βγδζ-COP F-subcomplex, which is related to the adaptor protein (AP) clathrin adaptors, and the cargo-binding αβ'ε-COP B-subcomplex. We present the structure of the C-terminal μ-homology domain of the yeast δ-COP subunit in complex with the WxW motif from its binding partner, the endoplasmic reticulum-localized Dsl1 tether. The motif binds at a site distinct from that used by the homologous AP μ subunits to bind YxxΦ cargo motifs with its two tryptophan residues sitting in compatible pockets. We also show that the Saccharomyces cerevisiae Arf GTPase-activating protein (GAP) homolog Gcs1p uses a related WxxF motif at its extreme C terminus to bind to δ-COP at the same site in the same way. Mutations designed on the basis of the structure in conjunction with isothermal titration calorimetry confirm the mode of binding and show that mammalian δ-COP binds related tryptophan-based motifs such as that from ArfGAP1 in a similar manner. We conclude that δ-COP subunits bind Wxn(1-6)[WF] motifs within unstructured regions of proteins that influence the lifecycle of COPI-coated vesicles; this conclusion is supported by the observation that, in the context of a sensitizing domain deletion in Dsl1p, mutating the tryptophan-based motif-binding site in yeast causes defects in both growth and carboxypeptidase Y trafficking/processing.

  17. Lipid motif of a bacterial antigen mediates immune responses via TLR2 signaling.

    Directory of Open Access Journals (Sweden)

    Amit A Lugade

    Full Text Available The cross-talk between the innate and the adaptive immune system is facilitated by the initial interaction of antigen with dendritic cells. As DCs express a large array of TLRs, evidence has accumulated that engagement of these molecules contributes to the activation of adaptive immunity. We have evaluated the immunostimulatory role of the highly-conserved outer membrane lipoprotein P6 from non-typeable Haemophilus influenzae (NTHI to determine whether the presence of the lipid motif plays a critical role on its immunogenicity. We undertook a systematic analysis of the role that the lipid motif plays in the activation of DCs and the subsequent stimulation of antigen-specific T and B cells. To facilitate our studies, recombinant P6 protein that lacked the lipid motif was generated. Mice immunized with non-lipidated rP6 were unable to elicit high titers of anti-P6 Ig. Expression of the lipid motif on P6 was also required for proliferation and cytokine secretion by antigen-specific T cells. Upregulation of T cell costimulatory molecules was abrogated in DCs exposed to non-lipidated rP6 and in TLR2(-/- DCs exposed to native P6, thereby resulting in diminished adaptive immune responses. Absence of either the lipid motif on the antigen or TLR2 expression resulted in diminished cytokine production from stimulated DCs. Collectively, our data suggest that the lipid motif of the lipoprotein antigen is essential for triggering TLR2 signaling and effective stimulation of APCs. Our studies establish the pivotal role of a bacterial lipid motif on activating both innate and adaptive immune responses to an otherwise poorly immunogenic protein antigen.

  18. An Analysis of Multi-type Relational Interactions in FMA Using Graph Motifs with Disjointness Constraints

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Guo Qiang; Luo, Lingyun; Ogbuji, Chime; Joslyn, Cliff A.; Mejino, Jose; Sahoo, Satya S.

    2012-11-24

    The interaction of multiple types of relationships among anatomical classes in the Foundational Model of Anatomy (FMA) can provide inferred information valuable for quality assurance. This paper introduces a method called Motif Checking (MOCH) to study the effects of such multi-relation type interactions. MOCH represents patterns of multitype interaction as small labeled sub-graph motifs, whose nodes represent class variables, and labeled edges represent relational types. By representing FMA as an RDF graph and motifs as SPARQL queries, fragments of FMA are automatically obtained as auditing candidates. Leveraging the scalability and reconfigurability of Semantic Web Technology (OWL, RDF and SPARQL) and Virtuoso, we performed exhaustive analyses of three 2-node motifs, resulting in 638 matching FMA configurations; twelve 3-node motifs, resulting in 202,960 configurations. Using the Principal Ideal Explorer (PIE) methodology as an extension of MOCH, we were able to identify 755 root nodes with 4,100 respective descendants with opposing antonyms in their class names for arbitrary-length motifs. With possible disjointness implied by antonyms, we performed manual inspection of a subset of the resulting FMA fragments and tracked down a source of abnormal inferred conclusions (captured by the motifs), coming from a gender-neutral class being modeled as a part of gender-specific class, such as “Urinary system” is a part of “Female human body.” Our results demonstrate that MOCH and PIE provide a unique source of valuable information for quality assurance. Since our approach is general, it is applicable to any ontological system with an OWL representation.

