WorldWideScience

Sample records for integrase reveals key

  1. Comparison Between Several Integrase-defective Lentiviral Vectors Reveals Increased Integration of an HIV Vector Bearing a D167H Mutant

    Directory of Open Access Journals (Sweden)

    Muhammad Qamar Saeed

    2014-01-01

    Full Text Available HIV-1 derived vectors are among the most efficient for gene transduction in mammalian tissues. As the parent virus, they carry out vector genome insertion into the host cell chromatin. Consequently, their preferential integration in transcribed genes raises several conceptual and safety issues. To address part of these questions, HIV-derived vectors have been engineered to be nonintegrating. This was mainly achieved by mutating HIV-1 integrase at functional hotspots of the enzyme enabling the development of streamlined nuclear DNA circles functional for transgene expression. Few integrase mutant vectors have been successfully tested so far for gene transfer. They are cleared with time in mitotic cells, but stable within nondividing retina cells or neurons. Here, we compared six HIV vectors carrying different integrases, either wild type or with different mutations (D64V, D167H, Q168A, K186Q+Q214L+Q216L, and RRK262-264AAH shown to modify integrase enzymatic activity, oligomerization, or interaction with key cellular cofactor of HIV DNA integration as LEDGF/p75 or TNPO3. We show that these mutations differently affect the transduction efficiency as well as rates and patterns of integration of HIV-derived vectors suggesting their different processing in the nucleus. Surprisingly and most interestingly, we report that an integrase carrying the D167H substitution improves vector transduction efficiency and integration in both HEK-293T and primary CD34+ cells.

  2. Comparison of Newly Assembled Full Length HIV-1 Integrase With Prototype Foamy Virus Integrase: Structure-Function Prospective.

    Science.gov (United States)

    Dayer, Mohammad Reza

    2016-05-01

    Drug design against human immunodeficiency virus type 1 (HIV-1) integrase through its mechanistic study is of great interest in the area in biological research. The main obstacle in this area is the absence of the full-length crystal structure for HIV-1 integrase to be used as a model. A complete structure, similar to HIV-1 of a prototype foamy virus integrase in complex with DNA, including all conservative residues, is available and has been extensively used in recent investigations. The aim of this study was to determine whether the above model is precisely representative of HIV-1 integrase. This would critically determine the success of any designed drug using the model in deactivation of integrase and AIDS treatment. Primarily, a new structure for HIV-1 was constructed, using a crystal structure of prototype foamy virus as the starting structure. The constructed structure of HIV-1 integrase was simultaneously simulated with a prototype foamy virus integrase on a separate occasion. Our results indicate that the HIV-1 system behaves differently from the prototype foamy virus in terms of folding, hydration, hydrophobicity of binding site and stability. Based on our findings, we can conclude that HIV-1 integrase is vastly different from the prototype foamy virus integrase and does not resemble it, and the modeling output of the prototype foamy virus simulations could not be simply generalized to HIV-1 integrase. Therefore, our HIV-1 model seems to be more representative and more useful for future research.

  3. Serine integrase chimeras with activity in E. coli and HeLa cells

    Directory of Open Access Journals (Sweden)

    Alfonso P. Farruggio

    2014-09-01

    Full Text Available In recent years, application of serine integrases for genomic engineering has increased in popularity. The factor-independence and unidirectionality of these large serine recombinases makes them well suited for reactions such as site-directed vector integration and cassette exchange in a wide variety of organisms. In order to generate information that might be useful for altering the specificity of serine integrases and to improve their efficiency, we tested a hybridization strategy that has been successful with several small serine recombinases. We created chimeras derived from three characterized members of the serine integrase family, phiC31, phiBT1, and TG1 integrases, by joining their amino- and carboxy-terminal portions. We found that several phiBT1-phiC31 (BC and phiC31-TG1 (CT hybrid integrases are active in E. coli. BC chimeras function on native att-sites and on att-sites that are hybrids between those of the two donor enzymes, while CT chimeras only act on the latter att-sites. A BC hybrid, BC{−1}, was also active in human HeLa cells. Our work is the first to demonstrate chimeric serine integrase activity. This analysis sheds light on integrase structure and function, and establishes a potentially tractable means to probe the specificity of the thousands of putative large serine recombinases that have been revealed by bioinformatics studies.

  4. A historical sketch of the discovery and development of HIV-1 integrase inhibitors.

    Science.gov (United States)

    Savarino, Andrea

    2006-12-01

    The long process of HIV-1 integrase inhibitor discovery and development can be attributed to both the complexity of HIV-1 integration and poor 'integration' of these researches into mainstream investigations on antiretroviral therapy in the mid-1990s. Of note, some fungal extracts investigated during this period contain the beta-hydroxyketo group, later recognised to be a key structural requirement for keto-enol acids (also referred to as diketo acids) and other integrase inhibitors. This review reconstructs (in the general context of the history of AIDS research) the principal steps that led to the integrase inhibitors currently in clinical trials, and discusses possible future directions.

  5. Discovery of small-molecule HIV-1 fusion and integrase inhibitors oleuropein and hydroxytyrosol: Part II. Integrase inhibition

    International Nuclear Information System (INIS)

    Lee-Huang, Sylvia; Huang, Philip Lin; Zhang Dawei; Lee, Jae Wook; Bao Ju; Sun Yongtao; Chang, Young-Tae; Zhang, John; Huang, Paul Lee

    2007-01-01

    We report molecular modeling and functional confirmation of Ole and HT binding to HIV-1 integrase. Docking simulations identified two binding regions for Ole within the integrase active site. Region I encompasses the conserved D64-D116-E152 motif, while region II involves the flexible loop region formed by amino acid residues 140-149. HT, on the other hand, binds to region II. Both Ole and HT exhibit favorable interactions with important amino acid residues through strong H-bonding and van der Waals contacts, predicting integrase inhibition. To test and confirm modeling predictions, we examined the effect of Ole and HT on HIV-1 integrase activities including 3'-processing, strand transfer, and disintegration. Ole and HT exhibit dose-dependent inhibition on all three activities, with EC 50 s in the nanomolar range. These studies demonstrate that molecular modeling of target-ligand interaction coupled with structural-activity analysis should facilitate the design and identification of innovative integrase inhibitors and other therapeutics

  6. Characterization of natural polymorphic sites of the HIV-1 integrase before the introduction of HIV-1 integrase inhibitors in Germany

    Science.gov (United States)

    Meixenberger, Karolin; Pouran Yousef, Kaveh; Somogyi, Sybille; Fiedler, Stefan; Bartmeyer, Barbara; von Kleist, Max; Kücherer, Claudia

    2014-01-01

    Introduction The aim of our study was to analyze the occurrence and evolution of HIV-1 integrase polymorphisms during the HIV-1 epidemic in Germany prior to the introduction of the first integrase inhibitor raltegravir in 2007. Materials and Methods Plasma samples from drug-naïve HIV-1 infected individuals newly diagnosed between 1986 and 2006 were used to determine PCR-based population sequences of the HIV-1 integrase (amino acids 1–278). The HIV-1 subtype was determined using the REGA HIV-1 subtyping tool. We calculated the frequency of amino acids at each position of the HIV-1 integrase in 337 subtype B strains for the time periods 1986–1989, 1991–1994, 1995–1998, 1999–2002, and 2003–2006. Positions were defined as polymorphic if amino acid variation was >1% in any period. Logistic regression was used to identify trends in amino acid variation over time. Resistance-associated mutations were identified according to the IAS 2013 list and the HIVdb, ANRS and GRADE algorithms. Results Overall, 56.8% (158/278) amino acid positions were polymorphic and 15.8% (25/158) of these positions exhibited a significant trend in amino acid variation over time. Proportionately, most polymorphic positions (63.3%, 31/49) were detected in the N-terminal zinc finger domain of the HIV-1 integrase. Motifs and residues essential for HIV-1 integrase activity were little polymorphic, but within the minimal non-specific DNA binding region I220-D270 up to 18.1% amino acid variation was noticed, including four positions with significant amino acid variation over time (S230, D232, D256, A265). No major resistance mutations were identified, and minor resistance mutations were rarely observed without trend over time. E157Q considered by HIVdb, ANRS, and GRADE algorithms was the most frequent resistance-associated polymorphism with an overall prevalence of 2.4%. Conclusions Detailed knowledge of the evolutionary variation of HIV-1 integrase polymorphisms is important to understand

  7. Primary resistance to integrase strand-transfer inhibitors in Europe.

    NARCIS (Netherlands)

    M. Casadellá; P.M. van Ham (Petra); M. Noguera-Julian; A. van Kessel; C. Pou; L.M. Hofstra (Marije); G.A. Metcalf (Ginger A.); F. Garcia; D. Struck (Daniel); I. Alexiev (Ivailo); A.M. Bakken Kran; A.I.M. Hoepelman; L.G. Kostrikis (Leondios); S. Somogyi; K. Liitsola (Kirsi); M. Linka (Marek); C. Nielsen; D. Otelea (Dan); D. Paraskevis (Dimitrios); M. Poljak (Mario); E. Puchhammer-Stöckl (Elisabeth); D. Stanekova (Danica); M. Stanojevic (Maja); K. Van Laethem (Kristel); S. Zidovec Lepej (Snjezana); B. Clotet; C.A.B. Boucher (Charles); R. Paredes (Roger); A.M.J. Wensing (Annemarie)

    2015-01-01

    markdownabstractThe objective of this study was to define the natural genotypic variation of the HIV-1 integrase gene across Europe for epidemiological surveillance of integrase strand-transfer inhibitor (InSTI) resistance. This was a multicentre, cross-sectional study within the European SPREAD

  8. Primary resistance to integrase strand-transfer inhibitors in Europe

    NARCIS (Netherlands)

    Casadella, M.; van Ham, P. M.; Noguera-Julian, M.; van Kessel, A.; Pou, C.; Hofstra, L. M.; Santos, J. R.; Garcia, F.; Struck, D.; Alexiev, I.; Kran, A. M. Bakken; Hoepelman, A. I.; Kostrikis, L. G.; Somogyi, S.; Liitsola, K.; Linka, M.; Nielsen, C.; Otelea, D.; Paraskevis, D.; Poljak, M.; Puchhammer-Stoeckl, E.; Stanekova, D.; Stanojevic, M.; Van Laethem, K.; Lepej, S. Zidovec; Clotet, B.; Boucher, C. A. B.; Paredes, R.; Wensing, A. M. J.; Schuurman, R

    2015-01-01

    Objectives: The objective of this study was to define the natural genotypic variation of the HIV-1 integrase gene across Europe for epidemiological surveillance of integrase strand-transfer inhibitor (InSTI) resistance. Methods: This was a multicentre, cross-sectional study within the European

  9. Thalassiolins A-C: new marine-derived inhibitors of HIV cDNA integrase.

    Science.gov (United States)

    Rowley, David C; Hansen, Mark S T; Rhodes, Denise; Sotriffer, Christoph A; Ni, Haihong; McCammon, J Andrew; Bushman, Frederic D; Fenical, William

    2002-11-01

    Human immunodeficiency virus (HIV) replication requires integration of viral cDNA into the host genome, a process mediated by the viral enzyme integrase. We describe a new series of HIV integrase inhibitors, thalassiolins A-C (1-3), isolated from the Caribbean sea grass Thalassia testudinum. The thalassiolins are distinguished from other flavones previously studied by the substitution of a sulfated beta-D-glucose at the 7-position, a substituent that imparts increased potency against integrase in biochemical assays. The most active of these molecules, thalassiolin A (1), displays in vitro inhibition of the integrase catalyzed strand transfer reaction (IC50=0.4 microM) and an antiviral IC50 of 30 microM. Molecular modeling studies indicate a favorable binding mode is probable at the catalytic core domain of HIV-1 integrase.

  10. Molecular features related to HIV integrase inhibition obtained from structure- and ligand-based approaches.

    Directory of Open Access Journals (Sweden)

    Luciana L de Carvalho

    Full Text Available Among several biological targets to treat AIDS, HIV integrase is a promising enzyme that can be employed to develop new anti-HIV agents. The aim of this work is to propose a mechanistic interpretation of HIV-1 integrase inhibition and to rationalize the molecular features related to the binding affinity of studied ligands. A set of 79 HIV-1 integrase inhibitors and its relationship with biological activity are investigated employing 2D and 3D QSAR models, docking analysis and DFT studies. Analyses of docking poses and frontier molecular orbitals revealed important features on the main ligand-receptor interactions. 2D and 3D models presenting good internal consistency, predictive power and stability were obtained in all cases. Significant correlation coefficients (r(2 = 0.908 and q(2= 0.643 for 2D model; r(2= 0.904 and q(2= 0.719 for 3D model were obtained, indicating the potential of these models for untested compounds. The generated holograms and contribution maps revealed important molecular requirements to HIV-1 IN inhibition and several evidences for molecular modifications. The final models along with information resulting from molecular orbitals, 2D contribution and 3D contour maps should be useful in the design of new inhibitors with increased potency and selectivity within the chemical diversity of the data.

  11. Bovine Lactoferrampin, Human Lactoferricin, and Lactoferrin 1-11 Inhibit Nuclear Translocation of HIV Integrase.

    Science.gov (United States)

    Wang, Winston Yan; Wong, Jack Ho; Ip, Denis Tsz Ming; Wan, David Chi Cheong; Cheung, Randy Chifai; Ng, Tzi Bun

    2016-08-01

    This study aimed to investigate fragments derived from human and bovine lactoferrins for ability to inhibit nuclear translocation of HIV-1 integrase. It was shown that human lactoferricin, human lactoferrin 1-11, and bovine lactoferrampin reduced nuclear distribution of HIV-1 integrase. Bovine lactoferrampin could inhibit both the activity and nuclear translocation of HIV-1 integrase. Human lactoferrampin, bovine lactoferricin, and bovine lactoferrin 1-11 had no effect on HIV-1 integrase nuclear translocation. Human lactoferrampin which inhibited the activity of integrase did not prevent its nuclear translocation. Human lactoferricin and lactoferrin 1-11 did not inhibit HIV-1 integrase nuclear translocation despite their ability to attenuate the enzyme activity. The discrepancy between the findings on reduction of HIV-1 activity and inhibition of nuclear translocation of HIV-1 integrase was due to the different mechanisms involved. A similar reasoning can also be applied to the different inhibitory potencies of the milk peptides on different HIV enzymes, i.e., nuclear translocation.

  12. Tight regulation of the intS gene of the KplE1 prophage: a new paradigm for integrase gene regulation.

    Directory of Open Access Journals (Sweden)

    Gaël Panis

    2010-10-01

    Full Text Available Temperate phages have the ability to maintain their genome in their host, a process called lysogeny. For most, passive replication of the phage genome relies on integration into the host's chromosome and becoming a prophage. Prophages remain silent in the absence of stress and replicate passively within their host genome. However, when stressful conditions occur, a prophage excises itself and resumes the viral cycle. Integration and excision of phage genomes are mediated by regulated site-specific recombination catalyzed by tyrosine and serine recombinases. In the KplE1 prophage, site-specific recombination is mediated by the IntS integrase and the TorI recombination directionality factor (RDF. We previously described a sub-family of temperate phages that is characterized by an unusual organization of the recombination module. Consequently, the attL recombination region overlaps with the integrase promoter, and the integrase and RDF genes do not share a common activated promoter upon lytic induction as in the lambda prophage. In this study, we show that the intS gene is tightly regulated by its own product as well as by the TorI RDF protein. In silico analysis revealed that overlap of the attL region with the integrase promoter is widely encountered in prophages present in prokaryotic genomes, suggesting a general occurrence of negatively autoregulated integrase genes. The prediction that these integrase genes are negatively autoregulated was biologically assessed by studying the regulation of several integrase genes from two different Escherichia coli strains. Our results suggest that the majority of tRNA-associated integrase genes in prokaryotic genomes could be autoregulated and that this might be correlated with the recombination efficiency as in KplE1. The consequences of this unprecedented regulation for excessive recombination are discussed.

  13. HIV-1 integrase inhibitor resistance among treatment naïve patients in the West of Scotland.

    Science.gov (United States)

    Bradley-Stewart, A; Urcia, C; MacLean, A; Aitken, C; Gunson, R

    2017-07-01

    Transmitted integrase inhibitor resistance is rare, with only a small number of cases reported world-wide to date. The aim of this study was to assess whether transmitted integrase inhibitor resistance has occurred in Scotland and if so, could there be a case for performing genotypic integrase resistance testing at baseline. The study population consisted of 106 treatment naïve, newly diagnosed, HIV positive patients. The patient samples were collected between October 2015 and March 2016 at the time of HIV diagnosis and prior to initiation of anti-retroviral therapy. The integrase region was amplified and sequenced. We detected integrase inhibitor resistance (T66I/T) at baseline in one patient sample. This is a non-polymorphic mutation seen in patients receiving elvitegravir which confers high-level resistance to elvitegravir and intermediate resistance to raltegravir. A further 10 patients had accessory mutations which have minimal or no effect on susceptibility to integrase inhibitors. Transmitted integrase inhibitor resistance remains rare. The results of the present study do not support performing integrase resistance testing at baseline. Crown Copyright © 2017. Published by Elsevier B.V. All rights reserved.

  14. Nucleic acid amplification of HIV-1 integrase sequence subtypes CRF01_AE and B for development of HIV anti-integrase drug resistance genotyping assay

    Science.gov (United States)

    Adlar, F. R.; Bela, B.

    2017-08-01

    To anticipate the potential use of anti-integrase drugs in Indonesia for treatment of HIV-1 infection, the development of a drug resistance genotyping assay for anti-integrase is crucial in identifying the genetic drug resistance profile of Indonesian HIV-1 strains. This experiment aimed to amplify a target region in the integrase gene of Indonesian HIV-1 subtypes CRF01_AE and B that contain genetic mutations known to confer resistance to anti-integrase drug. Eleven archived plasma samples from individuals living with HIV-1 were obtained from the Virology and Cancer Pathobiology Research Center for Health Service (VCPRC FKUI-RSCM) laboratory. One of the plasma samples contained HIV-1 subtype B, and the remaining plasma samples contained subtype CRF01_AE. The target regions for all samples were amplified through RT-PCR, with an annealing temperature of 55 °C, using the primer pair AE_POL 4086F and AE_POL 5232R that were designed by VCPRC FKUI-RSCM. The results of this experiment show that 18.2% (2/11) of the samples were successfully amplified using the one-step RT-PCR. While the primer pair was effective in amplifying the target region in the integrase gene sequence for subtype B (100%; 1/1), it had a low efficacy (10%, 1/10) for subtype CRF01_AE. In conclusion, the primer pair can be used to amplify the target region in Indonesian HIV-1 strain subtypes CRF01_AE and B. However, optimization of the PCR condition and an increased number of samples would help to determine an accurate representation of the efficacy of the primer pair.

  15. Inhibition of HIV-1 Integrase gene expression by 10-23 DNAzyme

    Indian Academy of Sciences (India)

    We have designed three novel DNAzymes, DIN54, DIN116, and DIN152, against HIV-1 Integrase gene using Mfold software and evaluated them for target site cleavage activity on the in vitro transcribed mRNA. All DNAzymes were tested for its inhibition of expression of HIV Integrase protein in the transiently transfected cell ...

  16. Integrase of Mason-Pfizer monkey virus

    Czech Academy of Sciences Publication Activity Database

    Snášel, Jan; Krejčík, Zdeněk; Jenčová, Věra; Rosenberg, Ivan; Ruml, Tomáš; Alexandratos, J.; Gustchina, A.; Pichová, Iva

    2005-01-01

    Roč. 272, č. 1 (2005), s. 203-216 ISSN 1742-464X R&D Projects: GA AV ČR(CZ) IAA4055304 Institutional research plan: CEZ:AV0Z4055905 Keywords : integrase * Mason-Pfizer monkey virus * HIV-1 Subject RIV: CE - Biochemistry

  17. A method for producing transgenic cells using a multi-integrase system on a human artificial chromosome vector.

    Directory of Open Access Journals (Sweden)

    Shigeyuki Yamaguchi

    Full Text Available The production of cells capable of expressing gene(s of interest is important for a variety of applications in biomedicine and biotechnology, including gene therapy and animal transgenesis. The ability to insert transgenes at a precise location in the genome, using site-specific recombinases such as Cre, FLP, and ΦC31, has major benefits for the efficiency of transgenesis. Recent work on integrases from ΦC31, R4, TP901-1 and Bxb1 phages demonstrated that these recombinases catalyze site-specific recombination in mammalian cells. In the present study, we examined the activities of integrases on site-specific recombination and gene expression in mammalian cells. We designed a human artificial chromosome (HAC vector containing five recombination sites (ΦC31 attP, R4 attP, TP901-1 attP, Bxb1 attP and FRT; multi-integrase HAC vector and de novo mammalian codon-optimized integrases. The multi-integrase HAC vector has several functions, including gene integration in a precise locus and avoiding genomic position effects; therefore, it was used as a platform to investigate integrase activities. Integrases carried out site-specific recombination at frequencies ranging from 39.3-96.8%. Additionally, we observed homogenous gene expression in 77.3-87.5% of colonies obtained using the multi-integrase HAC vector. This vector is also transferable to another cell line, and is capable of accepting genes of interest in this environment. These data suggest that integrases have high DNA recombination efficiencies in mammalian cells. The multi-integrase HAC vector enables us to produce transgene-expressing cells efficiently and create platform cell lines for gene expression.

  18. A novel function for spumaretrovirus integrase: an early requirement for integrase-mediated cleavage of 2 LTR circles

    Directory of Open Access Journals (Sweden)

    Mouscadet Jean-François

    2005-05-01

    Full Text Available Abstract Retroviral integration is central to viral persistence and pathogenesis, cancer as well as host genome evolution. However, it is unclear why integration appears essential for retrovirus production, especially given the abundance and transcriptional potential of non-integrated viral genomes. The involvement of retroviral endonuclease, also called integrase (IN, in replication steps apart from integration has been proposed, but is usually considered to be accessory. We observe here that integration of a retrovirus from the spumavirus family depends mainly on the quantity of viral DNA produced. Moreover, we found that IN directly participates to linear DNA production from 2-LTR circles by specifically cleaving the conserved palindromic sequence found at LTR-LTR junctions. These results challenge the prevailing view that integrase essential function is to catalyze retroviral DNA integration. Integrase activity upstream of this step, by controlling linear DNA production, is sufficient to explain the absolute requirement for this enzyme. The novel role of IN over 2-LTR circle junctions accounts for the pleiotropic effects observed in cells infected with IN mutants. It may explain why 1 2-LTR circles accumulate in vivo in mutants carrying a defective IN while their linear and integrated DNA pools decrease; 2 why both LTRs are processed in a concerted manner. It also resolves the original puzzle concerning the integration of spumaretroviruses. More generally, it suggests to reassess 2-LTR circles as functional intermediates in the retrovirus cycle and to reconsider the idea that formation of the integrated provirus is an essential step of retrovirus production.

  19. Raltegravir: first in class HIV integrase inhibitor

    Directory of Open Access Journals (Sweden)

    Zelalem Temesgen

    2008-06-01

    Full Text Available Zelalem Temesgen1, Dawd S Siraj21Mayo Clinic, Rochester, MN, USA; 2East Carolina University Greenville, NC, USAAbstract: On October 16, 2007, the US Food and Drug Administration (FDA approved raltegravir for treatment of human immunodeficiency virus (HIV-1 infection in combination with other antiretroviral agents in treatment-experienced adult patients who have evidence of viral replication and HIV-1 strains resistant to multiple antiretroviral agents. Raltegravir is first in a novel class of antiretroviral drugs known as integrase inhibitors. It has demonstrated potent anti HIV activity in both antiretroviral treatment-naïve and experienced patients. The most common adverse events reported with raltegravir during phase 2 and 3 clinical trials were diarrhea, nausea, and headache. Laboratory abnormalities include mild elevations in liver transaminases and creatine phosphokinase.Keywords: raltegravir, HIV, antiretroviral agents, integrase inhibitors

  20. HIV-1 integrase resistance among antiretroviral treatment naive and experienced patients from Northwestern Poland

    Directory of Open Access Journals (Sweden)

    Parczewski Miłosz

    2012-12-01

    Full Text Available Abstract Background HIV integrase inhibitor use is limited by low genetic barrier to resistance and possible cross-resistance among representatives of this class of antiretrovirals. The aim of this study was to analyse integrase sequence variability among antiretroviral treatment naive and experienced patients with no prior integrase inhibitor (InI exposure and investigate development of the InI drug resistance mutations following the virologic failure of the raltegravir containing regimen. Methods Sequencing of HIV-1 integrase region from plasma samples of 80 integrase treatment naive patients and serial samples from 12 patients with observed virologic failure on raltegravir containing treatment whenever plasma vireamia exceeded >50 copies/ml was performed. Drug resistance mutations were called with Stanford DB database and grouped into major and minor variants. For subtyping bootstrapped phylogenetic analysis was used; Bayesian Monte Carlo Marcov Chain (MCMC model was implemented to infer on the phylogenetic relationships between the serial sequences from patients failing on raltegravir. Results Majority of the integrase region sequences were classified as subtype B; the remaining ones being subtype D, C, G, as well as CRF01_AE , CRF02_AG and CRF13_cpx recombinants. No major integrase drug resistance mutations have been observed in InI-treatment naive patients. In 30 (38.5% cases polymorphic variation with predominance of the E157Q mutation was observed. This mutation was more common among subtype B (26 cases, 54.2% than non-B sequences (5 cases, 16.7%, p=0.00099, OR: 5.91 (95% CI:1.77-22.63]. Other variants included L68V, L74IL, T97A, E138D, V151I, R263K. Among 12 (26.1% raltegravir treated patients treatment failure was observed; major InI drug resistance mutations (G140S, Q148H and N155H, V151I, E92EQ, V151I, G163R were noted in four of these cases (8.3% of the total InI-treated patients. Time to the development of drug resistance ranged

  1. Small molecule inhibitors of the LEDGF site of human immunodeficiency virus integrase identified by fragment screening and structure based design.

    Directory of Open Access Journals (Sweden)

    Thomas S Peat

    Full Text Available A fragment-based screen against human immunodeficiency virus type 1 (HIV integrase led to a number of compounds that bound to the lens epithelium derived growth factor (LEDGF binding site of the integrase catalytic core domain. We determined the crystallographic structures of complexes of the HIV integrase catalytic core domain for 10 of these compounds and quantitated the binding by surface plasmon resonance. We demonstrate that the compounds inhibit the interaction of LEDGF with HIV integrase in a proximity AlphaScreen assay, an assay for the LEDGF enhancement of HIV integrase strand transfer and in a cell based assay. The compounds identified represent a potential framework for the development of a new series of HIV integrase inhibitors that do not bind to the catalytic site of the enzyme.

  2. Ethyl malonate amides: a diketo acid offspring fragment for HIV integrase inhibition.

    Science.gov (United States)

    Serafin, Katarzyna; Mazur, Pawel; Bak, Andrzej; Laine, Elodie; Tchertanov, Luba; Mouscadet, Jean-François; Polanski, Jaroslaw

    2011-08-15

    While searching for new HIV integrase inhibitors we discovered that some ethyl malonate amides (EMA) are active against this enzyme. Surprisingly, the main function can only very rarely be found among the reported drug candidates. We synthesised a series of compounds in order to establish and analyse the structure-activity relationship. The similarity to the important classes of HIV integrase inhibitors as well as the synthetic availability of the different targets including this pharmacophore makes EMA compounds an interesting object of investigations. Copyright © 2011 Elsevier Ltd. All rights reserved.

  3. Virus evolution reveals an exclusive role for LEDGF/p75 in chromosomal tethering of HIV.

    Directory of Open Access Journals (Sweden)

    Anneleen Hombrouck

    2007-03-01

    Full Text Available Retroviruses by definition insert their viral genome into the host cell chromosome. Although the key player of retroviral integration is viral integrase, a role for cellular cofactors has been proposed. Lentiviral integrases use the cellular protein LEDGF/p75 to tether the preintegration complex to the chromosome, although the existence of alternative host proteins substituting for the function of LEDGF/p75 in integration has been proposed. Truncation mutants of LEDGF/p75 lacking the chromosome attachment site strongly inhibit HIV replication by competition for the interaction with integrase. In an attempt to select HIV strains that can overcome the inhibition, we now have used T-cell lines that stably express a C-terminal fragment of LEDGF/p75. Despite resistance development, the affinity of integrase for LEDGF/p75 is reduced and replication kinetics in human primary T cells is impaired. Detection of the integrase mutations A128T and E170G at key positions in the LEDGF/p75-integrase interface provides in vivo evidence for previously reported crystallographic data. Moreover, the complementary inhibition by LEDGF/p75 knockdown and mutagenesis at the integrase-LEDGF/p75 interface points to the incapability of HIV to circumvent LEDGF/p75 function during proviral integration. Altogether, the data provide a striking example of the power of viral molecular evolution. The results underline the importance of the LEDGF/p75 HIV-1 interplay as target for innovative antiviral therapy. Moreover, the role of LEDGF/p75 in targeting integration will stimulate research on strategies to direct gene therapy vectors into safe landing sites.

  4. Lack of integrase inhibitors associated resistance mutations among HIV-1C isolates.

    Science.gov (United States)

    Mulu, Andargachew; Maier, Melanie; Liebert, Uwe Gerd

    2015-12-01

    Although biochemical analysis of HIV-1 integrase enzyme suggested the use of integrase inhibitors (INIs) against HIV-1C, different viral subtypes may favor different mutational pathways potentially leading to varying levels of drug resistance. Thus, the aim of this study was to search for the occurrence and natural evolution of integrase polymorphisms and/or resistance mutations in HIV-1C Ethiopian clinical isolates prior to the introduction of INIs. Plasma samples from chronically infected drug naïve patients (N = 45), of whom the PR and RT sequence was determined previously, were used to generate population based sequences of HIV-1 integrase. HIV-1 subtype was determined using the REGA HIV-1 subtyping tool. Resistance mutations were interpreted according to the Stanford HIV drug resistance database ( http://hivdb.stanford.edu ) and the updated International Antiviral Society (IAS)-USA mutation lists. Moreover, rates of polymorphisms in the current isolates were compared with South African and global HIV-1C isolates. All subjects were infected with HIV-1C concordant to the protease (PR) and reverse transcriptase (RT) regions. Neither major resistance-associated IN mutations (T66I/A/K, E92Q/G, T97A, Y143HCR, S147G, Q148H/R/K, and N155H) nor silent mutations known to change the genetic barrier were observed. Moreover, the DDE-catalytic motif (D64G/D116G/E152 K) and signature HHCC zinc-binding motifs at codon 12, 16, 40 and 43 were found to be highly conserved. However, compared to other South African subtype C isolates, the rate of polymorphism was variable at various positions. Although the sample size is small, the findings suggest that this drug class could be effective in Ethiopia and other southern African countries where HIV-1C is predominantly circulating. The data will contribute to define the importance of integrase polymorphism and to improve resistance interpretation algorithms in HIV-1C isolates.

  5. A Mos1 transposase in vivo assay to screen new HIV-1 integrase inhibitors.

    Science.gov (United States)

    Cancian, Mariana; Loreto, Elgion L S

    2018-04-01

    The integrase and transposase enzymes of retrovirus and transposons, respectively, share the catalytic DDE domain. In vitro assays showed that inhibitors of HIV-1 integrase generally inhibit the mariner Mos1 transposase. Using a Drosophila strain in which the mobilisation of the mariner element can be quantified by mosaic eyes, we showed that flies maintained in medium containing 210 µM to 4 mM of raltegravir, or 1 or 2 mM of dolutegravir, which are HIV-1 integrase inhibitor used in AIDS treatment, have 23-33% less somatic mobilisation in mosaic eyes when treated with raltegravir and 28-32% when treated with dolutegravir. The gene expression of the mariner transposase gene, estimated by qPCR, is similar among treated and control flies. The results suggest that in vivo assays using Drosophila can be used as a primary screening of inhibitory drugs for transposase and retroviral integrase. The advantages of this assay are that it is easy, quick, cheap and is an in vivo test, meaning that the tested substance has to have been taken in by cells and has arrived at the target site, which is not the case when in vitro assays are applied.

  6. Molecular dynamics simulation studies of the wild type and E92Q/N155H mutant of Elvitegravir-resistance HIV-1 integrase.

    Science.gov (United States)

    Chen, Qi; Cheng, Xiaolin; Wei, Dongqing; Xu, Qin

    2015-03-01

    Although Elvitegravir (EVG) is a newly developed antiretrovirals drug to treat the acquired immunodeficiency syndrome (AIDS), drug resistance has already been found in clinic, such as E92Q/N155H and Q148H/G140S. Several structural investigations have already been reported to reveal the molecular mechanism of the drug resistance. As full length crystal structure for HIV-1 integrase is still unsolved, we herein use the crystal structure of the full length prototype foamy virus (PFV) in complex with virus DNA and inhibitor Elvitegravir as a template to construct the wild type and E92Q/N155H mutant system of HIV-1 integrase. Molecular dynamic simulations was used to revel the binding mode and the drug resistance of the EVG ligand in E92Q/N155H. Several important interactions were discovered between the mutated residues and the residues in the active site of the E92Q/N155H double mutant pattern, and cross correlation and clustering methods were used for detailed analysis. The results from the MD simulation studies will be used to guide the experimental efforts of developing novel inhibitors against drug-resistant HIV integrase mutants.

  7. Developing a Dynamic Pharmacophore Model for HIV-1 Integrase

    International Nuclear Information System (INIS)

    Carlson, Heather A.; Masukawa, Keven M.; Rubins, Kathleen; Bushman, Frederic; Jorgensen, William L.; Lins, Roberto; Briggs, James; Mccammon, Andy

    2000-01-01

    We present the first receptor-based pharmacophore model for HIV-1 integrase. The development of ''dynamic'' pharmacophore models is a new method that accounts for the inherent flexibility of the active site and aims to reduce the entropic penalties associated with binding a ligand. Furthermore, this new drug discovery method overcomes the limitation of an incomplete crystal structure of the target protein. A molecular dynamics (MD) simulation describes the flexibility of the uncomplexed protein. Many conformational models of the protein are saved from the MD simulations and used in a series of multi-unit search for interacting conformers (MUSIC) simulations. MUSIC is a multiple-copy minimization method, available in the BOSS program; it is used to determine binding regions for probe molecules containing functional groups that complement the active site. All protein conformations from the MD are overlaid, and conserved binding regions for the probe molecules are identified. Those conserved binding regions define the dynamic pharmacophore model. Here, the dynamic model is compared to known inhibitors of the integrase as well as a three-point, ligand-based pharmacophore model from the literature. Also, a ''static'' pharmacophore model was determined in the standard fashion, using a single crystal structure. Inhibitors thought to bind in the active site of HIV-1 integrase fit the dynamic model but not the static model. Finally, we have identified a set of compounds from the Available Chemicals Directory that fit the dynamic pharmacophore model, and experimental testing of the compounds has confirmed several new inhibitors

  8. Structural and Functional Insights into Foamy Viral Integrase

    Directory of Open Access Journals (Sweden)

    Cha-Gyun Shin

    2013-07-01

    Full Text Available Successful integration of retroviral DNA into the host chromosome is an essential step for viral replication. The process is mediated by virally encoded integrase (IN and orchestrated by 3'-end processing and the strand transfer reaction. In vitro reaction conditions, such as substrate specificity, cofactor usage, and cellular binding partners for such reactions by the three distinct domains of prototype foamy viral integrase (PFV-IN have been described well in several reports. Recent studies on the three‑dimensional structure of the interacting complexes between PFV-IN and DNA, cofactors, binding partners, or inhibitors have explored the mechanistic details of such interactions and shown its utilization as an important target to develop anti-retroviral drugs. The presence of a potent, non-transferable nuclear localization signal in the PFV C-terminal domain extends its use as a model for investigating cellular trafficking of large molecular complexes through the nuclear pore complex and also to identify novel cellular targets for such trafficking. This review focuses on recent advancements in the structural analysis and in vitro functional aspects of PFV-IN.

  9. In vivo and in vitro characterization of site-specific recombination of a novel serine integrase from the temperate phage EFC-1

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Bohyun; Kim, Inki; Nam, Ja-Ae [Asan Institute for Life Sciences, Asan Medical Center, College of Medicine, University of Ulsan, 86 Asanbyeoungwon-gil, Songpa-gu, Seoul 138-736 (Korea, Republic of); Chang, Hyo-Ihl [College of Life Sciences & Biotechnology, Korea University, 5-1 Anam-dong, Seongbuk-gu, Seoul 136-701 (Korea, Republic of); Ha, Chang Hoon, E-mail: chhoonha@amc.seoul.kr [Asan Institute for Life Sciences, Asan Medical Center, College of Medicine, University of Ulsan, 86 Asanbyeoungwon-gil, Songpa-gu, Seoul 138-736 (Korea, Republic of)

    2016-04-22

    EFC-1 integrase is a site-specific recombinase that belongs to the large family of serine recombinase. In previously study, we isolated the temperate phage EFC-1, and characterized its genomic sequence. Within its genome, Orf28 was predicted encode a 464 amino acid of a putative integrase gene. In this study, EFC-1 integrase was characterized in vitro and in vivo. In vitro assay was performed using purified His-tag fusion integrase. Also, to identify which serine is involved in the catalytic domain, we used site-directed mutagenesis and analyzed by a recombination assay in vitro. In vivo assay involved PCR and confocal microscopy in HEK293 cells, and determined the minimal lengths of attP and attB sites. According to our results, the EFC-1 integrase-mediated recombination was site-specific and unidirectional system in vitro and in vivo. Serine 21 of EFC-1 integrase plays a major role in the catalytic domain, and minimal sizes of attB and attP was defined 48 and 54 bp. Our finding may help develop a useful tool for gene therapy and gene delivery system. - Highlights: • EFC-1 integrase-mediated recombination was site-specific and unidirectional system. • Serine 21 of EFC-1 integrase plays a major role in the catalytic domain. • The functional minimal sizes of attB and attP was defined 48 and 54 bp.

  10. In vivo and in vitro characterization of site-specific recombination of a novel serine integrase from the temperate phage EFC-1

    International Nuclear Information System (INIS)

    Yoon, Bohyun; Kim, Inki; Nam, Ja-Ae; Chang, Hyo-Ihl; Ha, Chang Hoon

    2016-01-01

    EFC-1 integrase is a site-specific recombinase that belongs to the large family of serine recombinase. In previously study, we isolated the temperate phage EFC-1, and characterized its genomic sequence. Within its genome, Orf28 was predicted encode a 464 amino acid of a putative integrase gene. In this study, EFC-1 integrase was characterized in vitro and in vivo. In vitro assay was performed using purified His-tag fusion integrase. Also, to identify which serine is involved in the catalytic domain, we used site-directed mutagenesis and analyzed by a recombination assay in vitro. In vivo assay involved PCR and confocal microscopy in HEK293 cells, and determined the minimal lengths of attP and attB sites. According to our results, the EFC-1 integrase-mediated recombination was site-specific and unidirectional system in vitro and in vivo. Serine 21 of EFC-1 integrase plays a major role in the catalytic domain, and minimal sizes of attB and attP was defined 48 and 54 bp. Our finding may help develop a useful tool for gene therapy and gene delivery system. - Highlights: • EFC-1 integrase-mediated recombination was site-specific and unidirectional system. • Serine 21 of EFC-1 integrase plays a major role in the catalytic domain. • The functional minimal sizes of attB and attP was defined 48 and 54 bp.

  11. Molecular dynamics simulation studies of the wild type and E92Q/N155H mutant of Elvitegravir-resistance HIV-1 integrase

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Qi [Shanghai Jiao Tong Univ., Shanghai (China). State Key Lab. of Microbial Metabolism and College of Life Science and Biotechnology; Cheng, Xiaolin [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Center for Molecular Biophysics; Univ. of Tennessee, Knoxville, TN (United States). Dept. of Biochemistry and Cellular and Molecular Biology; Wei, Dongqing [Shanghai Jiao Tong Univ., Shanghai (China). State Key Lab. of Microbial Metabolism and College of Life Science and Biotechnology; Xu, Qin [Shanghai Jiao Tong Univ., Shanghai (China). State Key Lab. of Microbial Metabolism and College of Life Science and Biotechnology

    2014-11-06

    Although Elvitegravir (EVG) is a newly developed antiretrovirals drug to treat the acquired immunodeficiency syndrome (AIDS), drug resistance has already been found in clinic, such as E92Q/N155H and Q148H/G140S. Several structural investigations have already been reported to reveal the molecular mechanism of the drug resistance. As full length crystal structure for HIV-1 integrase is still unsolved, we use in this paper the crystal structure of the full length prototype foamy virus (PFV) in complex with virus DNA and inhibitor Elvitegravir as a template to construct the wild type and E92Q/N155H mutant system of HIV-1 integrase. Molecular dynamic simulations was used to revel the binding mode and the drug resistance of the EVG ligand in E92Q/N155H. Several important interactions were discovered between the mutated residues and the residues in the active site of the E92Q/N155H double mutant pattern, and cross correlation and clustering methods were used for detailed analysis. The results from the MD simulation studies will be used to guide the experimental efforts of developing novel inhibitors against drug-resistant HIV integrase mutants.

  12. Nanobody-based chimeric receptor gene integration in Jurkat cells mediated by PhiC31 integrase

    International Nuclear Information System (INIS)

    Iri-Sofla, Farnoush Jafari; Rahbarizadeh, Fatemeh; Ahmadvand, Davoud; Rasaee, Mohammad J.

    2011-01-01

    The crucial role of T lymphocytes in anti-tumor immunity has led to the development of novel strategies that can target and activate T cells against tumor cells. Recombinant DNA technology has been used to generate non-MHC-restricted chimeric antigen receptors (CARs). Here, we constructed a panel of recombinant CAR that harbors the anti-MUC1 nanobody and the signaling and co-signaling moieties (CD3ζ/CD28) with different spacer regions derived from human IgG3 with one or two repeats of the hinge sequence or the hinge region of FcγRII. The PhiC31 integrase system was employed to investigate if the recombination efficiency could be recruited for high and stable expression of T cell chimeric receptor genes. The effect of nuclear localization signal (NLS) and two different promoters (CMV and CAG) on efficacy of PhiC31 integrase in human T cell lines was evaluated. The presence of integrase in combination with NLS, mediated up to 7.6 and 8.5 fold increases in CAR expression in ZCHN-attB and ZCHHN-attB cassette integrated T cells, respectively. Our results showed that highly efficient and stable transduction of the Jurkat cell line by PhiC31 integrase is a feasible modality for generating anti-cancer chimeric T cells for use in cancer immunotherapy.

  13. Nanobody-based chimeric receptor gene integration in Jurkat cells mediated by PhiC31 integrase

    Energy Technology Data Exchange (ETDEWEB)

    Iri-Sofla, Farnoush Jafari [Department of Medical Biotechnology, Faculty of Medical Sciences, Tarbiat Modares University, Tehran (Iran, Islamic Republic of); Rahbarizadeh, Fatemeh, E-mail: rahbarif@modares.ac.ir [Department of Medical Biotechnology, Faculty of Medical Sciences, Tarbiat Modares University, Tehran (Iran, Islamic Republic of); Ahmadvand, Davoud [Center of Pharmaceutical Nanotechnology and Nanotoxicology, Department of Pharmaceutics and Analytical Chemistry, University of Copenhagen, Universitetsparken 2, DK-2100 Copenhagen O (Denmark); Rasaee, Mohammad J. [Department of Medical Biotechnology, Faculty of Medical Sciences, Tarbiat Modares University, Tehran (Iran, Islamic Republic of)

    2011-11-01

    The crucial role of T lymphocytes in anti-tumor immunity has led to the development of novel strategies that can target and activate T cells against tumor cells. Recombinant DNA technology has been used to generate non-MHC-restricted chimeric antigen receptors (CARs). Here, we constructed a panel of recombinant CAR that harbors the anti-MUC1 nanobody and the signaling and co-signaling moieties (CD3{zeta}/CD28) with different spacer regions derived from human IgG3 with one or two repeats of the hinge sequence or the hinge region of Fc{gamma}RII. The PhiC31 integrase system was employed to investigate if the recombination efficiency could be recruited for high and stable expression of T cell chimeric receptor genes. The effect of nuclear localization signal (NLS) and two different promoters (CMV and CAG) on efficacy of PhiC31 integrase in human T cell lines was evaluated. The presence of integrase in combination with NLS, mediated up to 7.6 and 8.5 fold increases in CAR expression in ZCHN-attB and ZCHHN-attB cassette integrated T cells, respectively. Our results showed that highly efficient and stable transduction of the Jurkat cell line by PhiC31 integrase is a feasible modality for generating anti-cancer chimeric T cells for use in cancer immunotherapy.

  14. [Isolation, idetification and anti-HIV-1 integrase activity of culturable endophytic fungi from Tibetan medicinal plant Phlomis younghusbandii Mukerjee].

    Science.gov (United States)

    Zhang, Da-Wei; Zhao, Ming-Ming; Chen, Juan; Li, Chao; Guo, Shun-Xing

    2013-05-01

    A total of 52 endophytic fungi were isolated from roots and stems of Tibetan medicinal plant Phlomis younghusbandii Mukerjee. These fungal isolates were molecularly identified based on ITS sequnces and 28S sequences distributed to 12 genera, including Phoma, Chaetosphaeronema, Fusarium and Leptosphaeria, etc. Among them, the dominant genus was Phoma. Extracts of all strains were evaluated for anti-HIV-1 integrase activity by using soluable integrase expressed in E. coli BL21 (DE3). The results showed that seven samples from five fungal endophytes PHY-24, PHY-38, PHY-40, PHY-51, PHY-53, which belonged to genus Chaetosphaeronema, inhibited strand transfer reaction catalyzed by HIV-1 integrase with IC50 values, of 6.60, 5.20, 2.86, 7.86, 4.47, 4.56 and 3.23 microg x mL(-1) respectively. In conclusion, the endophytic fungi of Phlomis younghusbandii Mukerjee are valuable for further screening anti-HIV-1 integrase agents.

  15. Impact of hydrodynamic injection and phiC31 integrase on tumor latency in a mouse model of MYC-induced hepatocellular carcinoma.

    Directory of Open Access Journals (Sweden)

    Lauren E Woodard

    2010-06-01

    Full Text Available Hydrodynamic injection is an effective method for DNA delivery in mouse liver and is being translated to larger animals for possible clinical use. Similarly, phiC31 integrase has proven effective in mediating long-term gene therapy in mice when delivered by hydrodynamic injection and is being considered for clinical gene therapy applications. However, chromosomal aberrations have been associated with phiC31 integrase expression in tissue culture, leading to questions about safety.To study whether hydrodynamic delivery alone, or in conjunction with delivery of phiC31 integrase for long-term transgene expression, could facilitate tumor formation, we used a transgenic mouse model in which sustained induction of the human C-MYC oncogene in the liver was followed by hydrodynamic injection. Without injection, mice had a median tumor latency of 154 days. With hydrodynamic injection of saline alone, the median tumor latency was significantly reduced, to 105 days. The median tumor latency was similar, 106 days, when a luciferase donor plasmid and backbone plasmid without integrase were administered. In contrast, when active or inactive phiC31 integrase and donor plasmid were supplied to the mouse liver, the median tumor latency was 153 days, similar to mice receiving no injection.Our data suggest that phiC31 integrase does not facilitate tumor formation in this C-MYC transgenic mouse model. However, in groups lacking phiC31 integrase, hydrodynamic injection appeared to contribute to C-MYC-induced hepatocellular carcinoma in adult mice. Although it remains to be seen to what extent these findings may be extrapolated to catheter-mediated hydrodynamic delivery in larger species, they suggest that caution should be used during translation of hydrodynamic injection to clinical applications.

  16. Novel Bifunctional Quinolonyl Diketo Acid Derivatives as HIV-1 Integrase Inhibitors: Design, Synthesis, Biological Activities and Mechanism of Action

    Science.gov (United States)

    Di Santo, Roberto; Costi, Roberta; Roux, Alessandra; Artico, Marino; Lavecchia, Antonio; Marinelli, Luciana; Novellino, Ettore; Palmisano, Lucia; Andreotti, Mauro; Amici, Roberta; Galluzzo, Clementina Maria; Nencioni, Lucia; Palamara, Anna Teresa; Pommier, Yves; Marchand, Christophe

    2008-01-01

    The virally encoded integrase protein is an essential enzyme in the life cycle of the HIV-1 virus and represents an attractive and validated target in the development of therapeutics against HIV infection. Drugs that selectively inhibit this enzyme, when used in combination with inhibitors of reverse transcriptase and protease, are believed to be highly effective in suppressing the viral replication. Among the HIV-1 integrase inhibitors, the β-diketo acids (DKAs) represent a major lead for anti-HIV-1drug development. In this study, novel bifunctional quinolonyl diketo acid derivatives were designed, synthesized and tested for their inhibitory ability against HIV-1 integrase. The compounds are potent inhibitors of integrase activity. Particularly, derivative 8 is a potent IN inhibitor for both steps of the reaction (3′-processing and strand transfer) and exhibits both high antiviral activity against HIV-1 infected cells and low cytotoxicity. Molecular modeling studies provide a plausible mechanism of action, which is consistent with ligand SARs and enzyme photo-crosslinking experiments. PMID:16539381

  17. Efficient site-specific integration in Plasmodium falciparum chromosomes mediated by mycobacteriophage Bxb1 integrase.

    Science.gov (United States)

    Nkrumah, Louis J; Muhle, Rebecca A; Moura, Pedro A; Ghosh, Pallavi; Hatfull, Graham F; Jacobs, William R; Fidock, David A

    2006-08-01

    Here we report an efficient, site-specific system of genetic integration into Plasmodium falciparum malaria parasite chromosomes. This is mediated by mycobacteriophage Bxb1 integrase, which catalyzes recombination between an incoming attP and a chromosomal attB site. We developed P. falciparum lines with the attB site integrated into the glutaredoxin-like cg6 gene. Transfection of these attB(+) lines with a dual-plasmid system, expressing a transgene on an attP-containing plasmid together with a drug resistance gene and the integrase on a separate plasmid, produced recombinant parasites within 2 to 4 weeks that were genetically uniform for single-copy plasmid integration. Integrase-mediated recombination resulted in proper targeting of parasite proteins to intra-erythrocytic compartments, including the apicoplast, a plastid-like organelle. Recombinant attB x attP parasites were genetically stable in the absence of drug and were phenotypically homogeneous. This system can be exploited for rapid genetic integration and complementation analyses at any stage of the P. falciparum life cycle, and it illustrates the utility of Bxb1-based integrative recombination for genetic studies of intracellular eukaryotic organisms.

  18. Development of a novel in vitro assay for the evaluation of integron DNA integrase activity

    Directory of Open Access Journals (Sweden)

    Fatemeh Tohidi

    2016-05-01

    Full Text Available Integrons play an important role in multidrug resistance. The integron platform codes for integrase (intI that is required for gene cassette integration through site-specific recombination. The recombination crossover occurs between the G and TT nucleotides in non-palindromic attI and palindromic attC sites. The aim of this study was to establish an efficient in vitro assay for integrase purification and activity detection. To this end, the intI gene was cloned into the pET-22b plasmid. Then, the resulting recombinant plasmid was transformed into Escherichia coli Origami™ strain. The recombinant protein expression was confirmed by sodium dodecyl sulphate-polyacrylamide gel electrophoresis (SDS-PAGE and western blot assays. The recombinant intI protein was purified by nickel–nitrilotriacetic acid (Ni–NTA affinity chromatography, and its activity was measured by a newly introduced assay. Briefly, specific primers for each side of attI and attC were used, thereby, a polymerase chain reaction would be performed, if a fused plasmid containing both attI and attC sites was created upon recombination. SDS-PAGE and western blotting confirmed the presence of a 38-kDa recombinant protein. Optimum conditions were established for the measurement of the integrase activity and a new model assay was conducted to analyse the recombination activity in vitro. Although the electrophoretic mobility shift assay is an efficient and reliable method, the newly introduced assay provided new or enhanced capability to determine the integrase activity, suggesting that there is no need for expensive and advanced equipment.

  19. Postexposure protection of macaques from vaginal SHIV infection by topical integrase inhibitors.

    Science.gov (United States)

    Dobard, Charles; Sharma, Sunita; Parikh, Urvi M; West, Rolieria; Taylor, Andrew; Martin, Amy; Pau, Chou-Pong; Hanson, Debra L; Lipscomb, Jonathan; Smith, James; Novembre, Francis; Hazuda, Daria; Garcia-Lerma, J Gerardo; Heneine, Walid

    2014-03-12

    Coitally delivered microbicide gels containing antiretroviral drugs are important for HIV prevention. However, to date, microbicides have contained entry or reverse transcriptase inhibitors that block early steps in virus infection and thus need to be given as a preexposure dose that interferes with sexual practices and may limit compliance. Integrase inhibitors block late steps after virus infection and therefore are more suitable for post-coital dosing. We first determined the kinetics of strand transfer in vitro and confirmed that integration begins about 6 hours after infection. We then used a repeat-challenge macaque model to assess efficacy of vaginal gels containing integrase strand transfer inhibitors when applied before or after simian/human immunodeficiency virus (SHIV) challenge. We showed that gel containing the strand transfer inhibitor L-870812 protected two of three macaques when applied 30 min before SHIV challenge. We next evaluated the efficacy of 1% raltegravir gel and demonstrated its ability to protect macaques when applied 3 hours after SHIV exposure (five of six protected; P infections showed no evidence of drug resistance in plasma or vaginal secretions despite continued gel dosing after infection. We documented rapid vaginal absorption reflecting a short pharmacological lag time and noted that vaginal, but not plasma, virus load was substantially reduced in the breakthrough infection after raltegravir gel treatment. We provide a proof of concept that topically applied integrase inhibitors protect against vaginal SHIV infection when administered shortly before or 3 hours after virus exposure.

  20. Sketching the historical development of pyrimidones as the inhibitors of the HIV integrase

    Czech Academy of Sciences Publication Activity Database

    Patel, Rahul V.; Keum, Y.S.; Park, S.W.

    2015-01-01

    Roč. 97, JUN 5 (2015), s. 649-663 ISSN 0223-5234 Institutional support: RVO:61389030 Keywords : Pyrimidones * Anti-HIV * Integrase inhibitors Subject RIV: CE - Biochemistry Impact factor: 3.902, year: 2015

  1. The allosteric HIV-1 integrase inhibitor BI-D affects virion maturation but does not influence packaging of a functional RNA genome

    NARCIS (Netherlands)

    van Bel, Nikki; van der Velden, Yme; Bonnard, Damien; Le Rouzic, Erwann; Das, Atze T.; Benarous, Richard; Berkhout, Ben

    2014-01-01

    The viral integrase (IN) is an essential protein for HIV-1 replication. IN inserts the viral dsDNA into the host chromosome, thereby aided by the cellular co-factor LEDGF/p75. Recently a new class of integrase inhibitors was described: allosteric IN inhibitors (ALLINIs). Although designed to

  2. Cancer-specific binary expression system activated in mice by bacteriophage HK022 Integrase

    DEFF Research Database (Denmark)

    Elias, Amer; Spector, Itay; Sogolovsky-Bard, Ilana

    2016-01-01

    Binary systems based on site-specific recombination have been used for tumor specific transcription targeting of suicide genes in animal models. In these binary systems a site specific recombinase or integrase that is expressed from a tumor specific promoter drives tumor specific expression of a ...