  19. Identification of Biomarker and Co-Regulatory Motifs in Lung Adenocarcinoma Based on Differential Interactions.

    Directory of Open Access Journals (Sweden)

    Ning Zhao

    Full Text Available Changes in intermolecular interactions (differential interactions may influence the progression of cancer. Specific genes and their regulatory networks may be more closely associated with cancer when taking their transcriptional and post-transcriptional levels and dynamic and static interactions into account simultaneously. In this paper, a differential interaction analysis was performed to detect lung adenocarcinoma-related genes. Furthermore, a miRNA-TF (transcription factor synergistic regulation network was constructed to identify three kinds of co-regulated motifs, namely, triplet, crosstalk and joint. Not only were the known cancer-related miRNAs and TFs (let-7, miR-15a, miR-17, TP53, ETS1, and so on were detected in the motifs, but also the miR-15, let-7 and miR-17 families showed a tendency to regulate the triplet, crosstalk and joint motifs, respectively. Moreover, several biological functions (i.e., cell cycle, signaling pathways and hemopoiesis associated with the three motifs were found to be frequently targeted by the drugs for lung adenocarcinoma. Specifically, the two 4-node motifs (crosstalk and joint based on co-expression and interaction had a closer relationship to lung adenocarcinoma, and so further research was performed on them. A 10-gene biomarker (UBC, SRC, SP1, MYC, STAT3, JUN, NR3C1, RB1, GRB2 and MAPK1 was selected from the joint motif, and a survival analysis indicated its significant association with survival. Among the ten genes, JUN, NR3C1 and GRB2 are our newly detected candidate lung adenocarcinoma-related genes. The genes, regulators and regulatory motifs detected in this work will provide potential drug targets and new strategies for individual therapy.

  20. Systematic discovery of regulatory motifs in Fusarium graminearum by comparing four Fusarium genomes

    Directory of Open Access Journals (Sweden)

    Kistler Corby

    2010-03-01

    Full Text Available Abstract Background Fusarium graminearum (Fg, a major fungal pathogen of cultivated cereals, is responsible for billions of dollars in agriculture losses. There is a growing interest in understanding the transcriptional regulation of this organism, especially the regulation of genes underlying its pathogenicity. The generation of whole genome sequence assemblies for Fg and three closely related Fusarium species provides a unique opportunity for such a study. Results Applying comparative genomics approaches, we developed a computational pipeline to systematically discover evolutionarily conserved regulatory motifs in the promoter, downstream and the intronic regions of Fg genes, based on the multiple alignments of sequenced Fusarium genomes. Using this method, we discovered 73 candidate regulatory motifs in the promoter regions. Nearly 30% of these motifs are highly enriched in promoter regions of Fg genes that are associated with a specific functional category. Through comparison to Saccharomyces cerevisiae (Sc and Schizosaccharomyces pombe (Sp, we observed conservation of transcription factors (TFs, their binding sites and the target genes regulated by these TFs related to pathways known to respond to stress conditions or phosphate metabolism. In addition, this study revealed 69 and 39 conserved motifs in the downstream regions and the intronic regions, respectively, of Fg genes. The top intronic motif is the splice donor site. For the downstream regions, we noticed an intriguing absence of the mammalian and Sc poly-adenylation signals among the list of conserved motifs. Conclusion This study provides the first comprehensive list of candidate regulatory motifs in Fg, and underscores the power of comparative genomics in revealing functional elements among related genomes. The conservation of regulatory pathways among the Fusarium genomes and the two yeast species reveals their functional significance, and provides new insights in their