  3. Lead Screening for HIV-1 Integrase (IN Inhibited by Traditional Chinese Medicine

    Directory of Open Access Journals (Sweden)

    Tzu-Chieh Hung

    2014-01-01

    Full Text Available Human immunodeficiency virus causes the acquired immunodeficiency syndrome (AIDS and becomes a serious world-wide problem because of this disease's rapid propagation and incurability. Integrase strand transfer inhibitors (INSTIs supports HIV have rapid drug resistance for antitreatment. Screening the traditional Chinese medicine (TCM database by simulating molecular docking and molecular dynamics may select molecular compounds to inhibit INSTIs against HIV drug resistance. (S-cathinone and (1S,2S-norpseudoephedrine are selected based on structure and ligand-based drugs are designed and then get higher bioactivity predicted score from SVM than Raltegravir and other TCM compounds. The molecular dynamics are helpful in the analysis and detection of protein-ligand interactions. According to the docking poses, hydrophobic interactions and hydrogen bond variations define the main regions of important amino acids in integrase. In addition to the detection of TCM compound efficacy, we suggest (1S,2S-norpseudoephedrine is better than the others based on the analysis of interaction and the effect on the structural variation.

  4. Real-time monitoring of disintegration activity of catalytic core domain of HIV-1 integrase using molecular beacon.

    Science.gov (United States)

    Zhang, Da-wei; Zhao, Ming-ming; He, Hong-qiu; Guo, Shun-xing

    2013-09-15

    HIV-1 integrase, an essential enzyme for retroviral replication, is a validated target for anti-HIV therapy development. The catalytic core domain of integrase (IN-CCD) is capable of catalyzing disintegration reaction. In this work, a hairpin-shaped disintegration substrate was designed and validated by enzyme-linked immunosorbent assay; a molecular beacon-based assay was developed for disintegration reaction of IN-CCD. Results showed that the disintegration substrate could be recognized and catalyzed by IN-CCD, and the disintegration reaction can be monitored according to the increase of fluorescent signal. The assay can be applied to real-time detection of disintegration with advantages of simplicity, high sensitivity, and excellent specificity. Copyright © 2013 Elsevier Inc. All rights reserved.

  5. Resistance to pyridine-based inhibitor KF116 reveals an unexpected role of integrase in HIV-1 Gag-Pol polyprotein proteolytic processing.

    Science.gov (United States)

    Hoyte, Ashley C; Jamin, Augusta V; Koneru, Pratibha C; Kobe, Matthew J; Larue, Ross C; Fuchs, James R; Engelman, Alan N; Kvaratskhelia, Mamuka

    2017-12-01

    The pyridine-based multimerization selective HIV-1 integrase (IN) inhibitors (MINIs) are a distinct subclass of allosteric IN inhibitors. MINIs potently inhibit HIV-1 replication during virion maturation by inducing hyper- or aberrant IN multimerization but are largely ineffective during the early steps of viral replication. Here, we investigated the mechanism for the evolution of a triple IN substitution (T124N/V165I/T174I) that emerges in cell culture with a representative MINI, KF116. We show that HIV-1 NL4-3(IN T124N/V165I/T174I) confers marked (>2000-fold) resistance to KF116. Two IN substitutions (T124N/T174I) directly weaken inhibitor binding at the dimer interface of the catalytic core domain but at the same time markedly impair HIV-1 replication capacity. Unexpectedly, T124N/T174I IN substitutions inhibited proteolytic processing of HIV-1 polyproteins Gag and Gag-Pol, resulting in immature virions. Strikingly, the addition of the third IN substitution (V165I) restored polyprotein processing, virus particle maturation, and significant levels of replication capacity. These results reveal an unanticipated role of IN for polyprotein proteolytic processing during virion morphogenesis. The complex evolutionary pathway for the emergence of resistant viruses, which includes the need for the compensatory V165I IN substitution, highlights a relatively high genetic barrier exerted by MINI KF116. Additionally, we have solved the X-ray structure of the drug-resistant catalytic core domain protein, which provides means for rational development of second-generation MINIs. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.

  6. Cloning, purification and structure determination of the HIV integrase-binding domain of lens epithelium-derived growth factor.

    Science.gov (United States)

    Hannon, Clare; Cruz-Migoni, Abimael; Platonova, Olga; Owen, Robin L; Nettleship, Joanne E; Miller, Ami; Carr, Stephen B; Harris, Gemma; Rabbitts, Terence H; Phillips, Simon E V

    2018-03-01

    Lens epithelium-derived growth factor (LEDGF)/p75 is the dominant binding partner of HIV-1 integrase in human cells. The crystal structure of the HIV integrase-binding domain (IBD) of LEDGF has been determined in the absence of ligand. IBD was overexpressed in Escherichia coli, purified and crystallized by sitting-drop vapour diffusion. X-ray diffraction data were collected at Diamond Light Source to a resolution of 2.05 Å. The crystals belonged to space group P2 1 , with eight polypeptide chains in the asymmetric unit arranged as an unusual octamer composed of four domain-swapped IBD dimers. IBD exists as a mixture of monomers and dimers in concentrated solutions, but the dimers are unlikely to be biologically relevant.

  7. HIV-2 integrase polymorphisms and longitudinal genotypic analysis of HIV-2 infected patients failing a raltegravir-containing regimen.

    Science.gov (United States)

    Cavaco-Silva, Joana; Abecasis, Ana; Miranda, Ana Cláudia; Poças, José; Narciso, Jorge; Águas, Maria João; Maltez, Fernando; Almeida, Isabel; Germano, Isabel; Diniz, António; Gonçalves, Maria de Fátima; Gomes, Perpétua; Cunha, Celso; Camacho, Ricardo Jorge

    2014-01-01

    To characterize the HIV-2 integrase gene polymorphisms and the pathways to resistance of HIV-2 patients failing a raltegravir-containing regimen, we studied 63 integrase strand transfer inhibitors (INSTI)-naïve patients, and 10 heavily pretreated patients exhibiting virological failure while receiving a salvage raltegravir-containing regimen. All patients were infected by HIV-2 group A. 61.4% of the integrase residues were conserved, including the catalytic motif residues. No INSTI-major resistance mutations were detected in the virus population from naïve patients, but two amino acids that are secondary resistance mutations to INSTIs in HIV-1 were observed. The 10 raltegravir-experienced patients exhibited resistance mutations via three main genetic pathways: N155H, Q148R, and eventually E92Q - T97A. The 155 pathway was preferentially used (7/10 patients). Other mutations associated to raltegravir resistance in HIV-1 were also observed in our HIV-2 population (V151I and D232N), along with several novel mutations previously unreported. Data retrieved from this study should help build a more robust HIV-2-specific algorithm for the genotypic interpretation of raltegravir resistance, and contribute to improve the clinical monitoring of HIV-2-infected patients.

  8. Metagenomic exploration reveals a marked change in the river resistome and mobilome after treated wastewater discharges.

    Science.gov (United States)

    Lekunberri, Itziar; Balcázar, José Luis; Borrego, Carles M

    2018-03-01

    Mobile genetic elements (MGEs) are key agents in the spread of antibiotic resistance genes (ARGs) across environments. Here we used metagenomics to compare the river resistome (collection of all ARGs) and mobilome (e.g., integrases, transposases, integron integrases and insertion sequence common region "ISCR" elements) between samples collected upstream (n = 6) and downstream (n = 6) of an urban wastewater treatment plant (UWWTP). In comparison to upstream metagenomes, downstream metagenomes showed a drastic increase in the abundance of ARGs, as well as markers of MGEs, particularly integron integrases and ISCR elements. These changes were accompanied by a concomitant prevalence of 16S rRNA gene signatures of bacteria affiliated to families encompassing well-known human and animal pathogens. Our results confirm that chronic discharges of treated wastewater severely impact the river resistome affecting not only the abundance and diversity of ARGs but also their potential spread by enriching the river mobilome in a wide variety of MGEs. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Raltegravir, elvitegravir, and metoogravir: the birth of "me-too" HIV-1 integrase inhibitors

    Directory of Open Access Journals (Sweden)

    Neamati Nouri

    2009-04-01

    Full Text Available Abstract Correction to Erik Serrao, Srinivas Odde, Kavya Ramkumar and Nouri Neamati: Raltegravir, elvitegravir, and metoogravir: the birth of "me-too" HIV-1 integrase inhibitors. Retrovirology 2009, 6:25. Since the recent publication of our article (Neamati, Retrovirology 2009, 6:25, we have noticed an error which we would like to correct and we would like to apologise to the readers for this mistake.

  10. Next-generation site-directed transgenesis in the malaria vector mosquito Anopheles gambiae: self-docking strains expressing germline-specific phiC31 integrase.

    Directory of Open Access Journals (Sweden)

    Janet M Meredith

    Full Text Available Diseases transmitted by mosquitoes have a devastating impact on global health and the situation is complicated due to difficulties with both existing control measures and the impact of climate change. Genetically modified mosquitoes that are refractory to disease transmission are seen as having great potential in the delivery of novel control strategies. The Streptomyces phage phiC31 integrase system has been successfully adapted for site-directed transgene integration in a range of insects, thus overcoming many limitations due to size constraints and random integration associated with transposon-mediated transformation. Using this technology, we previously published the first site-directed transformation of Anopheles gambiae, the principal vector of human malaria. Mosquitoes were initially engineered to incorporate the phiC31 docking site at a defined genomic location. A second phase of genetic modification then achieved site-directed integration of an anti-malarial effector gene. In the current publication we report improved efficiency and utility of the phiC31 integrase system following the generation of Anopheles gambiae self-docking strains. Four independent strains, with docking sites at known locations on three different chromosome arms, were engineered to express integrase under control of the regulatory regions of the nanos gene from Anopheles gambiae. The resulting protein accumulates in the posterior oocyte to provide integrase activity at the site of germline development. Two self-docking strains, exhibiting significantly different levels of integrase expression, were assessed for site-directed transgene integration and found to demonstrate greatly improved survival and efficiency of transformation. In the fight against malaria, it is imperative to establish a broad repertoire of both anti-malarial effector genes and tissue-specific promoters to regulate their expression, enabling those offering maximum effect with minimum fitness

  11. Contribution of HIV minority variants to drug resistance in an integrase strand transfer inhibitor-based therapy

    Czech Academy of Sciences Publication Activity Database

    Weber, Jan; Gibson, R. M.; Meyer, A. M.; Winner, D.; Robertson, D. L.; Miller, M. D.; Quinones-Mateu, M. E.

    2013-01-01

    Roč. 18, Suppl. 1 (2013), A66-A66 ISSN 1359-6535. [International Workshop on HIV & Hepatitis Virus Drug Resistance Curative Strategies. 04.06.2013-08.06.2013, Toronto] Institutional support: RVO:61388963 Keywords : HIV minority variants * integrase inhibitor * replicative fitness Subject RIV: CE - Biochemistry

  12. Discovery of small-molecule HIV-1 fusion and integrase inhibitors oleuropein and hydroxytyrosol: Part I. Integrase inhibition

    International Nuclear Information System (INIS)

    Lee-Huang, Sylvia; Huang, Philip Lin; Zhang Dawei; Lee, Jae Wook; Bao Ju; Sun Yongtao; Chang, Young-Tae; Zhang, John; Huang, Paul Lee

    2007-01-01

    We have identified oleuropein (Ole) and hydroxytyrosol (HT) as a unique class of HIV-1 inhibitors from olive leaf extracts effective against viral fusion and integration. We used molecular docking simulation to study the interactions of Ole and HT with viral targets. We find that Ole and HT bind to the conserved hydrophobic pocket on the surface of the HIV-gp41 fusion domain by hydrogen bonds with Q577 and hydrophobic interactions with I573, G572, and L568 on the gp41 N-terminal heptad repeat peptide N36, interfering with formation of the gp41 fusion-active core. To test and confirm modeling predications, we examined the effect of Ole and HT on HIV-1 fusion complex formation using native polyacrylamide gel electrophoresis and circular dichroism spectroscopy. Ole and HT exhibit dose-dependent inhibition on HIV-1 fusion core formation with EC 50 s of 66-58 nM, with no detectable toxicity. Our findings on effects of HIV-1 integrase are reported in the subsequent article

  13. Docking studies on a new human immunodeficiency virus integrase-Mg-DNA complex: phenyl ring exploration and synthesis of 1H-benzylindole derivatives through fluorine substitutions.

    Science.gov (United States)

    Ferro, Stefania; De Luca, Laura; Barreca, Maria Letizia; Iraci, Nunzio; De Grazia, Sara; Christ, Frauke; Witvrouw, Myriam; Debyser, Zeger; Chimirri, Alba

    2009-01-22

    A new model of HIV-1 integrase-Mg-DNA complex that is useful for docking experiments has been built. It was used to study the binding mode of integrase strand transfer inhibitor 1 (CHI-1043) and other fluorine analogues. Molecular modeling results prompted us to synthesize the designed derivatives which showed potent enzymatic inhibition at nanomolar concentration, high antiviral activity, and low toxicity. Microwave assisted organic synthesis (MAOS) was employed in several steps of the synthetic pathway, thus reducing reaction times and improving yields.

  14. Primary resistance to integrase strand transfer inhibitors in patients infected with diverse HIV-1 subtypes in sub-Saharan Africa

    NARCIS (Netherlands)

    Inzaule, Seth C.; Hamers, Raph L.; Noguera-Julian, Marc; Casadellà, Maria; Parera, Mariona; Rinke de Wit, Tobias F.; Paredes, Roger

    2018-01-01

    To investigate the prevalence and patterns of major and accessory resistance mutations associated with integrase strand transfer inhibitors (INSTIs), across diverse HIV-1 subtypes in sub-Saharan Africa. pol gene sequences were obtained using Illumina next-generation sequencing from 425 INSTI-naive

  15. BF integrase genes of HIV-1 circulating in São Paulo, Brazil, with a recurrent recombination region.

    Directory of Open Access Journals (Sweden)

    Atila Iamarino

    Full Text Available Although some studies have shown diversity in HIV integrase (IN genes, none has focused particularly on the gene evolving in epidemics in the context of recombination. The IN gene in 157 HIV-1 integrase inhibitor-naïve patients from the São Paulo State, Brazil, were sequenced tallying 128 of subtype B (23 of which were found in non-B genomes, 17 of subtype F (8 of which were found in recombinant genomes, 11 integrases were BF recombinants, and 1 from subtype C. Crucially, we found that 4 BF recombinant viruses shared a recurrent recombination breakpoint region between positions 4900 and 4924 (relative to the HXB2 that includes 2 gRNA loops, where the RT may stutter. Since these recombinants had independent phylogenetic origin, we argue that these results suggest a possible recombination hotspot not observed so far in BF CRF in particular, or in any other HIV-1 CRF in general. Additionally, 40% of the drug-naïve and 45% of the drug-treated patients had at least 1 raltegravir (RAL or elvitegravir (EVG resistance-associated amino acid change, but no major resistance mutations were found, in line with other studies. Importantly, V151I was the most common minor resistance mutation among B, F, and BF IN genes. Most codon sites of the IN genes had higher rates of synonymous substitutions (dS indicative of a strong negative selection. Nevertheless, several codon sites mainly in the subtype B were found under positive selection. Consequently, we observed a higher genetic diversity in the B portions of the mosaics, possibly due to the more recent introduction of subtype F on top of an ongoing subtype B epidemics and a fast spread of subtype F alleles among the B population.

  16. D77, one benzoic acid derivative, functions as a novel anti-HIV-1 inhibitor targeting the interaction between integrase and cellular LEDGF/p75

    International Nuclear Information System (INIS)

    Du Li; Zhao Yaxue; Chen, Jing; Yang Liumeng; Zheng Yongtang; Tang Yun; Shen Xu; Jiang Hualiang

    2008-01-01

    Integration of viral-DNA into host chromosome mediated by the viral protein HIV-1 integrase (IN) is an essential step in the HIV-1 life cycle. In this process, Lens epithelium-derived growth factor (LEDGF/p75) is discovered to function as a cellular co-factor for integration. Since LEDGF/p75 plays an important role in HIV integration, disruption of the LEDGF/p75 interaction with IN has provided a special interest for anti-HIV agent discovery. In this work, we reported that a benzoic acid derivative, 4-[(5-bromo-4-{[2,4-dioxo-3-(2-oxo-2-phenylethyl) -1,3-thiazolidin-5-ylidene]methyl}-2-ethoxyphenoxy)methyl]benzoic acid (D77) could potently inhibit the IN-LEDGF/p75 interaction and affect the HIV-1 IN nuclear distribution thus exhibiting antiretroviral activity. Molecular docking with site-directed mutagenesis analysis and surface plasmon resonance (SPR) binding assays has clarified possible binding mode of D77 against HIV-1 integrase. As the firstly discovered small molecular compound targeting HIV-1 integrase interaction with LEDGF/p75, D77 might supply useful structural information for further anti-HIV agent discovery

  17. Discovery and optimization of 2-pyridinone aminal integrase strand transfer inhibitors for the treatment of HIV.

    Science.gov (United States)

    Schreier, John D; Embrey, Mark W; Raheem, Izzat T; Barbe, Guillaume; Campeau, Louis-Charles; Dubost, David; McCabe Dunn, Jamie; Grobler, Jay; Hartingh, Timothy J; Hazuda, Daria J; Klein, Daniel; Miller, Michael D; Moore, Keith P; Nguyen, Natalie; Pajkovic, Natasa; Powell, David A; Rada, Vanessa; Sanders, John M; Sisko, John; Steele, Thomas G; Wai, John; Walji, Abbas; Xu, Min; Coleman, Paul J

    2017-05-01

    HIV integrase strand transfer inhibitors (InSTIs) represent an important class of antiviral therapeutics with proven efficacy and excellent tolerability for the treatment of HIV infections. In 2007, Raltegravir became the first marketed strand transfer inhibitor pioneering the way to a first-line therapy for treatment-naïve patients. Challenges with this class of therapeutics remain, including frequency of the dosing regimen and the genetic barrier to resistance. To address these issues, research towards next-generation integrase inhibitors has focused on imparting potency against RAL-resistent mutants and improving pharmacokinetic profiles. Herein, we detail medicinal chemistry efforts on a novel class of 2-pyridinone aminal InSTIs, inpsired by MK-0536, which led to the discovery of important lead molecules for our program. Systematic optimization carried out at the amide and aminal positions on the periphery of the core provided the necessary balance of antiviral activity and physiochemical properties. These efforts led to a novel aminal lead compound with the desired virological profile and preclinical pharmacokinetic profile to support a once-daily human dose prediction. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Fragment Based Strategies for Discovery of Novel HIV-1 Reverse Transcriptase and Integrase Inhibitors.

    Science.gov (United States)

    Latham, Catherine F; La, Jennifer; Tinetti, Ricky N; Chalmers, David K; Tachedjian, Gilda

    2016-01-01

    Human immunodeficiency virus (HIV) remains a global health problem. While combined antiretroviral therapy has been successful in controlling the virus in patients, HIV can develop resistance to drugs used for treatment, rendering available drugs less effective and limiting treatment options. Initiatives to find novel drugs for HIV treatment are ongoing, although traditional drug design approaches often focus on known binding sites for inhibition of established drug targets like reverse transcriptase and integrase. These approaches tend towards generating more inhibitors in the same drug classes already used in the clinic. Lack of diversity in antiretroviral drug classes can result in limited treatment options, as cross-resistance can emerge to a whole drug class in patients treated with only one drug from that class. A fresh approach in the search for new HIV-1 drugs is fragment-based drug discovery (FBDD), a validated strategy for drug discovery based on using smaller libraries of low molecular weight molecules (FBDD is aimed at not only finding novel drug scaffolds, but also probing the target protein to find new, often allosteric, inhibitory binding sites. Several fragment-based strategies have been successful in identifying novel inhibitory sites or scaffolds for two proven drug targets for HIV-1, reverse transcriptase and integrase. While any FBDD-generated HIV-1 drugs have yet to enter the clinic, recent FBDD initiatives against these two well-characterised HIV-1 targets have reinvigorated antiretroviral drug discovery and the search for novel classes of HIV-1 drugs.

  19. Study of Structure-active Relationship for Inhibitors of HIV-1 Integrase LEDGF/p75 Interaction by Machine Learning Methods.

    Science.gov (United States)

    Li, Yang; Wu, Yanbin; Yan, Aixia

    2017-07-01

    HIV-1 integrase (IN) is a promising target for anti-AIDS therapy, and LEDGF/p75 is proved to enhance the HIV-1 integrase strand transfer activity in vitro. Blocking the interaction between IN and LEDGF/p75 is an effective way to inhibit HIV replication infection. In this work, 274 LEDGF/p75-IN inhibitors were collected as the dataset. Support Vector Machine (SVM), Decision Tree (DT), Function Tree (FT) and Random Forest (RF) were applied to build several computational models for predicting whether a compound is an active or weakly active LEDGF/p75-IN inhibitor. Each compound is represented by MACCS fingerprints and CORINA Symphony descriptors. The prediction accuracies for the test sets of all the models are over 70 %. The best model Model 3B built by FT obtained a prediction accuracy and a Matthews Correlation Coefficient (MCC) of 81.08 % and 0.62 on test set, respectively. We found that the hydrogen bond and hydrophobic interactions are important for the bioactivity of an inhibitor. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. Molecular modeling study on the allosteric inhibition mechanism of HIV-1 integrase by LEDGF/p75 binding site inhibitors.

    Directory of Open Access Journals (Sweden)

    Weiwei Xue

    Full Text Available HIV-1 integrase (IN is essential for the integration of viral DNA into the host genome and an attractive therapeutic target for developing antiretroviral inhibitors. LEDGINs are a class of allosteric inhibitors targeting LEDGF/p75 binding site of HIV-1 IN. Yet, the detailed binding mode and allosteric inhibition mechanism of LEDGINs to HIV-1 IN is only partially understood, which hinders the structure-based design of more potent anti-HIV agents. A molecular modeling study combining molecular docking, molecular dynamics simulation, and binding free energy calculation were performed to investigate the interaction details of HIV-1 IN catalytic core domain (CCD with two recently discovered LEDGINs BI-1001 and CX14442, as well as the LEDGF/p75 protein. Simulation results demonstrated the hydrophobic domain of BI-1001 and CX14442 engages one subunit of HIV-1 IN CCD dimer through hydrophobic interactions, and the hydrophilic group forms hydrogen bonds with HIV-1 IN CCD residues from other subunit. CX14442 has a larger tert-butyl group than the methyl of BI-1001, and forms better interactions with the highly hydrophobic binding pocket of HIV-1 IN CCD dimer interface, which can explain the stronger affinity of CX14442 than BI-1001. Analysis of the binding mode of LEDGF/p75 with HIV-1 IN CCD reveals that the LEDGF/p75 integrase binding domain residues Ile365, Asp366, Phe406 and Val408 have significant contributions to the binding of the LEDGF/p75 to HIV1-IN. Remarkably, we found that binding of BI-1001 and CX14442 to HIV-1 IN CCD induced the structural rearrangements of the 140 s loop and oration displacements of the side chains of the three conserved catalytic residues Asp64, Asp116, and Glu152 located at the active site. These results we obtained will be valuable not only for understanding the allosteric inhibition mechanism of LEDGINs but also for the rational design of allosteric inhibitors of HIV-1 IN targeting LEDGF/p75 binding site.

  1. Removal of bacterial cells, antibiotic resistance genes and integrase genes by on-site hospital wastewater treatment plants: surveillance of treated hospital effluent quality

    KAUST Repository

    Timraz, Kenda Hussain Hassan; Xiong, Yanghui; Al Qarni, Hamed; Hong, Pei-Ying

    2016-01-01

    This study aims to evaluate the removal efficiency of microbial contaminants, including total cell counts, antibiotic-resistant bacteria (ARB), antibiotic resistance genes (ARGs, e.g. tetO, tetZ, sul1 and sul2) and integrase genes (e.g. intl1

  2. Transcriptome analysis reveals key differentially expressed genes involved in wheat grain development

    Directory of Open Access Journals (Sweden)

    Yonglong Yu

    2016-04-01

    Full Text Available Wheat seed development is an important physiological process of seed maturation and directly affects wheat yield and quality. In this study, we performed dynamic transcriptome microarray analysis of an elite Chinese bread wheat cultivar (Jimai 20 during grain development using the GeneChip Wheat Genome Array. Grain morphology and scanning electron microscope observations showed that the period of 11–15 days post-anthesis (DPA was a key stage for the synthesis and accumulation of seed starch. Genome-wide transcriptional profiling and significance analysis of microarrays revealed that the period from 11 to 15 DPA was more important than the 15–20 DPA stage for the synthesis and accumulation of nutritive reserves. Series test of cluster analysis of differential genes revealed five statistically significant gene expression profiles. Gene ontology annotation and enrichment analysis gave further information about differentially expressed genes, and MapMan analysis revealed expression changes within functional groups during seed development. Metabolic pathway network analysis showed that major and minor metabolic pathways regulate one another to ensure regular seed development and nutritive reserve accumulation. We performed gene co-expression network analysis to identify genes that play vital roles in seed development and identified several key genes involved in important metabolic pathways. The transcriptional expression of eight key genes involved in starch and protein synthesis and stress defense was further validated by qRT-PCR. Our results provide new insight into the molecular mechanisms of wheat seed development and the determinants of yield and quality.

  3. Design and Synthesis of Bis-amide and Hydrazide-containing Derivatives of Malonic Acid as Potential HIV-1 Integrase Inhibitors

    Directory of Open Access Journals (Sweden)

    Nouri Neamati

    2008-10-01

    Full Text Available HIV-1 integrase (IN is an attractive and validated target for the development of novel therapeutics against AIDS. In the search for new IN inhibitors, we designed and synthesized three series of bis-amide and hydrazide-containing derivatives of malonic acid. We performed a docking study to investigate the potential interactions of the title compounds with essential amino acids on the IN active site.

  4. 6-(1-Benzyl-1H-pyrrol-2-yl)-2,4-dioxo-5-hexenoic acids as dual inhibitors of recombinant HIV-1 integrase and ribonuclease H, synthesized by a parallel synthesis approach.

    Science.gov (United States)

    Costi, Roberta; Métifiot, Mathieu; Esposito, Francesca; Cuzzucoli Crucitti, Giuliana; Pescatori, Luca; Messore, Antonella; Scipione, Luigi; Tortorella, Silvano; Zinzula, Luca; Novellino, Ettore; Pommier, Yves; Tramontano, Enzo; Marchand, Christophe; Di Santo, Roberto

    2013-11-14

    The increasing efficiency of HAART has helped to transform HIV/AIDS into a chronic disease. Still, resistance and drug-drug interactions warrant the development of new anti-HIV agents. We previously discovered hit 6, active against HIV-1 replication and targeting RNase H in vitro. Because of its diketo-acid moiety, we speculated that this chemotype could serve to develop dual inhibitors of both RNase H and integrase. Here, we describe a new series of 1-benzyl-pyrrolyl diketohexenoic derivatives, 7a-y and 8a-y, synthesized following a parallel solution-phase approach. Those 50 analogues have been tested on recombinant enzymes (RNase H and integrase) and in cell-based assays. Approximately half (22) exibited inhibition of HIV replication. Compounds 7b, 7u, and 8g were the most active against the RNase H activity of reverse-transcriptase, with IC50 values of 3, 3, and 2.5 μM, respectively. Compound 8g was also the most potent integrase inhibitor with an IC50 value of 26 nM.

  5. Evidence for the horizontal transfer of an integrase gene from a fusellovirus to a pRN-like plasmid within a single strain of Sulfolobus and the implications for plasmid survival

    DEFF Research Database (Denmark)

    Peng, Xu

    2008-01-01

    of the integrase gene occurs in the viral attachment site (attP), which corresponds to the anticodon region of the targeted tRNA gene in the host chromosome. This point mutation confers on pXZ1 the ability to integrate into the tRNA(Glu)[CUC] gene, which differs from the integration site of SSV4, t......RNA(Glu)[UUC]. SSV4 and pXZ1 were also shown experimentally to integrate into separate sites on the host chromosome. This is believed to be the first report of a pRN plasmid sharing its natural host with a fusellovirus and carrying a highly similar integrase gene....

  6. Novel 3′-Processing Integrase Activity Assay by Real-Time PCR for Screening and Identification of HIV-1 Integrase Inhibitors

    Directory of Open Access Journals (Sweden)

    Supachai Sakkhachornphop

    2015-01-01

    Full Text Available The 3′-end processing (3′P of each viral long terminal repeat (LTR during human immunodeficiency virus type-1 (HIV-1 integration is a vital step in the HIV life cycle. Blocking the 3′P using 3′P inhibitor has recently become an attractive strategy for HIV-1 therapeutic intervention. Recently, we have developed a novel real-time PCR based assay for the detection of 3′P activity in vitro. The methodology usually involves biotinylated HIV-1 LTR, HIV-1 integrase (IN, and specific primers and probe. In this novel assay, we designed the HIV-1 LTR substrate based on a sequence with a homology to HIV-1 LTR labeled at its 3′ end with biotin on the sense strand. Two nucleotides at the 3′ end were subsequently removed by IN activity. Only two nucleotides labeled biotin were captured on an avidin-coated tube; therefore, inhibiting the binding of primers and probe results in late signals in the real-time PCR. This novel assay has successfully detected both the 3′P activity of HIV-1 IN and the anti-IN activity by Raltegravir and sodium azide agent. This real-time PCR assay has been shown to be effective and inexpensive for a high-throughput screening of novel IN inhibitors.

  7. Mutations in the catalytic core or the C-terminus of murine leukemia virus (MLV) integrase disrupt virion infectivity and exert diverse effects on reverse transcription

    International Nuclear Information System (INIS)

    Steinrigl, Adolf; Nosek, Dagmara; Ertl, Reinhard; Guenzburg, Walter H.; Salmons, Brian; Klein, Dieter

    2007-01-01

    Understanding of the structures and functions of the retroviral integrase (IN), a key enzyme in the viral replication cycle, is essential for developing antiretroviral treatments and facilitating the development of safer gene therapy vehicles. Thus, four MLV IN-mutants were constructed in the context of a retroviral vector system, harbouring either a substitution in the catalytic centre, deletions in the C-terminus, or combinations of both modifications. IN-mutants were tested for their performance in different stages of the viral replication cycle: RNA-packaging; RT-activity; transient and stable infection efficiency; dynamics of reverse transcription and nuclear entry. All mutant vectors packaged viral RNA with wild-type efficiencies and displayed only slight reductions in RT-activity. Deletion of either the IN C-terminus alone, or in addition to part of the catalytic domain exerted contrasting effects on intracellular viral DNA levels, implying that IN influences reverse transcription in more than one direction

  8. Plasmid integration in a wide range of bacteria mediated by the integrase of Lactobacillus delbrueckii bacteriophage mv4.

    Science.gov (United States)

    Auvray, F; Coddeville, M; Ritzenthaler, P; Dupont, L

    1997-01-01

    Bacteriophage mv4 is a temperate phage infecting Lactobacillus delbrueckii subsp. bulgaricus. During lysogenization, the phage integrates its genome into the host chromosome at the 3' end of a tRNA(Ser) gene through a site-specific recombination process (L. Dupont et al., J. Bacteriol., 177:586-595, 1995). A nonreplicative vector (pMC1) based on the mv4 integrative elements (attP site and integrase-coding int gene) is able to integrate into the chromosome of a wide range of bacterial hosts, including Lactobacillus plantarum, Lactobacillus casei (two strains), Lactococcus lactis subsp. cremoris, Enterococcus faecalis, and Streptococcus pneumoniae. Integrative recombination of pMC1 into the chromosomes of all of these species is dependent on the int gene product and occurs specifically at the pMC1 attP site. The isolation and sequencing of pMC1 integration sites from these bacteria showed that in lactobacilli, pMC1 integrated into the conserved tRNA(Ser) gene. In the other bacterial species where this tRNA gene is less or not conserved; secondary integration sites either in potential protein-coding regions or in intergenic DNA were used. A consensus sequence was deduced from the analysis of the different integration sites. The comparison of these sequences demonstrated the flexibility of the integrase for the bacterial integration site and suggested the importance of the trinucleotide CCT at the 5' end of the core in the strand exchange reaction. PMID:9068626

  9. The HIV-1 integrase-LEDGF allosteric inhibitor MUT-A: resistance profile, impairment of virus maturation and infectivity but without influence on RNA packaging or virus immunoreactivity

    NARCIS (Netherlands)

    Amadori, Céline; Ubeles van der Velden, Yme; Bonnard, Damien; Orlov, Igor; van Bel, Nikki; Le Rouzic, Erwann; Miralles, Laia; Brias, Julie; Chevreuil, Francis; Spehner, Daniele; Chasset, Sophie; Ledoussal, Benoit; Mayr, Luzia; Moreau, François; García, Felipe; Gatell, José; Zamborlini, Alessia; Emiliani, Stéphane; Ruff, Marc; Klaholz, Bruno P.; Moog, Christiane; Berkhout, Ben; Plana, Montserrat; Benarous, Richard

    2017-01-01

    HIV-1 Integrase (IN) interacts with the cellular co-factor LEDGF/p75 and tethers the HIV preintegration complex to the host genome enabling integration. Recently a new class of IN inhibitors was described, the IN-LEDGF allosteric inhibitors (INLAIs). Designed to interfere with the IN-LEDGF

  10. Integrase-Deficient Lentiviral Vector as an All-in-One Platform for Highly Efficient CRISPR/Cas9-Mediated Gene Editing

    Directory of Open Access Journals (Sweden)

    Pavel I. Ortinski

    2017-06-01

    Full Text Available The CRISPR/Cas9 systems have revolutionized the field of genome editing by providing unprecedented control over gene sequences and gene expression in many species, including humans. Lentiviral vectors (LVs are one of the primary delivery platforms for the CRISPR/Cas9 system due to their ability to accommodate large DNA payloads and sustain robust expression in a wide range of dividing and non-dividing cells. However, long-term expression of LV-delivered Cas9/guide RNA may lead to undesirable off-target effects characterized by non-specific RNA-DNA interactions and off-target DNA cleavages. Integrase-deficient lentiviral vectors (IDLVs present an attractive means for delivery of CRISPR/Cas9 components because: (1 they are capable of transducing a broad range of cells and tissues, (2 have superior packaging capacity compared to other vectors (e.g., adeno-associated viral vectors, and (3 they are expressed transiently and demonstrate very weak integration capability. In this manuscript, we aimed to establish IDLVs as a means for safe and efficient delivery of CRISPR/Cas9. To this end, we developed an all-in-one vector cassette with increased production efficacy and demonstrated that CRISPR/Cas9 delivered by the improved IDLV vectors can mediate rapid and robust gene editing in human embryonic kidney (HEK293T cells and post-mitotic brain neurons in vivo, via transient expression and with higher gene-targeting specificity than the corresponding integrase-competent vectors.

  11. Contribution of the C-terminal region within the catalytic core domain of HIV-1 integrase to yeast lethality, chromatin binding and viral replication

    Directory of Open Access Journals (Sweden)

    Belhumeur Pierre

    2008-11-01

    Full Text Available Abstract Background HIV-1 integrase (IN is a key viral enzymatic molecule required for the integration of the viral cDNA into the genome. Additionally, HIV-1 IN has been shown to play important roles in several other steps during the viral life cycle, including reverse transcription, nuclear import and chromatin targeting. Interestingly, previous studies have demonstrated that the expression of HIV-1 IN induces the lethal phenotype in some strains of Saccharomyces cerevisiae. In this study, we performed mutagenic analyses of the C-terminal region of the catalytic core domain of HIV-1 IN in order to delineate the critical amino acid(s and/or motif(s required for the induction of the lethal phenotype in the yeast strain HP16, and to further elucidate the molecular mechanism which causes this phenotype. Results Our study identified three HIV-1 IN mutants, V165A, A179P and KR186,7AA, located in the C-terminal region of the catalytic core domain of IN that do not induce the lethal phenotype in yeast. Chromatin binding assays in yeast and mammalian cells demonstrated that these IN mutants were impaired for the ability to bind chromatin. Additionally, we determined that while these IN mutants failed to interact with LEDGF/p75, they retained the ability to bind Integrase interactor 1. Furthermore, we observed that VSV-G-pseudotyped HIV-1 containing these IN mutants was unable to replicate in the C8166 T cell line and this defect was partially rescued by complementation with the catalytically inactive D64E IN mutant. Conclusion Overall, this study demonstrates that three mutations located in the C-terminal region of the catalytic core domain of HIV-1 IN inhibit the IN-induced lethal phenotype in yeast by inhibiting the binding of IN to the host chromatin. These results demonstrate that the C-terminal region of the catalytic core domain of HIV-1 IN is important for binding to host chromatin and is crucial for both viral replication and the promotion of

  12. Four-tiered π interaction at the dimeric interface of HIV-1 integrase critical for DNA integration and viral infectivity

    International Nuclear Information System (INIS)

    Al-Mawsawi, Laith Q.; Hombrouck, Anneleen; Dayam, Raveendra; Debyser, Zeger; Neamati, Nouri

    2008-01-01

    HIV-1 integrase (IN) is an essential enzyme for viral infection. Here, we report an extensive π electron orbital interaction between four amino acids, W132, M178, F181 and F185, located at the dimeric interface of IN that is critical for the strand transfer activity alone. Catalysis of nine different mutant IN proteins at these positions were evaluated. Whereas the 3'-processing activity is predominantly strong, the strand transfer activity of each enzyme was completely dependent on an intact π electron orbital interaction at the dimeric interface. Four representative IN mutants were constructed in the context of the infectious NL4.3 HIV-1 viral clone. Whereas viruses with an intact π electron orbital interaction at the IN dimeric interface replicated comparable to wild type, viruses containing an abolished π interaction were non-infectious. Q-PCR analysis of viral DNA forms during viral replication revealed pleiotropic effects of most mutations. We hypothesize that the π interaction is a critical contact point for the assembly of functional IN multimeric complexes, and that IN multimerization is required for a functional pre-integration complex. The rational design of small molecule inhibitors targeting the disruption of this π-π interaction should lead to powerful anti-retroviral drugs

  13. Raltegravir, elvitegravir, and metoogravir: the birth of "me-too" HIV-1 integrase inhibitors

    Directory of Open Access Journals (Sweden)

    Neamati Nouri

    2009-03-01

    Full Text Available Abstract Merck's MK-0518, known as raltegravir, has recently become the first FDA-approved HIV-1 integrase (IN inhibitor and has since risen to blockbuster drug status. Much research has in turn been conducted over the last few years aimed at recreating but optimizing the compound's interactions with the protein. Resulting me-too drugs have shown favorable pharmacokinetic properties and appear drug-like but, as expected, most have a highly similar interaction with IN to that of raltegravir. We propose that, based upon conclusions drawn from our docking studies illustrated herein, most of these me-too MK-0518 analogues may experience a low success rate against raltegravir-resistant HIV strains. As HIV has a very high mutational competence, the development of drugs with new mechanisms of inhibitory action and/or new active substituents may be a more successful route to take in the development of second- and third-generation IN inhibitors.

  14. ФC31 Integrase-Mediated Isolation and Characterization of Novel Safe Harbors for Transgene Expression in the Pig Genome

    Science.gov (United States)

    Bi, Yanzhen; Hua, Zaidong; Ren, Hongyan; Zhang, Liping; Xiao, Hongwei; Liu, Ximei; Hua, Wenjun; Mei, Shuqi; Molenaar, Adrian; Laible, Götz; Zheng, Xinmin

    2018-01-01

    Programmable nucleases have allowed the rapid development of gene editing and transgenics, but the technology still suffers from the lack of predefined genetic loci for reliable transgene expression and maintenance. To address this issue, we used ФC31 integrase to navigate the porcine genome and identify the pseudo attP sites suitable as safe harbors for sustained transgene expression. The combined ФC31 integrase mRNA and an enhanced green fluorescence protein (EGFP) reporter donor were microinjected into one-cell zygotes for transgene integration. Among the resulting seven EGFP-positive piglets, two had transgene integrations at pseudo attP sites, located in an intergenic region of chromosome 1 (chr1-attP) and the 6th intron of the TRABD2A gene on chromosome 3 (chr3-attP), respectively. The integration structure was determined by TAIL-PCR and Southern blotting. Primary fibroblast cells were isolated from the two piglets and examined using fluorescence-activated cell sorting (FACS) and enzyme-linked immunosorbent assay (ELISA), which demonstrated that the chr1-attP site was more potent than chr3-attP site in supporting the EGFP expression. Both piglets had green feet under the emission of UV light, and pelleted primary fibroblast cells were green-colored under natural light, corroborating that the two pseudo attP sites are beneficial to transgene expression. The discovery of these two novel safe harbors for robust and durable transgene expression will greatly facilitate the use of transgenic pigs for basic, biomedical and agricultural studies and applications. PMID:29300364

  15. Ultrasensitive liquid chromatography-tandem mass spectrometric methodologies for quantification of five HIV-1 integrase inhibitors in plasma for a microdose clinical trial.

    Science.gov (United States)

    Sun, Li; Li, Hankun; Willson, Kenneth; Breidinger, Sheila; Rizk, Matthew L; Wenning, Larissa; Woolf, Eric J

    2012-10-16

    HIV-1 integrase strand transfer inhibitors are an important class of compounds targeted for the treatment of HIV-1 infection. Microdosing has emerged as an attractive tool to assist in drug candidate screening for clinical development, but necessitates extremely sensitive bioanalytical assays, typically in the pg/mL concentration range. Currently, accelerator mass spectrometry is the predominant tool for microdosing support, which requires a specialized facility and synthesis of radiolabeled compounds. There have been few studies attempted to comprehensively assess a liquid chromatography-tandem mass spectrometry (LC-MS/MS) approach in the context of microdosing applications. Herein, we describe the development of automated LC-MS/MS methods to quantify five integrase inhibitors in plasma with the limits of quantification at 1 pg/mL for raltegravir and 2 pg/mL for four proprietary compounds. The assays involved double extractions followed by UPLC coupled with negative ion electrospray MS/MS analysis. All methods were fully validated to the rigor of regulated bioanalysis requirements, with intraday precision between 1.20 and 14.1% and accuracy between 93.8 and 107% at the standard curve concentration range. These methods were successfully applied to a human microdose study and demonstrated to be accurate, reproducible, and cost-effective. Results of the study indicate that raltegravir displayed linear pharmacokinetics between a microdose and a pharmacologically active dose.

  16. Anti-HIV-1 integrase activity of medicinal plants used as self medication by AIDS patients

    Directory of Open Access Journals (Sweden)

    Sopa Kummee

    2006-07-01

    Full Text Available The extracts of selected medicinal plants used as self medication by AIDS patients were investigated for their inhibitory activities against HIV-1 integrase (HIV-1 IN using the multiplate integration assay (MIA. Of these, the water extract of Eclipta prostrata (whole plant exhibited the most potent inhibitory activity with an IC50 value of 4.8 μg/ml, followed by the methanol extract of Eclipta prostrata (whole plant, IC50 = 21.1 μg/ ml, the water extract of Barleria lupulina (stem, IC50 = 26.4 μg/ml, the chloroform extract of Barleria lupulina (stem, IC50 = 33.0 μg/ml, the methanol extract of Barleria lupulina (stem, IC50 = 38.2 μg/ml and the chloroform extract of Piper betle (leaf, IC50 = 39.3 μg/ml, respectively.

  17. Human immunodeficiency virus integrase inhibitors efficiently suppress feline immunodeficiency virus replication in vitro and provide a rationale to redesign antiretroviral treatment for feline AIDS

    Directory of Open Access Journals (Sweden)

    Ciervo Alessandra

    2007-10-01

    Full Text Available Abstract Background Treatment of feline immunodeficiency virus (FIV infection has been hampered by the absence of a specific combination antiretroviral treatment (ART. Integrase strand transfer inhibitors (INSTIs are emerging as a promising new drug class for HIV-1 treatment, and we evaluated the possibility of inhibiting FIV replication using INSTIs. Methods Phylogenetic analysis of lentiviral integrase (IN sequences was carried out using the PAUP* software. A theoretical three-dimensional structure of the FIV IN catalytic core domain (CCD was obtained by homology modeling based on a crystal structure of HIV-1 IN CCD. The interaction of the transferred strand of viral DNA with the catalytic cavity of FIV IN was deduced from a crystal structure of a structurally similar transposase complexed with transposable DNA. Molecular docking simulations were conducted using a genetic algorithm (GOLD. Antiviral activity was tested in feline lymphoblastoid MBM cells acutely infected with the FIV Petaluma strain. Circular and total proviral DNA was quantified by real-time PCR. Results The calculated INSTI-binding sites were found to be nearly identical in FIV and HIV-1 IN CCDs. The close similarity of primate and feline lentivirus IN CCDs was also supported by phylogenetic analysis. In line with these bioinformatic analyses, FIV replication was efficiently inhibited in acutely infected cell cultures by three investigational INSTIs, designed for HIV-1 and belonging to different classes. Of note, the naphthyridine carboxamide INSTI, L-870,810 displayed an EC50 in the low nanomolar range. Inhibition of FIV integration in situ was shown by real-time PCR experiments that revealed accumulation of circular forms of FIV DNA within cells treated with L-870,810. Conclusion We report a drug class (other than nucleosidic reverse transcriptase inhibitors that is capable of inhibiting FIV replication in vitro. The present study helped establish L-870,810, a compound

  18. Human immunodeficiency virus integrase inhibitors efficiently suppress feline immunodeficiency virus replication in vitro and provide a rationale to redesign antiretroviral treatment for feline AIDS

    Science.gov (United States)

    Savarino, Andrea; Pistello, Mauro; D'Ostilio, Daniela; Zabogli, Elisa; Taglia, Fabiana; Mancini, Fabiola; Ferro, Stefania; Matteucci, Donatella; De Luca, Laura; Barreca, Maria Letizia; Ciervo, Alessandra; Chimirri, Alba; Ciccozzi, Massimo; Bendinelli, Mauro

    2007-01-01

    Background Treatment of feline immunodeficiency virus (FIV) infection has been hampered by the absence of a specific combination antiretroviral treatment (ART). Integrase strand transfer inhibitors (INSTIs) are emerging as a promising new drug class for HIV-1 treatment, and we evaluated the possibility of inhibiting FIV replication using INSTIs. Methods Phylogenetic analysis of lentiviral integrase (IN) sequences was carried out using the PAUP* software. A theoretical three-dimensional structure of the FIV IN catalytic core domain (CCD) was obtained by homology modeling based on a crystal structure of HIV-1 IN CCD. The interaction of the transferred strand of viral DNA with the catalytic cavity of FIV IN was deduced from a crystal structure of a structurally similar transposase complexed with transposable DNA. Molecular docking simulations were conducted using a genetic algorithm (GOLD). Antiviral activity was tested in feline lymphoblastoid MBM cells acutely infected with the FIV Petaluma strain. Circular and total proviral DNA was quantified by real-time PCR. Results The calculated INSTI-binding sites were found to be nearly identical in FIV and HIV-1 IN CCDs. The close similarity of primate and feline lentivirus IN CCDs was also supported by phylogenetic analysis. In line with these bioinformatic analyses, FIV replication was efficiently inhibited in acutely infected cell cultures by three investigational INSTIs, designed for HIV-1 and belonging to different classes. Of note, the naphthyridine carboxamide INSTI, L-870,810 displayed an EC50 in the low nanomolar range. Inhibition of FIV integration in situ was shown by real-time PCR experiments that revealed accumulation of circular forms of FIV DNA within cells treated with L-870,810. Conclusion We report a drug class (other than nucleosidic reverse transcriptase inhibitors) that is capable of inhibiting FIV replication in vitro. The present study helped establish L-870,810, a compound successfully tested in

  19. The Microbiota and Abundance of the Class 1 Integron-Integrase Gene in Tropical Sewage Treatment Plant Influent and Activated Sludge.

    Directory of Open Access Journals (Sweden)

    Magna C Paiva

    Full Text Available Bacteria are assumed to efficiently remove organic pollutants from sewage in sewage treatment plants, where antibiotic-resistance genes can move between species via mobile genetic elements known as integrons. Nevertheless, few studies have addressed bacterial diversity and class 1 integron abundance in tropical sewage. Here, we describe the extant microbiota, using V6 tag sequencing, and quantify the class 1 integron-integrase gene (intI1 in raw sewage (RS and activated sludge (AS. The analysis of 1,174,486 quality-filtered reads obtained from RS and AS samples revealed complex and distinct bacterial diversity in these samples. The RS sample, with 3,074 operational taxonomic units, exhibited the highest alpha-diversity indices. Among the 25 phyla, Proteobacteria, Bacteroidetes and Firmicutes represented 85% (AS and 92% (RS of all reads. Increased relative abundance of Micrococcales, Myxococcales, and Sphingobacteriales and reduced pathogen abundance were noted in AS. At the genus level, differences were observed for the dominant genera Simplicispira and Diaphorobacter (AS as well as for Enhydrobacter (RS. The activated sludge process decreased (55% the amount of bacteria harboring the intI1 gene in the RS sample. Altogether, our results emphasize the importance of biological treatment for diminishing pathogenic bacteria and those bearing the intI1 gene that arrive at a sewage treatment plant.

  20. Novel key metabolites reveal further branching of the roquefortine/meleagrin biosynthetic pathway.

    Science.gov (United States)

    Ries, Marco I; Ali, Hazrat; Lankhorst, Peter P; Hankemeier, Thomas; Bovenberg, Roel A L; Driessen, Arnold J M; Vreeken, Rob J

    2013-12-27

    Metabolic profiling and structural elucidation of novel secondary metabolites obtained from derived deletion strains of the filamentous fungus Penicillium chrysogenum were used to reassign various previously ascribed synthetase genes of the roquefortine/meleagrin pathway to their corresponding products. Next to the structural characterization of roquefortine F and neoxaline, which are for the first time reported for P. chrysogenum, we identified the novel metabolite roquefortine L, including its degradation products, harboring remarkable chemical structures. Their biosynthesis is discussed, questioning the exclusive role of glandicoline A as key intermediate in the pathway. The results reveal that further enzymes of this pathway are rather unspecific and catalyze more than one reaction, leading to excessive branching in the pathway with meleagrin and neoxaline as end products of two branches.

  1. Metagenomic analysis of lysogeny in Tampa Bay: implications for prophage gene expression.

    Directory of Open Access Journals (Sweden)

    Lauren McDaniel

    Full Text Available Phage integrase genes often play a role in the establishment of lysogeny in temperate phage by catalyzing the integration of the phage into one of the host's replicons. To investigate temperate phage gene expression, an induced viral metagenome from Tampa Bay was sequenced by 454/Pyrosequencing. The sequencing yielded 294,068 reads with 6.6% identifiable. One hundred-three sequences had significant similarity to integrases by BLASTX analysis (e < or =0.001. Four sequences with strongest amino-acid level similarity to integrases were selected and real-time PCR primers and probes were designed. Initial testing with microbial fraction DNA from Tampa Bay revealed 1.9 x 10(7, and 1300 gene copies of Vibrio-like integrase and Oceanicola-like integrase L(-1 respectively. The other two integrases were not detected. The integrase assay was then tested on microbial fraction RNA extracted from 200 ml of Tampa Bay water sampled biweekly over a 12 month time series. Vibrio-like integrase gene expression was detected in three samples, with estimated copy numbers of 2.4-1280 L(-1. Clostridium-like integrase gene expression was detected in 6 samples, with estimated copy numbers of 37 to 265 L(-1. In all cases, detection of integrase gene expression corresponded to the occurrence of lysogeny as detected by prophage induction. Investigation of the environmental distribution of the two expressed integrases in the Global Ocean Survey Database found the Vibrio-like integrase was present in genome equivalents of 3.14% of microbial libraries and all four viral metagenomes. There were two similar genes in the library from British Columbia and one similar gene was detected in both the Gulf of Mexico and Sargasso Sea libraries. In contrast, in the Arctic library eleven similar genes were observed. The Clostridium-like integrase was less prevalent, being found in 0.58% of the microbial and none of the viral libraries. These results underscore the value of metagenomic data

  2. The allosteric HIV-1 integrase inhibitor BI-D affects virion maturation but does not influence packaging of a functional RNA genome.

    Directory of Open Access Journals (Sweden)

    Nikki van Bel

    Full Text Available The viral integrase (IN is an essential protein for HIV-1 replication. IN inserts the viral dsDNA into the host chromosome, thereby aided by the cellular co-factor LEDGF/p75. Recently a new class of integrase inhibitors was described: allosteric IN inhibitors (ALLINIs. Although designed to interfere with the IN-LEDGF/p75 interaction to block HIV DNA integration during the early phase of HIV-1 replication, the major impact was surprisingly found on the process of virus maturation during the late phase, causing a reverse transcription defect upon infection of target cells. Virus particles produced in the presence of an ALLINI are misformed with the ribonucleoprotein located outside the virus core. Virus assembly and maturation are highly orchestrated and regulated processes in which several viral proteins and RNA molecules closely interact. It is therefore of interest to study whether ALLINIs have unpredicted pleiotropic effects on these RNA-related processes. We confirm that the ALLINI BI-D inhibits virus replication and that the produced virus is non-infectious. Furthermore, we show that the wild-type level of HIV-1 genomic RNA is packaged in virions and these genomes are in a dimeric state. The tRNAlys3 primer for reverse transcription was properly placed on this genomic RNA and could be extended ex vivo. In addition, the packaged reverse transcriptase enzyme was fully active when extracted from virions. As the RNA and enzyme components for reverse transcription are properly present in virions produced in the presence of BI-D, the inhibition of reverse transcription is likely to reflect the mislocalization of the components in the aberrant virus particle.

  3. The allosteric HIV-1 integrase inhibitor BI-D affects virion maturation but does not influence packaging of a functional RNA genome.

    Science.gov (United States)

    van Bel, Nikki; van der Velden, Yme; Bonnard, Damien; Le Rouzic, Erwann; Das, Atze T; Benarous, Richard; Berkhout, Ben

    2014-01-01

    The viral integrase (IN) is an essential protein for HIV-1 replication. IN inserts the viral dsDNA into the host chromosome, thereby aided by the cellular co-factor LEDGF/p75. Recently a new class of integrase inhibitors was described: allosteric IN inhibitors (ALLINIs). Although designed to interfere with the IN-LEDGF/p75 interaction to block HIV DNA integration during the early phase of HIV-1 replication, the major impact was surprisingly found on the process of virus maturation during the late phase, causing a reverse transcription defect upon infection of target cells. Virus particles produced in the presence of an ALLINI are misformed with the ribonucleoprotein located outside the virus core. Virus assembly and maturation are highly orchestrated and regulated processes in which several viral proteins and RNA molecules closely interact. It is therefore of interest to study whether ALLINIs have unpredicted pleiotropic effects on these RNA-related processes. We confirm that the ALLINI BI-D inhibits virus replication and that the produced virus is non-infectious. Furthermore, we show that the wild-type level of HIV-1 genomic RNA is packaged in virions and these genomes are in a dimeric state. The tRNAlys3 primer for reverse transcription was properly placed on this genomic RNA and could be extended ex vivo. In addition, the packaged reverse transcriptase enzyme was fully active when extracted from virions. As the RNA and enzyme components for reverse transcription are properly present in virions produced in the presence of BI-D, the inhibition of reverse transcription is likely to reflect the mislocalization of the components in the aberrant virus particle.

  4. Inorganic and organic fertilizers impact the abundance and proportion of antibiotic resistance and integron-integrase genes in agricultural grassland soil.

    Science.gov (United States)

    Nõlvak, Hiie; Truu, Marika; Kanger, Kärt; Tampere, Mailiis; Espenberg, Mikk; Loit, Evelin; Raave, Henn; Truu, Jaak

    2016-08-15

    Soil fertilization with animal manure or its digestate may facilitate an important antibiotic resistance dissemination route from anthropogenic sources to the environment. This study examines the effect of mineral fertilizer (NH4NO3), cattle slurry and cattle slurry digestate amendment on the abundance and proportion dynamics of five antibiotic resistance genes (ARGs) and two classes of integron-integrase genes (intI1 and intI2) in agricultural grassland soil. Fertilization was performed thrice throughout one vegetation period. The targeted ARGs (sul1, tetA, blaCTX-M, blaOXA2 and qnrS) encode resistance to several major antibiotic classes used in veterinary medicine such as sulfonamides, tetracycline, cephalosporins, penicillin and fluoroquinolones, respectively. The non-fertilized grassland soil contained a stable background of tetA, blaCTX-M and sul1 genes. The type of applied fertilizer significantly affected ARGs and integron-integrase genes abundances and proportions in the bacterial community (porganic fertilizer's application event, but this increase was followed by a stage of decrease, suggesting that microbes possessing these genes were predominantly entrained into soil via cattle slurry or its digestate application and had somewhat limited survival potential in a soil environment. However, the abundance of these three target genes did not decrease to a background level by the end of the study period. TetA was most abundant in mineral fertilizer treated soil and blaCTX-M in cattle slurry digestate amended soil. Despite significantly different abundances, the abundance dynamics of bacteria possessing these genes were similar (p<0.05 in all cases) in different treatments and resembled the dynamics of the whole bacterial community abundance in each soil treatment. Copyright © 2016. Published by Elsevier B.V.

  5. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  6. Architecture and Assembly of HIV Integrase Multimers in the Absence of DNA Substrates*

    Science.gov (United States)

    Bojja, Ravi Shankar; Andrake, Mark D.; Merkel, George; Weigand, Steven; Dunbrack, Roland L.; Skalka, Anna Marie

    2013-01-01

    We have applied small angle x-ray scattering and protein cross-linking coupled with mass spectrometry to determine the architectures of full-length HIV integrase (IN) dimers in solution. By blocking interactions that stabilize either a core-core domain interface or N-terminal domain intermolecular contacts, we show that full-length HIV IN can form two dimer types. One is an expected dimer, characterized by interactions between two catalytic core domains. The other dimer is stabilized by interactions of the N-terminal domain of one monomer with the C-terminal domain and catalytic core domain of the second monomer as well as direct interactions between the two C-terminal domains. This organization is similar to the “reaching dimer” previously described for wild type ASV apoIN and resembles the inner, substrate binding dimer in the crystal structure of the PFV intasome. Results from our small angle x-ray scattering and modeling studies indicate that in the absence of its DNA substrate, the HIV IN tetramer assembles as two stacked reaching dimers that are stabilized by core-core interactions. These models of full-length HIV IN provide new insight into multimer assembly and suggest additional approaches for enzyme inhibition. PMID:23322775

  7. Interrogating Key Positions of Size-Reduced TALE Repeats Reveals a Programmable Sensor of 5-Carboxylcytosine.

    Science.gov (United States)

    Maurer, Sara; Giess, Mario; Koch, Oliver; Summerer, Daniel

    2016-12-16

    Transcription-activator-like effector (TALE) proteins consist of concatenated repeats that recognize consecutive canonical nucleobases of DNA via the major groove in a programmable fashion. Since this groove displays unique chemical information for the four human epigenetic cytosine nucleobases, TALE repeats with epigenetic selectivity can be engineered, with potential to establish receptors for the programmable decoding of all human nucleobases. TALE repeats recognize nucleobases via key amino acids in a structurally conserved loop whose backbone is positioned very close to the cytosine 5-carbon. This complicates the engineering of selectivities for large 5-substituents. To interrogate a more promising structural space, we engineered size-reduced repeat loops, performed saturation mutagenesis of key positions, and screened a total of 200 repeat-nucleobase interactions for new selectivities. This provided insight into the structural requirements of TALE repeats for affinity and selectivity, revealed repeats with improved or relaxed selectivity, and resulted in the first selective sensor of 5-carboxylcytosine.

  8. Integrase-independent HIV-1 infection is augmented under conditions of DNA damage and produces a viral reservoir

    International Nuclear Information System (INIS)

    Ebina, Hirotaka; Kanemura, Yuka; Suzuki, Yasutsugu; Urata, Kozue; Misawa, Naoko; Koyanagi, Yoshio

    2012-01-01

    HIV-1 possesses a viral protein, integrase (IN), which is necessary for its efficient integration in target cells. However, it has been reported that an IN-defective HIV strain is still capable of integration. Here, we assessed the ability of wild type (WT) HIV-1 to establish infection in the presence of IN inhibitors. We observed a low, yet clear infection of inhibitor-incubated cells infected with WT HIV which was identical to cells infected with IN-deficient HIV, D64A. Furthermore, the IN-independent integration could be enhanced by the pretreatment of cells with DNA-damaging agents suggesting that integration is mediated by a DNA repair system. Moreover, significantly faster viral replication kinetics with augmented viral DNA integration was observed after infection in irradiated cells treated with IN inhibitor compared to nonirradiated cells. Altogether, our results suggest that HIV DNA has integration potential in the presence of an IN inhibitor and may serve as a virus reservoir.

  9. Integrase-independent HIV-1 infection is augmented under conditions of DNA damage and produces a viral reservoir

    Energy Technology Data Exchange (ETDEWEB)

    Ebina, Hirotaka, E-mail: hebina@virus.kyoto-u.ac.jp; Kanemura, Yuka; Suzuki, Yasutsugu; Urata, Kozue; Misawa, Naoko; Koyanagi, Yoshio

    2012-05-25

    HIV-1 possesses a viral protein, integrase (IN), which is necessary for its efficient integration in target cells. However, it has been reported that an IN-defective HIV strain is still capable of integration. Here, we assessed the ability of wild type (WT) HIV-1 to establish infection in the presence of IN inhibitors. We observed a low, yet clear infection of inhibitor-incubated cells infected with WT HIV which was identical to cells infected with IN-deficient HIV, D64A. Furthermore, the IN-independent integration could be enhanced by the pretreatment of cells with DNA-damaging agents suggesting that integration is mediated by a DNA repair system. Moreover, significantly faster viral replication kinetics with augmented viral DNA integration was observed after infection in irradiated cells treated with IN inhibitor compared to nonirradiated cells. Altogether, our results suggest that HIV DNA has integration potential in the presence of an IN inhibitor and may serve as a virus reservoir.

  10. An effective HIV-1 integrase inhibitor screening platform: Rationality validation of drug screening, conformational mobility and molecular recognition analysis for PFV integrase complex with viral DNA.

    Science.gov (United States)

    Du, Wenyi; Zuo, Ke; Sun, Xin; Liu, Wei; Yan, Xiao; Liang, Li; Wan, Hua; Chen, Fengzheng; Hu, Jianping

    2017-11-01

    As an important target for the development of novel anti-AIDS drugs, HIV-1 integrase (IN) has been widely concerned. However, the lack of a complete accurate crystal structure of HIV-1 IN greatly blocks the discovery of novel inhibitors. In this work, an effective HIV-1 IN inhibitor screening platform, namely PFV IN, was filtered from all species of INs. Next, the 40.8% similarity with HIV-1 IN, as well as the high efficiency of virtual screening and the good agreement between calculated binding free energies and experimental ones all proved PFV IN is a promising screening platform for HIV-1 IN inhibitors. Then, the molecular recognition mechanism of PFV IN by its substrate viral DNA and six naphthyridine derivatives (NRDs) inhibitors was investigated through molecular docking, molecular dynamics simulations and water-mediated interactions analyses. The functional partition of NRDs IN inhibitors could be divided into hydrophobic and hydrophilic ones, and the Mg 2+ ions, water molecules and conserved DDE motif residues all interacted with the hydrophilic partition, while the bases in viral DNA and residues like Tyr212, Pro214 interacted with the hydrophobic one. Finally, the free energy landscape (FEL) and cluster analyses were performed to explore the molecular motion of PFV IN-DNA system. It is found that the association with NRDs inhibitors would obviously decrease the motion amplitude of PFV IN-DNA, which may be one of the most potential mechanisms of IN inhibitors. This work will provide a theoretical basis for the inhibitor design based on the structure of HIV-1 IN. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Resistance Analyses of Integrase Strand Transfer Inhibitors within Phase 3 Clinical Trials of Treatment-Naive Patients

    Directory of Open Access Journals (Sweden)

    Kirsten L. White

    2014-07-01

    Full Text Available The integrase (IN strand transfer inhibitors (INSTIs, raltegravir (RAL, elvitegravir (EVG and dolutegravir (DTG, comprise the newest drug class approved for the treatment of HIV-1 infection, which joins the existing classes of reverse transcriptase, protease and binding/entry inhibitors. The efficacy of first-line regimens has attained remarkably high levels, reaching undetectable viral loads in 90% of patients by Week 48; however, there remain patients who require a change in regimen due to adverse events, virologic failure with emergent resistance or other issues of patient management. Large, randomized clinical trials conducted in antiretroviral treatment-naive individuals are required for drug approval in this population in the US, EU and other countries, with the primary endpoint for virologic success at Week 48. However, there are differences in the definition of virologic failure and the evaluation of drug resistance among the trials. This review focuses on the methodology and tabulation of resistance to INSTIs in phase 3 clinical trials of first-line regimens and discusses case studies of resistance.

  12. Removal of bacterial cells, antibiotic resistance genes and integrase genes by on-site hospital wastewater treatment plants: surveillance of treated hospital effluent quality

    KAUST Repository

    Timraz, Kenda Hussain Hassan

    2016-12-15

    This study aims to evaluate the removal efficiency of microbial contaminants, including total cell counts, antibiotic-resistant bacteria (ARB), antibiotic resistance genes (ARGs, e.g. tetO, tetZ, sul1 and sul2) and integrase genes (e.g. intl1 and intl2), by wastewater treatment plants (WWTPs) operated on-site of two hospitals (i.e., SH WWTP and IH WWTP). Both SH and IH WWTPs utilize the conventional activated sludge process but differences in the removal efficiencies were observed. Over the 2 week sampling period, IH WWTP outperformed SH WWTP, and achieved an approximate 0.388 to 2.49-log log removal values (LRVs) for total cell counts compared to the 0.010 to 0.162-log removal in SH WWTP. Although ARB were present in the hospital influent, the treatment process of both hospitals effectively removed ARB from most of the effluent samples. In instances where ARB were recovered in the effluent, none of the viable isolates were identified to be opportunistic pathogenic species based on 16S rRNA gene sequencing. However, sul1 and intl1 genes remained detectable at up to 105 copies per mL or 8 x 10(-1) copies per 16S rRNA gene in the treated effluent, with an LRV of less than 1.2. When the treated effluent is discharged from hospital WWTPs into the public sewer for further treatment as per requirement in many countries, the detected amount of ARGs and integrase genes in the hospital effluent can become a potential source of horizontal gene dissemination in the municipal WWTP. Proper on-site wastewater treatment and surveillance of the effluent quality for emerging contaminants are therefore highly recommended.

  13. A quantitative structure–activity relationship study on HIV-1 integrase inhibitors using genetic algorithm, artificial neural networks and different statistical methods

    Directory of Open Access Journals (Sweden)

    Ghasem Ghasemi

    2016-09-01

    Full Text Available In this work, quantitative structure–activity relationship (QSAR study has been done on tricyclic phthalimide analogues acting as HIV-1 integrase inhibitors. Forty compounds were used in this study. Genetic algorithm (GA, artificial neural network (ANN and multiple linear regressions (MLR were utilized to construct the non-linear and linear QSAR models. It revealed that the GA–ANN model was much better than other models. For this purpose, ab initio geometry optimization performed at B3LYP level with a known basis set 6–31G (d. Hyperchem, ChemOffice and Gaussian 98W softwares were used for geometry optimization of the molecules and calculation of the quantum chemical descriptors. To include some of the correlation energy, the calculation was done with the density functional theory (DFT with the same basis set and Becke’s three parameter hybrid functional using the LYP correlation functional (B3LYP/6–31G (d. For the calculations in solution phase, the polarized continuum model (PCM was used and also included optimizations at gas-phase B3LYP/6–31G (d level for comparison. In the aqueous phase, the root–mean–square errors of the training set and the test set for GA–ANN model using jack–knife method, were 0.1409, 0.1804, respectively. In the gas phase, the root–mean–square errors of the training set and the test set for GA–ANN model were 0.1408, 0.3103, respectively. Also, the R2 values in the aqueous and the gas phase were obtained as 0.91, 0.82, respectively.

  14. Systematic Prioritization and Integrative Analysis of Copy Number Variations in Schizophrenia Reveal Key Schizophrenia Susceptibility Genes

    Science.gov (United States)

    Luo, Xiongjian; Huang, Liang; Han, Leng; Luo, Zhenwu; Hu, Fang; Tieu, Roger; Gan, Lin

    2014-01-01

    Schizophrenia is a common mental disorder with high heritability and strong genetic heterogeneity. Common disease-common variants hypothesis predicts that schizophrenia is attributable in part to common genetic variants. However, recent studies have clearly demonstrated that copy number variations (CNVs) also play pivotal roles in schizophrenia susceptibility and explain a proportion of missing heritability. Though numerous CNVs have been identified, many of the regions affected by CNVs show poor overlapping among different studies, and it is not known whether the genes disrupted by CNVs contribute to the risk of schizophrenia. By using cumulative scoring, we systematically prioritized the genes affected by CNVs in schizophrenia. We identified 8 top genes that are frequently disrupted by CNVs, including NRXN1, CHRNA7, BCL9, CYFIP1, GJA8, NDE1, SNAP29, and GJA5. Integration of genes affected by CNVs with known schizophrenia susceptibility genes (from previous genetic linkage and association studies) reveals that many genes disrupted by CNVs are also associated with schizophrenia. Further protein-protein interaction (PPI) analysis indicates that protein products of genes affected by CNVs frequently interact with known schizophrenia-associated proteins. Finally, systematic integration of CNVs prioritization data with genetic association and PPI data identifies key schizophrenia candidate genes. Our results provide a global overview of genes impacted by CNVs in schizophrenia and reveal a densely interconnected molecular network of de novo CNVs in schizophrenia. Though the prioritized top genes represent promising schizophrenia risk genes, further work with different prioritization methods and independent samples is needed to confirm these findings. Nevertheless, the identified key candidate genes may have important roles in the pathogenesis of schizophrenia, and further functional characterization of these genes may provide pivotal targets for future therapeutics and

  15. HIV-1 integrase inhibitors are substrates for the multidrug transporter MDR1-P-glycoprotein

    Directory of Open Access Journals (Sweden)

    Cara Andrea

    2007-03-01

    Full Text Available Abstract Background The discovery of diketoacid-containing derivatives as inhibitors of HIV-1 Integrase (IN (IN inhibitors, IINs has played a major role in validating this enzyme as an important target for antiretroviral therapy. Since the in vivo efficacy depends on access of these drugs to intracellular sites where HIV-1 replicates, we determined whether the IINs are recognized by the multidrug transporter MDR1-P-glycoprotein (P-gp thereby reducing their intracellular accumulation. To address the effect of IINs on drug transport, nine quinolonyl diketo acid (DKA derivatives active on the HIV-1 IN strand transfer (ST step and with EC50 ranging from 1.83 to >50 μm in cell-based assays were tested for their in vitro interaction with P-gp in the CEM-MDR cell system. IINs were investigated for the inhibition and induction of the P-gp function and expression as well as for multidrug resistance (MDR reversing ability. Results The HIV-1 IINs act as genuine P-gp substrates by inhibiting doxorubicin efflux and inducing P-gp functional conformation changes as evaluated by the modulation of UIC2 mAb epitope. Further, IINs chemosensitize MDR cells to vinblastine and induce P-gp expression in drug sensitive revertants of CEM-MDR cells. Conclusion To our knowledge, this is the first demonstration that HIV-1 IINs are P-gp substrates. This biological property may influence the absorption, distribution and elimination of these novels anti HIV-1 compounds.

  16. Experimental single-strain mobilomics reveals events that shape pathogen emergence.

    Science.gov (United States)

    Schoeniger, Joseph S; Hudson, Corey M; Bent, Zachary W; Sinha, Anupama; Williams, Kelly P

    2016-08-19

    Virulence genes on mobile DNAs such as genomic islands (GIs) and plasmids promote bacterial pathogen emergence. Excision is an early step in GI mobilization, producing a circular GI and a deletion site in the chromosome; circular forms are also known for some bacterial insertion sequences (ISs). The recombinant sequence at the junctions of such circles and deletions can be detected sensitively in high-throughput sequencing data, using new computational methods that enable empirical discovery of mobile DNAs. For the rich mobilome of a hospital Klebsiella pneumoniae strain, circularization junctions (CJs) were detected for six GIs and seven IS types. Our methods revealed differential biology of multiple mobile DNAs, imprecision of integrases and transposases, and differential activity among identical IS copies for IS26, ISKpn18 and ISKpn21 Using the resistance of circular dsDNA molecules to exonuclease, internally calibrated with the native plasmids, showed that not all molecules bearing GI CJs were circular. Transpositions were also detected, revealing replicon preference (ISKpn18 prefers a conjugative IncA/C2 plasmid), local action (IS26), regional preferences, selection (against capsule synthesis) and IS polarity inversion. Efficient discovery and global characterization of numerous mobile elements per experiment improves accounting for the new gene combinations that arise in emerging pathogens. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  17. Quantitative proteomics reveals that peroxidases play key roles in post-flooding recovery in soybean roots.

    Science.gov (United States)

    Khan, Mudassar Nawaz; Sakata, Katsumi; Hiraga, Susumu; Komatsu, Setsuko

    2014-12-05

    Soybean is an important legume crop that exhibits markedly reduced growth and yields under flooding conditions. To unravel the mechanisms involved in recovery after flooding in soybean root, gel-free proteomic analysis was performed. Morphological analysis revealed that growth suppression was more severe with increased flooding duration. Out of a total of 1645 and 1707 identified proteins, 73 and 21 proteins were changed significantly during the recovery stage following 2 and 4 days flooding, respectively. Based on the proteomic, clustering, and in silico protein-protein interaction analyses, six key enzymes were analyzed at the mRNA level. Lipoxygenase 1, which was increased at the protein level during the recovery period, was steadily down-regulated at the mRNA level. The peroxidase superfamily protein continuously increased in abundance during the course of recovery and was up-regulated at the mRNA level. HAD acid phosphatase was decreased at the protein level and down-regulated at the transcript level, while isoflavone reductase and an unknown protein were increased at both the protein and mRNA levels. Consistent with these findings, the enzymatic activity of peroxidase was decreased under flooding stress but increased significantly during the recovery sage. These results suggest that peroxidases might play key roles in post-flooding recovery in soybean roots through the scavenging of toxic radicals.

  18. Molecular study on some antibiotic resistant genes in Salmonella spp. isolates

    Science.gov (United States)

    Nabi, Ari Q.

    2017-09-01

    Studying the genes related with antimicrobial resistance in Salmonella spp. is a crucial step toward a correct and faster treatment of infections caused by the pathogen. In this work Integron mediated antibiotic resistant gene IntI1 (Class I Integrase IntI1) and some plasmid mediated antibiotic resistance genes (Qnr) were scanned among the isolated non-Typhoid Salmonellae strains with known resistance to some important antimicrobial drugs using Sybr Green real time PCR. The aim of the study was to correlate the multiple antibiotics and antimicrobial resistance of Salmonella spp. with the presence of integrase (IntI1) gene and plasmid mediated quinolone resistant genes. Results revealed the presence of Class I Integrase gene in 76% of the isolates with confirmed multiple antibiotic resistances. Moreover, about 32% of the multiple antibiotic resistant serotypes showed a positive R-PCR for plasmid mediated qnrA gene encoding for nalidixic acid and ciprofloxacin resistance. No positive results could be revealed form R-PCRs targeting qnrB or qnrS. In light of these results we can conclude that the presence of at least one of the qnr genes and/or the presence of Integrase Class I gene were responsible for the multiple antibiotic resistance to for nalidixic acid and ciprofloxacin from the studied Salmonella spp. and further studies required to identify the genes related with multiple antibiotic resistance of the pathogen.

  19. Integrase inhibitors in late pregnancy and rapid HIV viral load reduction.

    Science.gov (United States)

    Rahangdale, Lisa; Cates, Jordan; Potter, JoNell; Badell, Martina L; Seidman, Dominika; Miller, Emilly S; Coleman, Jenell S; Lazenby, Gweneth B; Levison, Judy; Short, William R; Yawetz, Sigal; Ciaranello, Andrea; Livingston, Elizabeth; Duthely, Lunthita; Rimawi, Bassam H; Anderson, Jean R; Stringer, Elizabeth M

    2016-03-01

    Minimizing time to HIV viral suppression is critical in pregnancy. Integrase strand transfer inhibitors (INSTIs), like raltegravir, are known to rapidly suppress plasma HIV RNA in nonpregnant adults. There are limited data in pregnant women. We describe time to clinically relevant reduction in HIV RNA in pregnant women using INSTI-containing and non-INSTI-containing antiretroviral therapy (ART) options. We conducted a retrospective cohort study of pregnant HIV-infected women in the United States from 2009 through 2015. We included women who initiated ART, intensified their regimen, or switched to a new regimen due to detectable viremia (HIV RNA >40 copies/mL) at ≥20 weeks gestation. Among women with a baseline HIV RNA permitting 1-log reduction, we estimated time to 1-log RNA reduction using the Kaplan-Meier estimator comparing women starting/adding an INSTI in their regimen vs other ART. To compare groups with similar follow-up time, we also conducted a subgroup analysis limited to women with ≤14 days between baseline and follow-up RNA data. This study describes 101 HIV-infected pregnant women from 11 US clinics. In all, 75% (76/101) of women were not taking ART at baseline; 24 were taking non-INSTI containing ART, and 1 received zidovudine monotherapy. In all, 39% (39/101) of women started an INSTI-containing regimen or added an INSTI to their ART regimen. Among 90 women with a baseline HIV RNA permitting 1-log reduction, the median time to 1-log RNA reduction was 8 days (interquartile range [IQR], 7-14) in the INSTI group vs 35 days (IQR, 20-53) in the non-INSTI ART group (P pregnancy. Inclusion of an INSTI may play a role in optimal reduction of HIV RNA for HIV-infected pregnant women presenting late to care or failing initial therapy. Larger studies are urgently needed to assess the safety and effectiveness of this approach. Copyright © 2016 Elsevier Inc. All rights reserved.

  20. Prediction of the binding mode and resistance profile for a dual-target pyrrolyl diketo acid scaffold against HIV-1 integrase and reverse-transcriptase-associated ribonuclease H.

    Science.gov (United States)

    Yang, Fengyuan; Zheng, Guoxun; Fu, Tingting; Li, Xiaofeng; Tu, Gao; Li, Ying Hong; Yao, Xiaojun; Xue, Weiwei; Zhu, Feng

    2018-06-27

    The rapid emergence of drug-resistant variants is one of the most common causes of highly active antiretroviral therapeutic (HAART) failure in patients infected with HIV-1. Compared with the existing HAART, the recently developed pyrrolyl diketo acid scaffold targeting both HIV-1 integrase (IN) and reverse transcriptase-associated ribonuclease H (RNase H) is an efficient approach to counteract the failure of anti-HIV treatment due to drug resistance. However, the binding mode and potential resistance profile of these inhibitors with important mechanistic principles remain poorly understood. To address this issue, an integrated computational method was employed to investigate the binding mode of inhibitor JMC6F with HIV-1 IN and RNase H. By using per-residue binding free energy decomposition analysis, the following residues: Asp64, Thr66, Leu68, Asp116, Tyr143, Gln148 and Glu152 in IN, Asp443, Glu478, Trp536, Lys541 and Asp549 in RNase H were identified as key residues for JMC6F binding. And then computational alanine scanning was carried to further verify the key residues. Moreover, the resistance profile of the currently known major mutations in HIV-1 IN and 2 mutations in RNase H against JMC6F was predicted by in silico mutagenesis studies. The results demonstrated that only three mutations in HIV-1 IN (Y143C, Q148R and N155H) and two mutations in HIV-1 RNase H (Y501R and Y501W) resulted in a reduction of JMC6F potency, thus indicating their potential role in providing resistance to JMC6F. These data provided important insights into the binding mode and resistance profile of the inhibitors with a pyrrolyl diketo acid scaffold in HIV-1 IN and RNase H, which would be helpful for the development of more effective dual HIV-1 IN and RNase H inhibitors.

  1. X-ray crystal structure of the N-terminal region of Moloney murine leukemia virus integrase and its implications for viral DNA recognition: N-Terminal Region of M-MuLV Integrase

    Energy Technology Data Exchange (ETDEWEB)

    Guan, Rongjin [Center for Advanced Biotechnology and Medicine, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Northeast Structural Genomics Consortium, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Department of Molecular Biology and Biochemistry, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Aiyer, Sriram [Department of Pharmacology, Robert Wood Johnson Medical School, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Cote, Marie L. [Department of Biochemistry, Robert Wood Johnson Medical School, UMDNJ, Piscataway New Jersey 08854; Xiao, Rong [Center for Advanced Biotechnology and Medicine, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Northeast Structural Genomics Consortium, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Department of Molecular Biology and Biochemistry, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Jiang, Mei [Center for Advanced Biotechnology and Medicine, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Northeast Structural Genomics Consortium, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Department of Molecular Biology and Biochemistry, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Acton, Thomas B. [Center for Advanced Biotechnology and Medicine, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Northeast Structural Genomics Consortium, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Department of Molecular Biology and Biochemistry, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Roth, Monica J. [Department of Pharmacology, Robert Wood Johnson Medical School, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Montelione, Gaetano T. [Center for Advanced Biotechnology and Medicine, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Northeast Structural Genomics Consortium, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Department of Molecular Biology and Biochemistry, Rutgers, The State University of New Jersey, Piscataway New Jersey 08854; Department of Biochemistry, Robert Wood Johnson Medical School, UMDNJ, Piscataway New Jersey 08854

    2017-02-03

    The retroviral integrase (IN) carries out the integration of a dsDNA copy of the viral genome into the host DNA, an essential step for viral replication. All IN proteins have three general domains, the N-terminal domain (NTD), the catalytic core domain, and the C-terminal domain. The NTD includes an HHCC zinc finger-like motif, which is conserved in all retroviral IN proteins. Two crystal structures of Moloney murine leukemia virus (M-MuLV) IN N-terminal region (NTR) constructs that both include an N-terminal extension domain (NED, residues 1–44) and an HHCC zinc-finger NTD (residues 45–105), in two crystal forms are reported. The structures of IN NTR constructs encoding residues 1–105 (NTR1–105) and 8–105 (NTR8–105) were determined at 2.7 and 2.15 Å resolution, respectively and belong to different space groups. While both crystal forms have similar protomer structures, NTR1–105 packs as a dimer and NTR8–105 packs as a tetramer in the asymmetric unit. The structure of the NED consists of three anti-parallel β-strands and an α-helix, similar to the NED of prototype foamy virus (PFV) IN. These three β-strands form an extended β-sheet with another β-strand in the HHCC Zn2+ binding domain, which is a unique structural feature for the M-MuLV IN. The HHCC Zn2+ binding domain structure is similar to that in HIV and PFV INs, with variations within the loop regions. Differences between the PFV and MLV IN NEDs localize at regions identified to interact with the PFV LTR and are compared with established biochemical and virological data for M-MuLV. Proteins 2017; 85:647–656.

  2. A QSAR study of integrase strand transfer inhibitors based on a large set of pyrimidine, pyrimidone, and pyridopyrazine carboxamide derivatives

    Science.gov (United States)

    de Campos, Luana Janaína; de Melo, Eduardo Borges

    2017-08-01

    In the present study, 199 compounds derived from pyrimidine, pyrimidone and pyridopyrazine carboxamides with inhibitory activity against HIV-1 integrase were modeled. Subsequently, a multivariate QSAR study was conducted with 54 molecules employed by Ordered Predictors Selection (OPS) and Partial Least Squares (PLS) for the selection of variables and model construction, respectively. Topological, electrotopological, geometric, and molecular descriptors were used. The selected real model was robust and free from chance correlation; in addition, it demonstrated favorable internal and external statistical quality. Once statistically validated, the training model was used to predict the activity of a second data set (n = 145). The root mean square deviation (RMSD) between observed and predicted values was 0.698. Although it is a value outside of the standards, only 15 (10.34%) of the samples exhibited higher residual values than 1 log unit, a result considered acceptable. Results of Williams and Euclidean applicability domains relative to the prediction showed that the predictions did not occur by extrapolation and that the model is representative of the chemical space of test compounds.

  3. Striking Plasticity of CRISPR-Cas9 and Key Role of Non-target DNA, as Revealed by Molecular Simulations.

    Science.gov (United States)

    Palermo, Giulia; Miao, Yinglong; Walker, Ross C; Jinek, Martin; McCammon, J Andrew

    2016-10-26

    The CRISPR (clustered regularly interspaced short palindromic repeats)-Cas9 system recently emerged as a transformative genome-editing technology that is innovating basic bioscience and applied medicine and biotechnology. The endonuclease Cas9 associates with a guide RNA to match and cleave complementary sequences in double stranded DNA, forming an RNA:DNA hybrid and a displaced non-target DNA strand. Although extensive structural studies are ongoing, the conformational dynamics of Cas9 and its interplay with the nucleic acids during association and DNA cleavage are largely unclear. Here, by employing multi-microsecond time scale molecular dynamics, we reveal the conformational plasticity of Cas9 and identify key determinants that allow its large-scale conformational changes during nucleic acid binding and processing. We show how the "closure" of the protein, which accompanies nucleic acid binding, fundamentally relies on highly coupled and specific motions of the protein domains, collectively initiating the prominent conformational changes needed for nucleic acid association. We further reveal a key role of the non-target DNA during the process of activation of the nuclease HNH domain, showing how the nontarget DNA positioning triggers local conformational changes that favor the formation of a catalytically competent Cas9. Finally, a remarkable conformational plasticity is identified as an intrinsic property of the HNH domain, constituting a necessary element that allows for the HNH repositioning. These novel findings constitute a reference for future experimental studies aimed at a full characterization of the dynamic features of the CRISPR-Cas9 system, and-more importantly-call for novel structure engineering efforts that are of fundamental importance for the rational design of new genome-engineering applications.

  4. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  5. Adeno-associated virus Rep-mediated targeting of integrase-defective retroviral vector DNA circles into human chromosome 19

    International Nuclear Information System (INIS)

    Huang, Shuohao; Kawabe, Yoshinori; Ito, Akira; Kamihira, Masamichi

    2012-01-01

    Highlights: ► Adeno-associated virus (AAV) is capable of targeted integration in human cells. ► Integrase-defective retroviral vector (IDRV) enables a circular DNA delivery. ► A targeted integration system of IDRV DNA using the AAV integration mechanism. ► Targeted IDRV integration ameliorates the safety concerns for retroviral vectors. -- Abstract: Retroviral vectors have been employed in clinical trials for gene therapy owing to their relative large packaging capacity, alterable cell tropism, and chromosomal integration for stable transgene expression. However, uncontrollable integrations of transgenes are likely to cause safety issues, such as insertional mutagenesis. A targeted transgene integration system for retroviral vectors, therefore, is a straightforward way to address the insertional mutagenesis issue. Adeno-associated virus (AAV) is the only known virus capable of targeted integration in human cells. In the presence of AAV Rep proteins, plasmids possessing the p5 integration efficiency element (p5IEE) can be integrated into the AAV integration site (AAVS1) in the human genome. In this report, we describe a system that can target the circular DNA derived from non-integrating retroviral vectors to the AAVS1 site by utilizing the Rep/p5IEE integration mechanism. Our results showed that after G418 selection 30% of collected clones had retroviral DNA targeted at the AAVS1 site.

  6. [Isolation and identification of the temperate bacteriophage from isolated strains of Streptococcus suis serotype 2].

    Science.gov (United States)

    Ma, Yuling; Lu, Chengping; Fan, Hongjie

    2008-04-01

    A PCR assay was developed to study the distributional characteristics of phage integrase gene in Streptococcus suis serotype 2 (SS2). A 323bp distinct DNA target can be amplified in 25 strains of virulent SS2, while can not be amplified in avirulent strain T15, 5 strains of other serotypes (SS1, SS7, SS9) and strains of group C Streptococcus strains from pigs, which suggested that the phage integrase gene may be related to the pathogenicity of SS2 and can be consider as a detection factor of the virulent gene of SS2. The sequencing and restriction endonuclease analysis of the PCR products were also done. Comparisons between the sequences of phage integrase gene with that of SS2 strain, showed a high homology with SS2 China strains 98HAH33, 05ZYH33 and North American strain 89-1591. Complete cell lysis was observed with SS2 virulent strains but not with avirulent strain T15 after the induction by mitomycin C. Electron microscopy analysis of the lysate from SS2 virulent strains HA9801 and ZY05719 revealed the presence of phage particles. The induced phage, named SS2-HA and SS2-ZY, both have a small isometric nucleocapsid approximately 50 nm in diameter and have no tail and is therefore a member of the Tectiviridae family. The phage integrase gene sequence of phage SS2-HA and SS2-ZY shared high homologue identities with virulent SS2 strains, which suggested that the phage integrase gene of SS2 has high specify. The temperate phage and phage integrase gene can only detected from SS2 virulent strains but not from avirulent strain, and the detection of phage integrase gene was related to the virulence-associate factors of SS2, such as the muramidase-released protein gene (mrp), which suggested that the temperate phage of SS2 may be related to the pathogenicity of SS2.

  7. The key microorganisms for anaerobic degradation of pentachlorophenol in paddy soil as revealed by stable isotope probing

    Energy Technology Data Exchange (ETDEWEB)

    Tong, Hui [Guangdong Key Laboratory of Agricultural Environment Pollution Integrated Control, Guangdong Institute of Eco-Environmental and Soil Sciences, Guangzhou 510650 (China); Guangzhou Institute of Geochemistry, Chinese Academy of Sciences, Guangzhou 510640 (China); University of Chinese Academy of Sciences, Beijing 100049 (China); Liu, Chengshuai [State Key Laboratory of Environmental Geochemistry, Institute of Geochemistry, Chinese Academy of Sciences, Guiyang 550009 (China); Li, Fangbai, E-mail: cefbli@soil.gd.cn [Guangdong Key Laboratory of Agricultural Environment Pollution Integrated Control, Guangdong Institute of Eco-Environmental and Soil Sciences, Guangzhou 510650 (China); Luo, Chunling [Guangzhou Institute of Geochemistry, Chinese Academy of Sciences, Guangzhou 510640 (China); Chen, Manjia; Hu, Min [Guangdong Key Laboratory of Agricultural Environment Pollution Integrated Control, Guangdong Institute of Eco-Environmental and Soil Sciences, Guangzhou 510650 (China)

    2015-11-15

    Highlights: • SIP suggested that Dechloromonas can mineralize PCP in soil. • Methanosaeta and Methanocella acquired PCP-derived carbon. • Lactate enhanced microbial degradation of PCP in soil. - Abstract: Pentachlorophenol (PCP) is a common residual persistent pesticide in paddy soil and has resulted in harmful effect on soil ecosystem. The anaerobic microbial transformation of PCP, therefore, has been received much attentions, especially the functional microbial communities for the reductive transformation. However, the key functional microorganisms for PCP mineralization in the paddy soil still remain unknown. In this work, DNA-based stable isotope probing (SIP) was applied to explore the key microorganisms responsible for PCP mineralization in paddy soil. The SIP results indicated that the dominant bacteria responsible for PCP biodegradation belonged to the genus Dechloromonas of the class β-Proteobacteria. In addition, the increased production of {sup 13}CH{sub 4} and {sup 13}CO{sub 2} indicated that the addition of lactate enhanced the rate of biodegradation and mineralization of PCP. Two archaea classified as the genera of Methanosaeta and Methanocella of class Methanobacteria were enriched in the heavy fraction when with lactate, whereas no archaea was detected in the absence of lactate. These findings provide direct evidence for the species of bacteria and archaea responsible for anaerobic PCP or its breakdown products mineralization and reveal a new insight into the microorganisms linked with PCP degradation in paddy soil.

  8. The key microorganisms for anaerobic degradation of pentachlorophenol in paddy soil as revealed by stable isotope probing

    International Nuclear Information System (INIS)

    Tong, Hui; Liu, Chengshuai; Li, Fangbai; Luo, Chunling; Chen, Manjia; Hu, Min

    2015-01-01

    Highlights: • SIP suggested that Dechloromonas can mineralize PCP in soil. • Methanosaeta and Methanocella acquired PCP-derived carbon. • Lactate enhanced microbial degradation of PCP in soil. - Abstract: Pentachlorophenol (PCP) is a common residual persistent pesticide in paddy soil and has resulted in harmful effect on soil ecosystem. The anaerobic microbial transformation of PCP, therefore, has been received much attentions, especially the functional microbial communities for the reductive transformation. However, the key functional microorganisms for PCP mineralization in the paddy soil still remain unknown. In this work, DNA-based stable isotope probing (SIP) was applied to explore the key microorganisms responsible for PCP mineralization in paddy soil. The SIP results indicated that the dominant bacteria responsible for PCP biodegradation belonged to the genus Dechloromonas of the class β-Proteobacteria. In addition, the increased production of 13 CH 4 and 13 CO 2 indicated that the addition of lactate enhanced the rate of biodegradation and mineralization of PCP. Two archaea classified as the genera of Methanosaeta and Methanocella of class Methanobacteria were enriched in the heavy fraction when with lactate, whereas no archaea was detected in the absence of lactate. These findings provide direct evidence for the species of bacteria and archaea responsible for anaerobic PCP or its breakdown products mineralization and reveal a new insight into the microorganisms linked with PCP degradation in paddy soil

  9. Mechanism of inhibition of HIV-1 integrase by G-tetrad-forming oligonucleotides in Vitro.

    Science.gov (United States)

    Jing, N; Marchand, C; Liu, J; Mitra, R; Hogan, M E; Pommier, Y

    2000-07-14

    The G-tetrad-forming oligonucleotides and have been identified as potent inhibitors of human immunodeficiency virus type 1 integrase (HIV-1 IN) activity (Rando, R. F., Ojwang, J., Elbaggari, A., Reyes, G. R., Tinder, R., McGrath, M. S., and Hogan, M. E. (1995) J. Biol. Chem. 270, 1754-1760; Mazumder, A., Neamati, N., Ojwang, J. O., Sunder, S., Rando, R. F., and Pommier, Y. (1996) Biochemistry 35, 13762-13771; Jing, N., and Hogan, M. E. (1998) J. Biol. Chem. 273, 34992-34999). To understand the inhibition of HIV-1 IN activity by the G-quartet inhibitors, we have designed the oligonucleotides and, composed of three and four G-quartets with stem lengths of 19 and 24 A, respectively. The fact that increasing the G-quartet stem length from 15 to 24 A kept inhibition of HIV-1 IN activity unchanged suggests that the binding interaction occurs between a GTGT loop domain of the G-quartet inhibitors and a catalytic site of HIV-1 IN, referred to as a face-to-face interaction. Docking the NMR structure of (Jing and Hogan (1998)) into the x-ray structure of the core domain of HIV-1 IN, HIV-1 IN-(51-209) (Maignan, S., Guilloteau, J.-P. , Qing, Z.-L., Clement-Mella, C., and Mikol, V. (1998) J. Mol. Biol. 282, 359-368), was performed using the GRAMM program. The statistical distributions of hydrogen bonding between HIV-1 IN and were obtained from the analyses of 1000 random docking structures. The docking results show a high probability of interaction between the GTGT loop residues of the G-quartet inhibitors and the catalytic site of HIV-1 IN, in agreement with the experimental observation.

  10. Data integration reveals key homeostatic mechanisms following low dose radiation exposure

    Energy Technology Data Exchange (ETDEWEB)

    Tilton, Susan C.; Matzke, Melissa M. [Computational Biology and Bioinformatics, Pacific Northwest National Laboratory, Richland, WA 99338 (United States); Sowa, Marianne B.; Stenoien, David L.; Weber, Thomas J. [Health Impacts and Exposure Science, Pacific Northwest National Laboratory, Richland, WA 99338 (United States); Morgan, William F. [Biological Sciences Division, Pacific Northwest National Laboratory, Richland, WA 99338 (United States); Waters, Katrina M., E-mail: katrina.waters@pnnl.gov [Biological Sciences Division, Pacific Northwest National Laboratory, Richland, WA 99338 (United States)

    2015-05-15

    The goal of this study was to define pathways regulated by low dose radiation to understand how biological systems respond to subtle perturbations in their environment and prioritize pathways for human health assessment. Using an in vitro 3-D human full thickness skin model, we have examined the temporal response of dermal and epidermal layers to 10 cGy X-ray using transcriptomic, proteomic, phosphoproteomic and metabolomic platforms. Bioinformatics analysis of each dataset independently revealed potential signaling mechanisms affected by low dose radiation, and integrating data shed additional insight into the mechanisms regulating low dose responses in human tissue. We examined direct interactions among datasets (top down approach) and defined several hubs as significant regulators, including transcription factors (YY1, MYC and CREB1), kinases (CDK2, PLK1) and a protease (MMP2). These data indicate a shift in response across time — with an increase in DNA repair, tissue remodeling and repression of cell proliferation acutely (24–72 h). Pathway-based integration (bottom up approach) identified common molecular and pathway responses to low dose radiation, including oxidative stress, nitric oxide signaling and transcriptional regulation through the SP1 factor that would not have been identified by the individual data sets. Significant regulation of key downstream metabolites of nitrative stress was measured within these pathways. Among the features identified in our study, the regulation of MMP2 and SP1 was experimentally validated. Our results demonstrate the advantage of data integration to broadly define the pathways and networks that represent the mechanisms by which complex biological systems respond to perturbation. - Highlights: • Low dose ionizing radiation altered homeostasis in 3D skin tissue model. • Global gene/protein/metabolite data integrated using complementary statistical approaches • Time and location-specific change in matrix regulation

  11. Comparative Genomics of Methanopyrus sp. SNP6 and KOL6 Revealing Genomic Regions of Plasticity Implicated in Extremely Thermophilic Profiles

    Directory of Open Access Journals (Sweden)

    Zhiliang Yu

    2017-07-01

    Full Text Available Methanopyrus spp. are usually isolated from harsh niches, such as high osmotic pressure and extreme temperature. However, the molecular mechanisms for their environmental adaption are poorly understood. Archaeal species is commonly considered as primitive organism. The evolutional placement of archaea is a fundamental and intriguing scientific question. We sequenced the genomes of Methanopyrus strains SNP6 and KOL6 isolated from the Atlantic and Iceland, respectively. Comparative genomic analysis revealed genetic diversity and instability implicated in niche adaption, including a number of transporter- and integrase/transposase-related genes. Pan-genome analysis also defined the gene pool of Methanopyrus spp., in addition of ~120-Kb genomic region of plasticity impacting cognate genomic architecture. We believe that Methanopyrus genomics could facilitate efficient investigation/recognition of archaeal phylogenetic diverse patterns, as well as improve understanding of biological roles and significance of these versatile microbes.

  12. The S230R Integrase Substitution Associated with Viral Rebound during DTG Monotherapy Confers Low Levels INSTI Drug Resistance.

    Science.gov (United States)

    Pham, Hanh T; Labrie, Lydia; Wijting, Ingeborg E A; Hassounah, Said; Lok, Ka Yee; Portna, Inna; Goring, Mark; Han, Yingshan; Lungu, Cynthia; van der Ende, Marchina E; Brenner, Bluma G; Boucher, Charles A; Rijnders, Bart J A; van Kampen, Jeroen J A; Mesplède, Thibault; Wainberg, Mark A

    2018-03-29

    Dolutegravir (DTG) is an integrase strand-transfer inhibitor (INSTI) used for treatment of HIV-infected individuals. Due to its high genetic barrier to resistance, DTG has been clinically investigated as maintenance monotherapy to maintain viral suppression and to reduce complication and healthcare costs. Our study aims to explain the underlying mechanism related to the emergence of a S230R substitution in patients who experienced virological failure while using DTG monotherapy. We evaluated the effect of S230R substitution in regard to IN enzyme activity, viral infectivity, replicative capacity and susceptibility to different INSTIs by biochemical and cell-based assays. S230R substitution conferred 63% reduction in enzyme efficiency. The S230R virus was 1.29-fold less infectious than wildtype (WT), but could replicate in PM1 cells without significant delay. Resistance levels against DTG, CAB, RAL and EVG in tissue culture were 3.85-, 3.72-, 1.52-, and 1.21-fold, respectively. Our data indicate that the S230R substitution is comparable to the previously reported R263K in some respects. Virological failure under DTG monotherapy can occur through the development of such S230R or R263K mutations without the need for high levels DTG resistance.

  13. A long-acting integrase inhibitor protects female macaques from repeated high-dose intravaginal SHIV challenge.

    Science.gov (United States)

    Andrews, Chasity D; Yueh, Yun Lan; Spreen, William R; St Bernard, Leslie; Boente-Carrera, Mar; Rodriguez, Kristina; Gettie, Agegnehu; Russell-Lodrigue, Kasi; Blanchard, James; Ford, Susan; Mohri, Hiroshi; Cheng-Mayer, Cecilia; Hong, Zhi; Ho, David D; Markowitz, Martin

    2015-01-14

    Long-acting GSK1265744 (GSK744 LA) is a strand transfer inhibitor of the HIV/SIV (simian immunodeficiency virus) integrase and was shown to be an effective preexposure prophylaxis (PrEP) agent in a low-dose intrarectal SHIV (simian-human immunodeficiency virus) rhesus macaque challenge model. We examined the pharmacokinetics and efficacy of GSK744 LA as PrEP against repeat high-dose intravaginal SHIV challenge in female rhesus macaques treated with Depo-Provera (depot medroxyprogesterone acetate), which promotes viral transmission vaginally. When Depo-Provera-treated female rhesus macaques were dosed with GSK744 LA (50 mg/kg) monthly, systemic and tissue drug concentrations were lower than previously observed in male rhesus macaques. GSK744 concentrations were fivefold lower on average in cervical tissues than in rectal tissues. Eight female rhesus macaques were treated with GSK744 LA at week 0, and four female rhesus macaques served as controls. All animals received a high-dose challenge of SHIV162P3 at week 1. No infection was detected in GSK744 LA-treated rhesus macaques, whereas viremia was detected 1 to 2 weeks after SHIV challenge in all control animals. The GSK744 LA-treated rhesus macaques were given a second administration of drug at week 4 and further challenged at weeks 5 and 7. GSK744 LA treatment protected six of eight female rhesus macaques against three high-dose SHIV challenges, whereas all control animals became infected after the first challenge (P = 0.0003, log-rank test). These results support further clinical development of GSK744 LA for PrEP. Copyright © 2015, American Association for the Advancement of Science.

  14. Integrated bioinformatics analysis reveals key candidate genes and pathways in breast cancer.

    Science.gov (United States)

    Wang, Yuzhi; Zhang, Yi; Huang, Qian; Li, Chengwen

    2018-04-19

    Breast cancer (BC) is the leading malignancy in women worldwide, yet relatively little is known about the genes and signaling pathways involved in BC tumorigenesis and progression. The present study aimed to elucidate potential key candidate genes and pathways in BC. Five gene expression profile data sets (GSE22035, GSE3744, GSE5764, GSE21422 and GSE26910) were downloaded from the Gene Expression Omnibus (GEO) database, which included data from 113 tumorous and 38 adjacent non‑tumorous tissue samples. Differentially expressed genes (DEGs) were identified using t‑tests in the limma R package. These DEGs were subsequently investigated by pathway enrichment analysis and a protein‑protein interaction (PPI) network was constructed. The most significant module from the PPI network was selected for pathway enrichment analysis. In total, 227 DEGs were identified, of which 82 were upregulated and 145 were downregulated. Pathway enrichment analysis results revealed that the upregulated DEGs were mainly enriched in 'cell division', the 'proteinaceous extracellular matrix (ECM)', 'ECM structural constituents' and 'ECM‑receptor interaction', whereas downregulated genes were mainly enriched in 'response to drugs', 'extracellular space', 'transcriptional activator activity' and the 'peroxisome proliferator‑activated receptor signaling pathway'. The PPI network contained 174 nodes and 1,257 edges. DNA topoisomerase 2‑a, baculoviral inhibitor of apoptosis repeat‑containing protein 5, cyclin‑dependent kinase 1, G2/mitotic‑specific cyclin‑B1 and kinetochore protein NDC80 homolog were identified as the top 5 hub genes. Furthermore, the genes in the most significant module were predominantly involved in 'mitotic nuclear division', 'mid‑body', 'protein binding' and 'cell cycle'. In conclusion, the DEGs, relative pathways and hub genes identified in the present study may aid in understanding of the molecular mechanisms underlying BC progression and provide

  15. Many-objective optimization and visual analytics reveal key trade-offs for London's water supply

    Science.gov (United States)

    Matrosov, Evgenii S.; Huskova, Ivana; Kasprzyk, Joseph R.; Harou, Julien J.; Lambert, Chris; Reed, Patrick M.

    2015-12-01

    In this study, we link a water resource management simulator to multi-objective search to reveal the key trade-offs inherent in planning a real-world water resource system. We consider new supplies and demand management (conservation) options while seeking to elucidate the trade-offs between the best portfolios of schemes to satisfy projected water demands. Alternative system designs are evaluated using performance measures that minimize capital and operating costs and energy use while maximizing resilience, engineering and environmental metrics, subject to supply reliability constraints. Our analysis shows many-objective evolutionary optimization coupled with state-of-the art visual analytics can help planners discover more diverse water supply system designs and better understand their inherent trade-offs. The approach is used to explore future water supply options for the Thames water resource system (including London's water supply). New supply options include a new reservoir, water transfers, artificial recharge, wastewater reuse and brackish groundwater desalination. Demand management options include leakage reduction, compulsory metering and seasonal tariffs. The Thames system's Pareto approximate portfolios cluster into distinct groups of water supply options; for example implementing a pipe refurbishment program leads to higher capital costs but greater reliability. This study highlights that traditional least-cost reliability constrained design of water supply systems masks asset combinations whose benefits only become apparent when more planning objectives are considered.

  16. L-Chicoric acid inhibits human immunodeficiency virus type 1 integration in vivo and is a noncompetitive but reversible inhibitor of HIV-1 integrase in vitro

    International Nuclear Information System (INIS)

    Reinke, Ryan A.; Lee, Deborah J.; McDougall, Brenda R.; King, Peter J.; Victoria, Joseph; Mao Yingqun; Lei Xiangyang; Reinecke, Manfred G.; Robinson, W. Edward

    2004-01-01

    The human immunodeficiency virus (HIV) integrase (IN) must covalently join the viral cDNA into a host chromosome for productive HIV infection. L-Chicoric acid (L-CA) enters cells poorly but is a potent inhibitor of IN in vitro. Using quantitative real-time polymerase chain reaction (PCR), L-CA inhibits integration at concentrations from 500 nM to 10 μM but also inhibits entry at concentrations above 1 μM. Using recombinant HIV IN, steady-state kinetic analyses with L-CA were consistent with a noncompetitive or irreversible mechanism of inhibition. IN, in the presence or absence of L-CA, was successively washed. Inhibition of IN diminished, demonstrating that L-CA was reversibly bound to the protein. These data demonstrate that L-CA is a noncompetitive but reversible inhibitor of IN in vitro and of HIV integration in vivo. Thus, L-CA likely interacts with amino acids other than those which bind substrate

  17. Inverse correlation between promoter strength and excision activity in class 1 integrons.

    Directory of Open Access Journals (Sweden)

    Thomas Jové

    2010-01-01

    Full Text Available Class 1 integrons are widespread genetic elements that allow bacteria to capture and express gene cassettes that are usually promoterless. These integrons play a major role in the dissemination of antibiotic resistance among Gram-negative bacteria. They typically consist of a gene (intI encoding an integrase (that catalyzes the gene cassette movement by site-specific recombination, a recombination site (attI1, and a promoter (Pc responsible for the expression of inserted gene cassettes. The Pc promoter can occasionally be combined with a second promoter designated P2, and several Pc variants with different strengths have been described, although their relative distribution is not known. The Pc promoter in class 1 integrons is located within the intI1 coding sequence. The Pc polymorphism affects the amino acid sequence of IntI1 and the effect of this feature on the integrase recombination activity has not previously been investigated. We therefore conducted an extensive in silico study of class 1 integron sequences in order to assess the distribution of Pc variants. We also measured these promoters' strength by means of transcriptional reporter gene fusion experiments and estimated the excision and integration activities of the different IntI1 variants. We found that there are currently 13 Pc variants, leading to 10 IntI1 variants, that have a highly uneven distribution. There are five main Pc-P2 combinations, corresponding to five promoter strengths, and three main integrases displaying similar integration activity but very different excision efficiency. Promoter strength correlates with integrase excision activity: the weaker the promoter, the stronger the integrase. The tight relationship between the aptitude of class 1 integrons to recombine cassettes and express gene cassettes may be a key to understanding the short-term evolution of integrons. Dissemination of integron-driven drug resistance is therefore more complex than previously thought.

  18. Clinical Improvement by Switching to an Integrase Strand Transfer Inhibitor in Hemophiliac Patients with HIV: The Japan Cohort Study of HIV Patients Infected through Blood Products.

    Science.gov (United States)

    Kawado, Miyuki; Hashimoto, Shuji; Oka, Shin-Ichi; Fukutake, Katsuyuki; Higasa, Satoshi; Yatsuhashi, Hiroshi; Ogane, Miwa; Okamoto, Manabu; Shirasaka, Takuma

    2017-01-01

    This study aimed to determine improvement in HIV RNA levels and the CD4 cell count by switching to an antiretroviral regimen with an integrase strand transfer inhibitor (INSTI) in patients with HIV. This study was conducted on Japanese patients with HIV who were infected by blood products in the 1980s. Data were collected between 2007 and 2014. Data of 564 male hemophiliac patients with HIV from the Japan Cohort Study of HIV Patients Infected through Blood Products were available. Changes in antiretroviral regimen use, HIV RNA levels, and the CD4 cell count between 2007 and 2014 were examined. From 2007 to 2014, the proportion of use of a regimen with an INSTI increased from 0.0% to 41.0%. For patients with HIV who used a regimen, including an INSTI, the proportion of HIV RNA levels products. This suggests that performing this switch in clinical practice will lead to favorable effects.

  19. Epigenomic Co-localization and Co-evolution Reveal a Key Role for 5hmC as a Communication Hub in the Chromatin Network of ESCs

    Directory of Open Access Journals (Sweden)

    David Juan

    2016-02-01

    Full Text Available Summary: Epigenetic communication through histone and cytosine modifications is essential for gene regulation and cell identity. Here, we propose a framework that is based on a chromatin communication model to get insight on the function of epigenetic modifications in ESCs. The epigenetic communication network was inferred from genome-wide location data plus extensive manual annotation. Notably, we found that 5-hydroxymethylcytosine (5hmC is the most-influential hub of this network, connecting DNA demethylation to nucleosome remodeling complexes and to key transcription factors of pluripotency. Moreover, an evolutionary analysis revealed a central role of 5hmC in the co-evolution of chromatin-related proteins. Further analysis of regions where 5hmC co-localizes with specific interactors shows that each interaction points to chromatin remodeling, stemness, differentiation, or metabolism. Our results highlight the importance of cytosine modifications in the epigenetic communication of ESCs. : 5-hydroxymethylcytosine (5hmC plays a key role in the epigenomic communication network of embryonic stem cells. Juan et al. build a communication network based in co-localization of epigenomic data and literature. The analysis of the network and its components reveals that proteins reading and editing 5hmC co-evolve and serve as links between diverse molecular processes.

  20. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  1. Pathogenicity Island Cross Talk Mediated by Recombination Directionality Factors Facilitates Excision from the Chromosome.

    Science.gov (United States)

    Carpenter, Megan R; Rozovsky, Sharon; Boyd, E Fidelma

    2015-12-14

    Pathogenicity islands (PAIs) are mobile integrated genetic elements (MIGEs) that contain a diverse range of virulence factors and are essential in the evolution of pathogenic bacteria. PAIs are widespread among bacteria and integrate into the host genome, commonly at a tRNA locus, via integrase-mediated site-specific recombination. The excision of PAIs is the first step in the horizontal transfer of these elements and is not well understood. In this study, we examined the role of recombination directionality factors (RDFs) and their relationship with integrases in the excision of two PAIs essential for Vibrio cholerae host colonization: Vibrio pathogenicity island 1 (VPI-1) and VPI-2. VPI-1 does not contain an RDF, which allowed us to answer the question of whether RDFs are an absolute requirement for excision. We found that an RDF was required for efficient excision of VPI-2 but not VPI-1 and that RDFs can induce excision of both islands. Expression data revealed that the RDFs act as transcriptional repressors to both VPI-1- and VPI-2-encoded integrases. We demonstrated that the RDFs Vibrio excision factor A (VefA) and VefB bind at the attachment sites (overlapping the int promoter region) of VPI-1 and VPI-2, thus supporting this mode of integrase repression. In addition, V. cholerae RDFs are promiscuous due to their dual functions of promoting excision of both VPI-1 and VPI-2 and acting as negative transcriptional regulators of the integrases. This is the first demonstration of cross talk between PAIs mediated via RDFs which reveals the complex interactions that occur between separately acquired MIGEs. Deciphering the mechanisms of pathogenicity island excision is necessary for understanding the evolution and spread of these elements to their nonpathogenic counterparts. Such mechanistic insight would assist in predicting the mobility of uncharacterized genetic elements. This study identified extensive RDF-mediated cross talk between two nonhomologous VPIs and

  2. Autoshaping of key pecking in pigeons with negative reinforcement.

    Science.gov (United States)

    Rachlin, H

    1969-07-01

    Pigeons exposed to gradually increasing intensities of pulsing electric shock pecked a key and thereby reduced the intensity of shock to zero for 2 min. Acquisition of key pecking was brought about through an autoshaping process in which periodic brief keylight presentations immediately preceded automatic reduction of the shock. On the occasions of such automatic reduction of shock preceding the first measured key peck, little or no orientation to the key was observed. Observations of pigeons with autoshaping of positive reinforcement also revealed little evidence of orientation toward the key.

  3. Key characteristics of different management styles

    OpenAIRE

    AGADZHANYAN A.S.

    2015-01-01

    The article reveals main management styles practiсed by managers all over the world. The author considers key characteristics of management styles, conditions of their using. The paper analyzes cultural differences in management styles in the West and in the East.

  4. The ΦBT1 large serine recombinase catalyzes DNA integration at pseudo-attB sites in the genus Nocardia

    Directory of Open Access Journals (Sweden)

    Marion Herisse

    2018-05-01

    Full Text Available Plasmid vectors based on bacteriophage integrases are important tools in molecular microbiology for the introduction of foreign DNA, especially into bacterial species where other systems for genetic manipulation are limited. Site specific integrases catalyze recombination between phage and bacterial attachment sites (attP and attB, respectively and the best studied integrases in the actinomycetes are the serine integrases from the Streptomyces bacteriophages ΦC31 and ΦBT1. As this reaction is unidirectional and highly stable, vectors containing phage integrase systems have been used in a number of genetic engineering applications. Plasmids bearing the ΦBT1 integrase have been used to introduce DNA into Streptomyces and Amycolatopsis strains; however, they have not been widely studied in other actinobacterial genera. Here, we show that vectors based on ΦBT1 integrase can stably integrate into the chromosomes of a range of Nocardia species, and that this integration occurs despite the absence of canonical attB sites in these genomes. Furthermore, we show that a ΦBT1 integrase-based vector can insert at multiple pseudo-attB sites within a single strain and we determine the sequence of a pseudo-attB motif. These data suggest that ΦBT1 integrase-based vectors can be used to readily and semi-randomly introduce foreign DNA into the genomes of a range of Nocardia species. However, the precise site of insertion will likely require empirical determination in each species to avoid unexpected off-target effects.

  5. Dolutegravir versus placebo in subjects harbouring HIV-1 with integrase inhibitor resistance associated substitutions: 48-week results from VIKING-4, a randomized study.

    Science.gov (United States)

    Akil, Bisher; Blick, Gary; Hagins, Debbie P; Ramgopal, Moti N; Richmond, Gary J; Samuel, Rafik M; Givens, Naomi; Vavro, Cindy; Song, Ivy H; Wynne, Brian; Ait-Khaled, Mounir

    2015-01-01

    The Phase III VIKING-3 study demonstrated that dolutegravir (DTG) 50 mg twice daily was efficacious in antiretroviral therapy (ART)-experienced subjects harbouring raltegravir- and/or elvitegravir-resistant HIV-1. VIKING-4 (ING116529) included a placebo-controlled 7-day monotherapy phase to demonstrate that short-term antiviral activity was attributable to DTG. VIKING-4 is a Phase III randomized, double-blind study in therapy-experienced adults with integrase inhibitor (INI)-resistant virus randomized to DTG 50 mg twice daily or placebo while continuing their failing regimen (without raltegravir or elvitegravir) for 7 days (clinicaltrials.gov identifier NCT01568892). At day 8, all subjects switched to open-label DTG 50 mg twice daily and optimized background therapy including ≥1 fully active drug. The primary end point was change from baseline in plasma HIV-1 RNA at day 8. The study population (n=30) was highly ART-experienced with advanced HIV disease. Patients had extensive baseline resistance to all approved antiretroviral classes. Adjusted mean change in HIV-1 RNA at day 8 was 
-1.06 log10 copies/ml for the DTG arm and 0.10 log10 copies/ml for the placebo arm (treatment difference -1.16 log10 copies/ml [-1.52, -0.80]; PVIKING-3 study.

  6. Valuing snorkeling visits to the Florida Keys with stated and revealed preference models

    Science.gov (United States)

    Timothy Park; J. Michael Bowker; Vernon R. Leeworthy

    2002-01-01

    Coastal coral reefs, especially in the Florida Keys, are declining at a disturbing rate. Marine ecologists and reef scientists have emphasized the importance of establishing nonmarket values of coral reefs to assess the cost effectiveness of coral reef management and remediation programs. The purpose of this paper is to develop a travel cost--contingent valuation model...

  7. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  8. Primary resistance to integrase strand-transfer inhibitors in Europe

    DEFF Research Database (Denmark)

    Casadellà, M; van Ham, P M; Noguera-Julian, M

    2015-01-01

    the introduction of InSTIs. However, polymorphisms contributing to InSTI resistance were not rare. As InSTI use becomes more widespread, continuous surveillance of primary InSTI resistance is warranted. These data will be key to modelling the kinetics of InSTI resistance transmission in Europe in the coming years....

  9. Targeted transgene insertion into the CHO cell genome using Cre recombinase-incorporating integrase-defective retroviral vectors.

    Science.gov (United States)

    Kawabe, Yoshinori; Shimomura, Takuya; Huang, Shuohao; Imanishi, Suguru; Ito, Akira; Kamihira, Masamichi

    2016-07-01

    Retroviral vectors have served as efficient gene delivery tools in various biotechnology fields. However, viral DNA is randomly inserted into the genome, which can cause problems, such as insertional mutagenesis and gene silencing. Previously, we reported a site-specific gene integration system, in which a transgene is integrated into a predetermined chromosomal locus of Chinese hamster ovary (CHO) cells using integrase-defective retroviral vectors (IDRVs) and Cre recombinase. In this system, a Cre expression plasmid is transfected into founder cells before retroviral transduction. In practical applications of site-specific gene modification such as for hard-to-transfect cells or for in vivo gene delivery, both the transgene and the Cre protein into retroviral virions should be encapsulate. Here, we generated novel hybrid IDRVs in which viral genome and enzymatically active Cre can be delivered (Cre-IDRVs). Cre-IDRVs encoding marker genes, neomycin resistance and enhanced green fluorescent protein (EGFP), flanked by wild-type and mutated loxP sites were produced using an expression plasmid for a chimeric protein of Cre and retroviral gag-pol. After analyzing the incorporation of the Cre protein into retroviral virions by Western blotting, the Cre-IDRV was infected into founder CHO cells, in which marker genes (hygromycin resistance and red fluorescent protein) flanked with corresponding loxP sites are introduced into the genome. G418-resistant colonies expressing GFP appeared and the site-specific integration of the transgene into the expected chromosomal site was confirmed by PCR and sequencing of amplicons. Moreover, when Cre-IDRV carried a gene expression unit for a recombinant antibody, the recombinant cells in which the antibody expression cassette was integrated in a site-specific manner were generated and the cells produced the recombinant antibody. This method may provide a promising tool to perform site-specific gene modification according to Cre

  10. Autoshaping of key pecking in pigeons with negative reinforcement1

    Science.gov (United States)

    Rachlin, Howard

    1969-01-01

    Pigeons exposed to gradually increasing intensities of pulsing electric shock pecked a key and thereby reduced the intensity of shock to zero for 2 min. Acquisition of key pecking was brought about through an autoshaping process in which periodic brief keylight presentations immediately preceded automatic reduction of the shock. On the occasions of such automatic reduction of shock preceding the first measured key peck, little or no orientation to the key was observed. Observations of pigeons with autoshaping of positive reinforcement also revealed little evidence of orientation toward the key. ImagesFig. 3.Fig. 4. PMID:16811371

  11. The history of antiretrovirals: key discoveries over the past 25 years.

    Science.gov (United States)

    De Clercq, Erik

    2009-09-01

    Within 25 years after zidovudine (3'-azido-2',3'-dideoxythymidine, AZT) was first described as an inhibitor of HIV replication, 25 anti-HIV drugs have been formally approved for clinical use in the treatment of HIV infections: seven nucleoside reverse transcriptase inhibitors (NRTIs): zidovudine, didanosine, zalcitabine, stavudine, lamivudine, abacavir and emtricitabine; one nucleotide reverse transcriptase inhibitor (NtRTI): tenofovir [in its oral prodrug form: tenofovir disoproxil fumarate (TDF)]; four non-nucleoside reverse transcriptase inhibitors (NNRTIs): nevirapine, delavirdine, efavirenz and etravirine; ten protease inhibitors (PIs): saquinavir, ritonavir, indinavir, nelfinavir, amprenavir, lopinavir, atazanavir, fosamprenavir, tipranavir and darunavir; one fusion inhibitor (FI): enfuvirtide; one co-receptor inhibitor (CRI): maraviroc and one integrase inhibitor (INI): raltegravir. These compounds are used in various drug combination (some at fixed dose) regimens so as to achieve the highest possible benefit and tolerability, and to diminish the risk of virus-drug resistance development. (c) 2009 John Wiley & Sons, Ltd.

  12. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  13. Public-Key Encryption with Non-interactive Opening

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Hofheinz, Dennis; Kiltz, Eike

    2008-01-01

    We formally define the primitive of public-key encryption with non-interactive opening (PKENO), where the receiver of a ciphertext C can, convincingly and without interaction, reveal what the result was of decrypting C, without compromising the scheme’s security. This has numerous applications...

  14. Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices

    International Nuclear Information System (INIS)

    Gaidash, A A; Egorov, V I; Gleim, A V

    2016-01-01

    Quantum cryptography allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source of quantum states. In order to prevent actions of an eavesdropper, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. In this paper, we describe an alternative method based on monitoring photon number statistics after detection. We provide a useful rule of thumb to estimate approximate order of difference of expected distribution and distribution in case of attack. Formula for calculating a minimum value of total pulses or time-gaps to resolve attack is shown. Also formulas for actual fraction of raw key known to Eve were derived. This method can therefore be used with any system and even combining with mentioned special protocols. (paper)

  15. Insights into the Functions of a Prophage Recombination Directionality Factor

    Directory of Open Access Journals (Sweden)

    Mireille Ansaldi

    2012-10-01

    Full Text Available Recombination directionality factors (RDFs, or excisionases, are essential players of prophage excisive recombination. Despite the essentially catalytic role of the integrase in both integrative and excisive recombination, RDFs are required to direct the reaction towards excision and to prevent re-integration of the prophage genome when entering a lytic cycle. KplE1, HK620 and numerous (prophages that integrate at the same site in enterobacteria genomes (such as the argW tRNA gene all share a highly conserved recombination module. This module comprises the attL and attR recombination sites and the RDF and integrase genes. The KplE1 RDF was named TorI after its initial identification as a negative regulator of the tor operon. However, it was characterized as an essential factor of excisive recombination. In this study, we designed an extensive random mutagenesis protocol of the torI gene and identified key residues involved in both functions of the TorI protein. We show that, in addition to TorI-TorR protein-protein interaction, TorI interacts in solution with the IntS integrase. Moreover, in vitro, TorR and IntS appear to compete for TorI binding. Finally, our mutagenesis results suggest that the C-terminal part of the TorI protein is dedicated to protein-protein interactions with both proteins TorR and IntS.

  16. Development of elvitegravir resistance and linkage of integrase inhibitor mutations with protease and reverse transcriptase resistance mutations.

    Directory of Open Access Journals (Sweden)

    Mark A Winters

    Full Text Available Failure of antiretroviral regimens containing elvitegravir (EVG and raltegravir (RAL can result in the appearance of integrase inhibitor (INI drug-resistance mutations (DRMs. While several INI DRMs have been identified, the evolution of EVG DRMs and the linkage of these DRMs with protease inhibitor (PI and reverse transcriptase inhibitor (RTI DRMs have not been studied at the clonal level. We examined the development of INI DRMs in 10 patients failing EVG-containing regimens over time, and the linkage of INI DRMs with PI and RTI DRMs in these patients plus 6 RAL-treated patients. A one-step RT-nested PCR protocol was used to generate a 2.7 kB amplicon that included the PR, RT, and IN coding region, and standard cloning and sequencing techniques were used to determine DRMs in 1,277 clones (mean 21 clones per time point. Results showed all patients had multiple PI, NRTI, and/or NNRTI DRMs at baseline, but no primary INI DRM. EVG-treated patients developed from 2 to 6 strains with different primary INI DRMs as early as 2 weeks after initiation of treatment, predominantly as single mutations. The prevalence of these strains fluctuated and new strains, and/or strains with new combinations of INI DRMs, developed over time. Final failure samples (weeks 14 to 48 typically showed a dominant strain with multiple mutations or N155H alone. Single N155H or multiple mutations were also observed in RAL-treated patients at virologic failure. All patient strains showed evidence of INI DRM co-located with single or multiple PI and/or RTI DRMs on the same viral strand. Our study shows that EVG treatment can select for a number of distinct INI-resistant strains whose prevalence fluctuates over time. Continued appearance of new INI DRMs after initial INI failure suggests a potent, highly dynamic selection of INI resistant strains that is unaffected by co-location with PI and RTI DRMs.

  17. Effect of temperature on the fate of genes encoding tetracycline resistance and the integrase of class 1 integrons within anaerobic and aerobic digesters treating municipal wastewater solids.

    Science.gov (United States)

    Diehl, David L; LaPara, Timothy M

    2010-12-01

    The objective of this research was to investigate the ability of anaerobic and aerobic digesters to reduce the quantity of antibiotic resistant bacteria in wastewater solids. Lab-scale digesters were operated at different temperatures (22 °C, 37 °C, 46 °C, and 55 °C) under both anaerobic and aerobic conditions and fed wastewater solids collected from a full-scale treatment facility. Quantitative PCR was used to track five genes encoding tetracycline resistance (tet(A), tet(L), tet(O), tet(W), and tet(X)) and the gene encoding the integrase (intI1) of class 1 integrons. Statistically significant reductions in the quantities of these genes occurred in the anaerobic reactors at 37 °C, 46 °C, and 55 °C, with the removal rates and removal efficiencies increasing as a function of temperature. The aerobic digesters, in contrast, were generally incapable of significantly decreasing gene quantities, although these digesters were operated at much shorter mean hydraulic residence times. This research suggests that high temperature anaerobic digestion of wastewater solids would be a suitable technology for eliminating various antibiotic resistance genes, an emerging pollutant of concern.

  18. A Single-Center Retrospective Cohort Analysis of Maternal and Infant Outcomes in HIV-Infected Mothers Treated with Integrase Inhibitors During Pregnancy.

    Science.gov (United States)

    Mounce, Monique L; Pontiggia, Laura; Adams, Jessica L

    2017-12-01

    Integrase strand transfer inhibitors (INSTI) are currently being investigated for the treatment of HIV in pregnancy. The purpose of this study is to evaluate the differences in maternal and infant outcomes in HIV-positive mothers treated with INSTI-containing antiretroviral therapy (ART) during pregnancy compared to protease inhibitor (PI)-containing ART. A retrospective, cohort study of INSTI- and PI-based ART used in pregnancy between 2007 and 2015 was performed. The primary objective was to evaluate the differences in viral load (VL) suppression prior to delivery. Secondary endpoints included time to and duration of VL suppression and safety parameters in both mothers and infants. For the primary analysis, the two arms were matched 1:2 INSTI to PI based on the presence or absence of viremia at the time of pregnancy determination. Additional analysis was performed on the entire matched and unmatched dataset. Twenty-one patients were matched (7 INSTI and 14 PI). There were no significant differences between groups with respect to the proportion of patients with VL suppression prior to delivery (71.4% INSTI vs. 92.9% PI, p = 0.247), and there were no significant differences in any of the secondary endpoints. Patients with documented adherence issues were statistically more likely to not be virologically suppressed prior to delivery (p = 0.002). No differences in efficacy or safety were found between patients treated with INSTIs compared to PIs. This study supports the further investigation of the use of INSTIs during pregnancy to reduce HIV transmission.

  19. Transcriptome Analysis of Three Sheep Intestinal Regions reveals Key Pathways and Hub Regulatory Genes of Large Intestinal Lipid Metabolism.

    Science.gov (United States)

    Chao, Tianle; Wang, Guizhi; Ji, Zhibin; Liu, Zhaohua; Hou, Lei; Wang, Jin; Wang, Jianmin

    2017-07-13

    The large intestine, also known as the hindgut, is an important part of the animal digestive system. Recent studies on digestive system development in ruminants have focused on the rumen and the small intestine, but the molecular mechanisms underlying sheep large intestine metabolism remain poorly understood. To identify genes related to intestinal metabolism and to reveal molecular regulation mechanisms, we sequenced and compared the transcriptomes of mucosal epithelial tissues among the cecum, proximal colon and duodenum. A total of 4,221 transcripts from 3,254 genes were identified as differentially expressed transcripts. Between the large intestine and duodenum, differentially expressed transcripts were found to be significantly enriched in 6 metabolism-related pathways, among which PPAR signaling was identified as a key pathway. Three genes, CPT1A, LPL and PCK1, were identified as higher expression hub genes in the large intestine. Between the cecum and colon, differentially expressed transcripts were significantly enriched in 5 lipid metabolism related pathways, and CEPT1 and MBOAT1 were identified as hub genes. This study provides important information regarding the molecular mechanisms of intestinal metabolism in sheep and may provide a basis for further study.

  20. Mutational analyses of the core domain of Avian Leukemia and Sarcoma Viruses integrase: critical residues for concerted integration and multimerization

    International Nuclear Information System (INIS)

    Moreau, Karen; Faure, Claudine; Violot, Sebastien; Gouet, Patrice; Verdier, Gerard; Ronfort, Corinne

    2004-01-01

    During replicative cycle of retroviruses, the reverse-transcribed viral DNA is integrated into the cell DNA by the viral integrase (IN) enzyme. The central core domain of IN contains the catalytic site of the enzyme and is involved in binding viral ends and cell DNA as well as dimerization. We previously performed single amino acid substitutions in the core domain of an Avian Leukemia and Sarcoma Virus (ALSV) IN [Arch. Virol. 147 (2002) 1761]. Here, we modeled the resulting IN mutants and analyzed the ability of these mutants to mediate concerted DNA integration in an in vitro assay, and to form dimers by protein-protein cross-linking and size exclusion chromatography. The N197C mutation resulted in the inability of the mutant to perform concerted integration that was concomitant with a loss of IN dimerization. Surprisingly, mutations Q102G and A106V at the dimer interface resulted in mutants with higher efficiencies than the wild-type IN in performing two-ended concerted integration of viral DNA ends. The G139D and A195V mutants had a trend to perform one-ended DNA integration of viral ends instead of two-ended integration. More drastically, the I88L and L135G mutants preferentially mediated nonconcerted DNA integration although the proteins form dimers. Therefore, these mutations may alter the formation of IN complexes of higher molecular size than a dimer that would be required for concerted integration. This study points to the important role of core domain residues in the concerted integration of viral DNA ends as well as in the oligomerization of the enzyme

  1. Redefinition and unification of the SXT/R391 family of integrative and conjugative elements.

    Science.gov (United States)

    Bioteau, Audrey; Durand, Romain; Burrus, Vincent

    2018-04-13

    Integrative and conjugative elements (ICEs) of the SXT/R391 family are key drivers of the spread of antibiotic resistance in Vibrio cholerae , the infectious agent of cholera, and other pathogenic bacteria. The SXT/R391 family of ICEs was defined based on the conservation of a core set of 52 genes and site-specific integration into the 5' end of the chromosomal gene prfC Hence, the integrase gene int has been intensively used as a marker to detect SXT/R391 ICEs in clinical isolates. ICEs sharing most core genes but differing by their integration site and integrase gene have been recently reported and excluded from the SXT/R391 family. Here we explored the prevalence and diversity of atypical ICEs in Genbank databases and their relationship with typical SXT/R391 ICEs. We found atypical ICEs in V. cholerae isolates that predate the emergence and expansion of typical SXT/R391 ICEs in the mid-1980s in seventh pandemic toxigenic V. cholerae O1 and O139 strains. Our analyses revealed that while atypical ICEs are not associated with antibiotic resistance genes, they often carry cation efflux pumps suggesting heavy metal resistance. Atypical ICEs constitute a polyphyletic group likely because of occasional recombination events with typical ICEs. Furthermore, we show that the alternative integration and excision genes of atypical ICEs remain under the control of SetCD, the main activator of the conjugative functions of SXT/R391 ICEs. Together these observations indicate that substitution of the integration/excision module and change of specificity of integration do not preclude atypical ICEs from inclusion into the SXT/R391 family. Importance Vibrio cholerae is the causative agent of cholera, an acute intestinal infection that remains to this day a world public health threat. Integrative and conjugative elements (ICEs) of the SXT/R391 family have played a major role in spreading antimicrobial resistance in seventh pandemic V. cholerae but also in several species of

  2. Keys to the success of the CB Conquero

    Directory of Open Access Journals (Sweden)

    C. Fernández-Espínola

    2016-12-01

    Full Text Available When a team gets sport successes to level profesional, generates the topics that will be investigated such as the key factors of the succes. The main aim of this study is to analyze the influencie of different factors like the sports context, the social context and training aspects in the success of the Club Baloncesto Conquero through direct perception of thirteen informants associated with the team and the basketball in Huelva. An interview was carried out, related with those factors and the keys to success. The results revealed that workforce planning along the great work of coaching staff, medical staff and physical trainer have been key to the team gets sport successes.

  3. Key Players in I-DmoI Endonuclease Catalysis Revealed from Structure and Dynamics

    DEFF Research Database (Denmark)

    Molina, Rafael; Besker, Neva; Marcaida, Maria Jose

    2016-01-01

    . The cleavage mechanism was related both to key structural effects, such as the position of water molecules and ions participating in the cleavage reaction, and to dynamical effects related to protein behavior. In particular, we found that the protein perturbation pattern significantly changes between cleaved......Homing endonucleases, such as I-DmoI, specifically recognize and cleave long DNA target sequences (∼20 bp) and are potentially powerful tools for genome manipulation. However, inefficient and off-target DNA cleavage seriously limits specific editing in complex genomes. One approach to overcome...

  4. In vivo phosphoproteome characterization reveals key starch granule-binding phosphoproteins involved in wheat water-deficit response.

    Science.gov (United States)

    Chen, Guan-Xing; Zhen, Shou-Min; Liu, Yan-Lin; Yan, Xing; Zhang, Ming; Yan, Yue-Ming

    2017-10-23

    Drought stress during grain development causes significant yield loss in cereal production. The phosphorylated modification of starch granule-binding proteins (SGBPs) is an important mechanism regulating wheat starch biosynthesis. In this study, we performed the first proteomics and phosphoproteomics analyses of SGBPs in elite Chinese bread wheat (Triticum aestivum L.) cultivar Jingdong 17 under well-watered and water-stress conditions. Water stress treatment caused significant reductions in spike grain numbers and weight, total starch and amylopectin content, and grain yield. Two-dimensional gel electrophoresis revealed that the quantity of SGBPs was reduced significantly by water-deficit treatment. Phosphoproteome characterization of SGBPs under water-deficit treatment demonstrated a reduced level of phosphorylation of main starch synthesis enzymes, particularly for granule-bound starch synthase (GBSS I), starch synthase II-a (SS II-a), and starch synthase III (SS III). Specifically, the Ser34 site of the GBSSI protein, the Tyr358 site of SS II-a, and the Ser837 site of SS III-a exhibited significant less phosphorylation under water-deficit treatment than well-watered treatment. Furthermore, the expression levels of several key genes related with starch biosynthesis detected by qRT-PCR were decreased significantly at 15 days post-anthesis under water-deficit treatment. Immunolocalization showed a clear movement of GBSS I from the periphery to the interior of starch granules during grain development, under both water-deficit and well-watered conditions. Our results demonstrated that the reduction in gene expression or transcription level, protein expression and phosphorylation levels of starch biosynthesis related enzymes under water-deficit conditions is responsible for the significant decrease in total starch content and grain yield.

  5. Information Systems Management: an Australian view of the key issues

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1994-05-01

    Full Text Available Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The results reveal that IS strategic planning continues to be the paramount issue in our industry, as are many issues associated with IS strategic planning, including responsiveness of the IT infrastructure, effective use of the data resource, IS for competitive advantage, and a comprehensive information architecture. A greater emphasis on quality is also revealed in highly rated issues such as effective use of the data resource, data integrity and quality assurance, and the quality of software development

  6. Mode of inhibition of HIV-1 Integrase by a C-terminal domain-specific monoclonal antibody*

    Directory of Open Access Journals (Sweden)

    Merkel George

    2006-06-01

    Full Text Available Abstract Background To further our understanding of the structure and function of HIV-1 integrase (IN we developed and characterized a library of monoclonal antibodies (mAbs directed against this protein. One of these antibodies, mAb33, which is specific for the C-terminal domain, was found to inhibit HIV-1 IN processing activity in vitro; a corresponding Fv fragment was able to inhibit HIV-1 integration in vivo. Our subsequent studies, using heteronuclear nuclear magnetic resonance spectroscopy, identified six solvent accessible residues on the surface of the C-terminal domain that were immobilized upon binding of the antibody, which were proposed to comprise the epitope. Here we test this hypothesis by measuring the affinity of mAb33 to HIV-1 proteins that contain Ala substitutions in each of these positions. To gain additional insight into the mode of inhibition we also measured the DNA binding capacity and enzymatic activities of the Ala substituted proteins. Results We found that Ala substitution of any one of five of the putative epitope residues, F223, R224, Y226, I267, and I268, caused a decrease in the affinity of the mAb33 for HIV-1 IN, confirming the prediction from NMR data. Although IN derivatives with Ala substitutions in or near the mAb33 epitope exhibited decreased enzymatic activity, none of the epitope substitutions compromised DNA binding to full length HIV-1 IN, as measured by surface plasmon resonance spectroscopy. Two of these derivatives, IN (I276A and IN (I267A/I268A, exhibited both increased DNA binding affinity and uncharacteristic dissociation kinetics; these proteins also exhibited non-specific nuclease activity. Results from these investigations are discussed in the context of current models for how the C-terminal domain interacts with substrate DNA. Conclusion It is unlikely that inhibition of HIV-1 IN activity by mAb33 is caused by direct interaction with residues that are essential for substrate binding. Rather

  7. Structure of Rhodococcus equi virulence-associated protein B (VapB) reveals an eight-stranded antiparallel β-barrel consisting of two Greek-key motifs

    International Nuclear Information System (INIS)

    Geerds, Christina; Wohlmann, Jens; Haas, Albert; Niemann, Hartmut H.

    2014-01-01

    The structure of VapB, a member of the Vap protein family that is involved in virulence of the bacterial pathogen R. equi, was determined by SAD phasing and reveals an eight-stranded antiparallel β-barrel similar to avidin, suggestive of a binding function. Made up of two Greek-key motifs, the topology of VapB is unusual or even unique. Members of the virulence-associated protein (Vap) family from the pathogen Rhodococcus equi regulate virulence in an unknown manner. They do not share recognizable sequence homology with any protein of known structure. VapB and VapA are normally associated with isolates from pigs and horses, respectively. To contribute to a molecular understanding of Vap function, the crystal structure of a protease-resistant VapB fragment was determined at 1.4 Å resolution. The structure was solved by SAD phasing employing the anomalous signal of one endogenous S atom and two bound Co ions with low occupancy. VapB is an eight-stranded antiparallel β-barrel with a single helix. Structural similarity to avidins suggests a potential binding function. Unlike other eight- or ten-stranded β-barrels found in avidins, bacterial outer membrane proteins, fatty-acid-binding proteins and lysozyme inhibitors, Vaps do not have a next-neighbour arrangement but consist of two Greek-key motifs with strand order 41238567, suggesting an unusual or even unique topology

  8. Structure of Rhodococcus equi virulence-associated protein B (VapB) reveals an eight-stranded antiparallel β-barrel consisting of two Greek-key motifs

    Energy Technology Data Exchange (ETDEWEB)

    Geerds, Christina [Bielefeld University, Universitaetsstrasse 25, 33615 Bielefeld (Germany); Wohlmann, Jens; Haas, Albert [University of Bonn, Ulrich-Haberland Strasse 61a, 53121 Bonn (Germany); Niemann, Hartmut H., E-mail: hartmut.niemann@uni-bielefeld.de [Bielefeld University, Universitaetsstrasse 25, 33615 Bielefeld (Germany)

    2014-06-18

    The structure of VapB, a member of the Vap protein family that is involved in virulence of the bacterial pathogen R. equi, was determined by SAD phasing and reveals an eight-stranded antiparallel β-barrel similar to avidin, suggestive of a binding function. Made up of two Greek-key motifs, the topology of VapB is unusual or even unique. Members of the virulence-associated protein (Vap) family from the pathogen Rhodococcus equi regulate virulence in an unknown manner. They do not share recognizable sequence homology with any protein of known structure. VapB and VapA are normally associated with isolates from pigs and horses, respectively. To contribute to a molecular understanding of Vap function, the crystal structure of a protease-resistant VapB fragment was determined at 1.4 Å resolution. The structure was solved by SAD phasing employing the anomalous signal of one endogenous S atom and two bound Co ions with low occupancy. VapB is an eight-stranded antiparallel β-barrel with a single helix. Structural similarity to avidins suggests a potential binding function. Unlike other eight- or ten-stranded β-barrels found in avidins, bacterial outer membrane proteins, fatty-acid-binding proteins and lysozyme inhibitors, Vaps do not have a next-neighbour arrangement but consist of two Greek-key motifs with strand order 41238567, suggesting an unusual or even unique topology.

  9. Proteomic analyses reveal the key roles of BrlA and AbaA in biogenesis of gliotoxin in Aspergillus fumigatus

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Kwang-Soo, E-mail: shinks@dju.kr [Division of Life Science, Daejeon University, Daejeon, 300-716 (Korea, Republic of); Kim, Young Hwan [Biomedical Omics Team, Korea Basic Science Institute (KBSI), Ohcang, 368-883 (Korea, Republic of); Graduate School of Analytical Science and Technology, Chungnam National University, Daejeon, 305-764 (Korea, Republic of); Department of Bio-Analytical Science, University of Science and Technology, Daejeon, 305-333 (Korea, Republic of); Yu, Jae-Hyuk, E-mail: jyu1@wisc.edu [Departments of Bacteriology and Genetics, The University of Wisconsin–Madison, Madison, WI, 53706 (United States)

    2015-07-31

    The opportunistic human pathogenic fungus Aspergillus fumigatus primarily reproduces by forming a large number of asexual spores (conidia). Sequential activation of the central regulators BrlA, AbaA and WetA is necessary for the fungus to undergo asexual development. In this study, to address the presumed roles of these key developmental regulators during proliferation of the fungus, we analyzed and compared the proteomes of vegetative cells of wild type (WT) and individual mutant strains. Approximately 1300 protein spots were detectable from 2-D electrophoresis gels. Among these, 13 proteins exhibiting significantly altered accumulation levels were further identified by ESI-MS/MS. Markedly, we found that the GliM and GliT proteins associated with gliotoxin (GT) biosynthesis and self-protection of the fungus from GT were significantly down-regulated in the ΔabaA and ΔbrlA mutants. Moreover, mRNA levels of other GT biosynthetic genes including gliM, gliP, gliT, and gliZ were significantly reduced in both mutant strains, and no and low levels of GT were detectable in the ΔbrlA and ΔabaA mutant strains, respectively. As GliT is required for the protection of the fungus from GT, growth of the ΔbrlA mutant with reduced levels of GliT was severely impaired by exogenous GT. Our studies demonstrate that AbaA and BrlA positively regulate expression of the GT biosynthetic gene cluster in actively growing vegetative cells, and likely bridge morphological and chemical development during the life-cycle of A. fumigatus. - Highlights: • Proteome analyses of WT and mutants reveal 13 differentially expressed proteins. • The GliT and GliM proteins are significantly down-regulated by ΔabaA and ΔbrlA. • Expression of other gliotoxin biosynthetic genes is lowered by ΔabaA and ΔbrlA. • Growth of ΔbrlA strain lacking GliT is completely inhibited by exogenous gliotoxin. • BrlA and AbaA play key roles in biogenesis of gliotoxin in Aspergillus fumigatus.

  10. Proteomic analyses reveal the key roles of BrlA and AbaA in biogenesis of gliotoxin in Aspergillus fumigatus

    International Nuclear Information System (INIS)

    Shin, Kwang-Soo; Kim, Young Hwan; Yu, Jae-Hyuk

    2015-01-01

    The opportunistic human pathogenic fungus Aspergillus fumigatus primarily reproduces by forming a large number of asexual spores (conidia). Sequential activation of the central regulators BrlA, AbaA and WetA is necessary for the fungus to undergo asexual development. In this study, to address the presumed roles of these key developmental regulators during proliferation of the fungus, we analyzed and compared the proteomes of vegetative cells of wild type (WT) and individual mutant strains. Approximately 1300 protein spots were detectable from 2-D electrophoresis gels. Among these, 13 proteins exhibiting significantly altered accumulation levels were further identified by ESI-MS/MS. Markedly, we found that the GliM and GliT proteins associated with gliotoxin (GT) biosynthesis and self-protection of the fungus from GT were significantly down-regulated in the ΔabaA and ΔbrlA mutants. Moreover, mRNA levels of other GT biosynthetic genes including gliM, gliP, gliT, and gliZ were significantly reduced in both mutant strains, and no and low levels of GT were detectable in the ΔbrlA and ΔabaA mutant strains, respectively. As GliT is required for the protection of the fungus from GT, growth of the ΔbrlA mutant with reduced levels of GliT was severely impaired by exogenous GT. Our studies demonstrate that AbaA and BrlA positively regulate expression of the GT biosynthetic gene cluster in actively growing vegetative cells, and likely bridge morphological and chemical development during the life-cycle of A. fumigatus. - Highlights: • Proteome analyses of WT and mutants reveal 13 differentially expressed proteins. • The GliT and GliM proteins are significantly down-regulated by ΔabaA and ΔbrlA. • Expression of other gliotoxin biosynthetic genes is lowered by ΔabaA and ΔbrlA. • Growth of ΔbrlA strain lacking GliT is completely inhibited by exogenous gliotoxin. • BrlA and AbaA play key roles in biogenesis of gliotoxin in Aspergillus fumigatus

  11. The Qualitative Study of Key Performance Indicator on PT. Jiwasraya Manado

    OpenAIRE

    Rangian, Geby Melisa; Tumewu, Ferdinand

    2014-01-01

    Key Performance Indicator (KPI) is one of the most common tools used by the employees of companies to help manage more effectively and guide their progress. To perceive how far the achievement and the performance of the company, PT. Jiwasraya Manado use the Key Performance Indicator (KPI) to reveal the performance of the company. The objective of this study is to analyze the importance from the implementation of the key performance indicator for the insurance employee. There are several facts...

  12. Contribution of the C-terminal tri-lysine regions of human immunodeficiency virus type 1 integrase for efficient reverse transcription and viral DNA nuclear import

    Directory of Open Access Journals (Sweden)

    Fowke Keith R

    2005-10-01

    Full Text Available Abstract Background In addition to mediating the integration process, HIV-1 integrase (IN has also been implicated in different steps during viral life cycle including reverse transcription and viral DNA nuclear import. Although the karyophilic property of HIV-1 IN has been well demonstrated using a variety of experimental approaches, the definition of domain(s and/or motif(s within the protein that mediate viral DNA nuclear import and its mechanism are still disputed and controversial. In this study, we performed mutagenic analyses to investigate the contribution of different regions in the C-terminal domain of HIV-1 IN to protein nuclear localization as well as their effects on virus infection. Results Our analysis showed that replacing lysine residues in two highly conserved tri-lysine regions, which are located within previously described Region C (235WKGPAKLLWKGEGAVV and sequence Q (211KELQKQITK in the C-terminal domain of HIV-1 IN, impaired protein nuclear accumulation, while mutations for RK263,4 had no significant effect. Analysis of their effects on viral infection in a VSV-G pseudotyped RT/IN trans-complemented HIV-1 single cycle replication system revealed that all three C-terminal mutant viruses (KK215,9AA, KK240,4AE and RK263,4AA exhibited more severe defect of induction of β-Gal positive cells and luciferase activity than an IN class 1 mutant D64E in HeLa-CD4-CCR5-β-Gal cells, and in dividing as well as non-dividing C8166 T cells, suggesting that some viral defects are occurring prior to viral integration. Furthermore, by analyzing viral DNA synthesis and the nucleus-associated viral DNA level, the results clearly showed that, although all three C-terminal mutants inhibited viral reverse transcription to different extents, the KK240,4AE mutant exhibited most profound effect on this step, whereas KK215,9AA significantly impaired viral DNA nuclear import. In addition, our analysis could not detect viral DNA integration in each C

  13. A novel co-crystal structure affords the design of gain-of-function lentiviral integrase mutants in the presence of modified PSIP1/LEDGF/p75.

    Directory of Open Access Journals (Sweden)

    Stephen Hare

    2009-01-01

    Full Text Available Lens epithelium derived growth factor (LEDGF, also known as PC4 and SFRS1 interacting protein 1 (PSIP1 and transcriptional co-activator p75, is the cellular binding partner of lentiviral integrase (IN proteins. LEDGF accounts for the characteristic propensity of Lentivirus to integrate within active transcription units and is required for efficient viral replication. We now present a crystal structure containing the N-terminal and catalytic core domains (NTD and CCD of HIV-2 IN in complex with the IN binding domain (IBD of LEDGF. The structure extends the known IN-LEDGF interface, elucidating primarily charge-charge interactions between the NTD of IN and the IBD. A constellation of acidic residues on the NTD is characteristic of lentiviral INs, and mutations of the positively charged residues on the IBD severely affect interaction with all lentiviral INs tested. We show that the novel NTD-IBD contacts are critical for stimulation of concerted lentiviral DNA integration by LEDGF in vitro and for its function during the early steps of HIV-1 replication. Furthermore, the new structural details enabled us to engineer a mutant of HIV-1 IN that primarily functions only when presented with a complementary LEDGF mutant. These findings provide structural basis for the high affinity lentiviral IN-LEDGF interaction and pave the way for development of LEDGF-based targeting technologies for gene therapy.

  14. Logic programming reveals alteration of key transcription factors in multiple myeloma.

    Science.gov (United States)

    Miannay, Bertrand; Minvielle, Stéphane; Roux, Olivier; Drouin, Pierre; Avet-Loiseau, Hervé; Guérin-Charbonnel, Catherine; Gouraud, Wilfried; Attal, Michel; Facon, Thierry; Munshi, Nikhil C; Moreau, Philippe; Campion, Loïc; Magrangeas, Florence; Guziolowski, Carito

    2017-08-23

    Innovative approaches combining regulatory networks (RN) and genomic data are needed to extract biological information for a better understanding of diseases, such as cancer, by improving the identification of entities and thereby leading to potential new therapeutic avenues. In this study, we confronted an automatically generated RN with gene expression profiles (GEP) from a cohort of multiple myeloma (MM) patients and normal individuals using global reasoning on the RN causality to identify key-nodes. We modeled each patient by his or her GEP, the RN and the possible automatically detected repairs needed to establish a coherent flow of the information that explains the logic of the GEP. These repairs could represent cancer mutations leading to GEP variability. With this reasoning, unmeasured protein states can be inferred, and we can simulate the impact of a protein perturbation on the RN behavior to identify therapeutic targets. We showed that JUN/FOS and FOXM1 activities are altered in almost all MM patients and identified two survival markers for MM patients. Our results suggest that JUN/FOS-activation has a strong impact on the RN in view of the whole GEP, whereas FOXM1-activation could be an interesting way to perturb an MM subgroup identified by our method.

  15. New hematological key for bovine leukemia virus-infected Japanese Black cattle.

    Science.gov (United States)

    Mekata, Hirohisa; Yamamoto, Mari; Kirino, Yumi; Sekiguchi, Satoshi; Konnai, Satoru; Horii, Yoichiro; Norimine, Junzo

    2018-02-20

    The European Community's (EC) Key, which is also called Bendixen's Key, is a well-established bovine leukemia virus (BLV) diagnostic method that classifies cattle according to the absolute lymphocyte count and age. The EC Key was originally designed for dairy cattle and is not necessarily suitable for Japanese Black (JB) beef cattle. This study revealed the lymphocyte counts in the BLV-free and -infected JB cattle were significantly lower than those in the Holstein cattle. Therefore, applying the EC Key to JB cattle could result in a large number of undetected BLV-infected cattle. Our proposed hematological key, which was designed for JB cattle, improves the detection of BLV-infected cattle by approximately 20%. We believe that this study could help promote BLV control.

  16. The γ Dor stars as revealed by Kepler: A key to reveal deep-layer rotation in A and F stars

    Directory of Open Access Journals (Sweden)

    Salmon S. J. A. J.

    2017-01-01

    Full Text Available The γ Dor pulsating stars present high-order gravity modes, which make them important targets in the intermediate-and low-mass main-sequence region of the Hertzsprung-Russell diagram. Whilst we have only access to rotation in the envelope of the Sun, the g modes of γ Dor stars can in principle deliver us constraints on the inner layers. With the puzzling discovery of unexpectedly low rotation rates in the core of red giants, the γ Dor stars appear now as unique targets to explore internal angular momentum transport in the progenitors of red giants. Yet, the γ Dor pulsations remain hard to detect from the ground for their periods are close to 1 day. While the CoRoT space mission first revealed intriguing frequency spectra, the almost uninterrupted 4-year photometry from the Kepler mission eventually shed a new light on them. It revealed regularities in the spectra, expected to bear signature of physical processes, including rotation, in the shear layers close to the convective core. We present here the first results of our effort to derive exploitable seismic diagnosis for mid- to fast rotators among γ Dor stars. We confirm their potential to explore the rotation history of this early phase of stellar evolution.

  17. Development of pharmacophore similarity-based quantitative activity hypothesis and its applicability domain: applied on a diverse data-set of HIV-1 integrase inhibitors.

    Science.gov (United States)

    Kumar, Sivakumar Prasanth; Jasrai, Yogesh T; Mehta, Vijay P; Pandya, Himanshu A

    2015-01-01

    Quantitative pharmacophore hypothesis combines the 3D spatial arrangement of pharmacophore features with biological activities of the ligand data-set and predicts the activities of geometrically and/or pharmacophoric similar ligands. Most pharmacophore discovery programs face difficulties in conformational flexibility, molecular alignment, pharmacophore features sampling, and feature selection to score models if the data-set constitutes diverse ligands. Towards this focus, we describe a ligand-based computational procedure to introduce flexibility in aligning the small molecules and generating a pharmacophore hypothesis without geometrical constraints to define pharmacophore space, enriched with chemical features necessary to elucidate common pharmacophore hypotheses (CPHs). Maximal common substructure (MCS)-based alignment method was adopted to guide the alignment of carbon molecules, deciphered the MCS atom connectivity to cluster molecules in bins and subsequently, calculated the pharmacophore similarity matrix with the bin-specific reference molecules. After alignment, the carbon molecules were enriched with original atoms in their respective positions and conventional pharmacophore features were perceived. Distance-based pharmacophoric descriptors were enumerated by computing the interdistance between perceived features and MCS-aligned 'centroid' position. The descriptor set and biological activities were used to develop support vector machine models to predict the activities of the external test set. Finally, fitness score was estimated based on pharmacophore similarity with its bin-specific reference molecules to recognize the best and poor alignments and, also with each reference molecule to predict outliers of the quantitative hypothesis model. We applied this procedure to a diverse data-set of 40 HIV-1 integrase inhibitors and discussed its effectiveness with the reported CPH model.

  18. Quantum key distribution with an entangled light emitting diode

    Energy Technology Data Exchange (ETDEWEB)

    Dzurnak, B.; Stevenson, R. M.; Nilsson, J.; Dynes, J. F.; Yuan, Z. L.; Skiba-Szymanska, J.; Shields, A. J. [Toshiba Research Europe Limited, 208 Science Park, Milton Road, Cambridge CB4 0GZ (United Kingdom); Farrer, I.; Ritchie, D. A. [Cavendish Laboratory, University of Cambridge, JJ Thomson Avenue, Cambridge CB3 0HE (United Kingdom)

    2015-12-28

    Measurements performed on entangled photon pairs shared between two parties can allow unique quantum cryptographic keys to be formed, creating secure links between users. An advantage of using such entangled photon links is that they can be adapted to propagate entanglement to end users of quantum networks with only untrusted nodes. However, demonstrations of quantum key distribution with entangled photons have so far relied on sources optically excited with lasers. Here, we realize a quantum cryptography system based on an electrically driven entangled-light-emitting diode. Measurement bases are passively chosen and we show formation of an error-free quantum key. Our measurements also simultaneously reveal Bell's parameter for the detected light, which exceeds the threshold for quantum entanglement.

  19. Bimodal voltage dependence of TRPA1: mutations of a key pore helix residue reveal strong intrinsic voltage-dependent inactivation.

    Science.gov (United States)

    Wan, Xia; Lu, Yungang; Chen, Xueqin; Xiong, Jian; Zhou, Yuanda; Li, Ping; Xia, Bingqing; Li, Min; Zhu, Michael X; Gao, Zhaobing

    2014-07-01

    Transient receptor potential A1 (TRPA1) is implicated in somatosensory processing and pathological pain sensation. Although not strictly voltage-gated, ionic currents of TRPA1 typically rectify outwardly, indicating channel activation at depolarized membrane potentials. However, some reports also showed TRPA1 inactivation at high positive potentials, implicating voltage-dependent inactivation. Here we report a conserved leucine residue, L906, in the putative pore helix, which strongly impacts the voltage dependency of TRPA1. Mutation of the leucine to cysteine (L906C) converted the channel from outward to inward rectification independent of divalent cations and irrespective to stimulation by allyl isothiocyanate. The mutant, but not the wild-type channel, displayed exclusively voltage-dependent inactivation at positive potentials. The L906C mutation also exhibited reduced sensitivity to inhibition by TRPA1 blockers, HC030031 and ruthenium red. Further mutagenesis of the leucine to all natural amino acids individually revealed that most substitutions at L906 (15/19) resulted in inward rectification, with exceptions of three amino acids that dramatically reduced channel activity and one, methionine, which mimicked the wild-type channel. Our data are plausibly explained by a bimodal gating model involving both voltage-dependent activation and inactivation of TRPA1. We propose that the key pore helix residue, L906, plays an essential role in responding to the voltage-dependent gating.

  20. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  1. Antiviral activity of dolutegravir in subjects with failure on an integrase inhibitor-based regimen: week 24 phase 3 results from VIKING-3

    Science.gov (United States)

    Nichols, G; Mills, A; Grossberg, R; Lazzarin, A; Maggiolo, F; Molina, J; Pialoux, G; Wright, D; Ait-Khaled, M; Huang, J; Vavro, C; Wynne, B; Yeo, J

    2012-01-01

    Background VIKING-3 aimed to examine efficacy and safety of dolutegravir (DTG) 50 mg twice daily in patients with resistance to multiple ARV classes, including integrase inhibitors (INI). Methods RAL and/or EVG-resistant (current or historical) adult subjects with screening plasma HIV-1 RNA ≥500 c/mL and resistance to ≥2 other ART classes received open-label DTG 50 mg BID while continuing their failing regimen (without RAL/EVG). At Day 8 the background regimen was optimised and DTG continued. Activity of the optimized background regimen (OBR) was determined by Monogram Net Assessment. Primary endpoints were antiviral efficacy at Day 8 and Week 24. Results 183 subjects enrolled, 124 with INI-resistance at screening and 59 with historical (but no screening) resistance. Population was advanced: at BL, median CD4 140, prior ART 13 yrs, 56% CDC Class C; 79% had >2 NRTI, 75% >1 NNRTI, and 70% >2 PI resistance-associated mutations, and 61% had non-R5 HIV detected. Of the 114 subjects who had the opportunity to complete 24 weeks on study before data cutoff, 72 (63%) had 1 log HIV RNA decline of 2, respectively. Discontinuations due to adverse events were uncommon (6/183, 3%); the most common drug-related AEs were diarrhoea, nausea and headache, each reported in only 5% of subjects. Conclusion A majority of the highly treatment-experienced subjects in VIKING-3 achieved suppression with DTG-based therapy. Responses were associated with Baseline IN genotype but not OSS, highlighting the importance and independence of DTG antiviral activity. DTG had a low rate of discontinuation due to adverse events at 50 mg BID in this advanced patient population.

  2. The Chlamydomonas Genome Reveals the Evolution of Key Animal and Plant Functions

    Energy Technology Data Exchange (ETDEWEB)

    Merchant, Sabeeha S

    2007-04-09

    Chlamydomonas reinhardtii is a unicellular green alga whose lineage diverged from land plants over 1 billion years ago. It is a model system for studying chloroplast-based photosynthesis, as well as the structure, assembly, and function of eukaryotic flagella (cilia), which were inherited from the common ancestor of plants and animals, but lost in land plants. We sequenced the 120-megabase nuclear genome of Chlamydomonas and performed comparative phylogenomic analyses, identifying genes encoding uncharacterized proteins that are likely associated with the function and biogenesis of chloroplasts or eukaryotic flagella. Analyses of the Chlamydomonas genome advance our understanding of the ancestral eukaryotic cell, reveal previously unknown genes associated with photosynthetic and flagellar functions, and establish links between ciliopathy and the composition and function of flagella.

  3. Potential benefit of dolutegravir once daily: efficacy and safety

    Directory of Open Access Journals (Sweden)

    Fantauzzi A

    2013-02-01

    Full Text Available Alessandra Fantauzzi,1 Ombretta Turriziani,2 Ivano Mezzaroma11Department of Clinical Medicine, 2Department of Molecular Medicine, Sapienza, University of Rome, Rome, ItalyAbstract: The viral integrase enzyme has recently emerged as a primary alternative target to block HIV-1 replication, and integrase inhibitors are considered a pivotal new class of antiretroviral drugs. Dolutegravir is an investigational next-generation integrase inhibitor showing some novel and intriguing characteristics, ie, it has a favorable pharmacokinetic profile with a prolonged intracellular half-life, rendering feasible once-daily dosing without the need for ritonavir boosting and without regard to meals. Moreover, dolutegravir is primarily metabolized via uridine diphosphate glucuronosyltranferase 1A1, with a minor component of the cytochrome P450 3A4 isoform, thereby limiting drug–drug interactions. Furthermore, its metabolic profile enables coadministration with most of the other available antiretroviral agents without dose adjustment. Recent findings also demonstrate that dolutegravir has significant activity against HIV-1 isolates with resistance mutations associated with raltegravir and/or elvitegravir. The attributes of once-daily administration and the potential to treat integrase inhibitor-resistant viruses make dolutegravir an interesting and promising investigational drug. In this review, the main concerns about the efficacy and safety of dolutegravir as well as its resistance profile are explored by analysis of currently available data from preclinical and clinical studies.Keywords: antiretroviral drugs, HIV-1 integrase, integrase inhibitors, dolutegravir, once daily

  4. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  5. High Pressure ZZ-Exchange NMR Reveals Key Features of Protein Folding Transition States.

    Science.gov (United States)

    Zhang, Yi; Kitazawa, Soichiro; Peran, Ivan; Stenzoski, Natalie; McCallum, Scott A; Raleigh, Daniel P; Royer, Catherine A

    2016-11-23

    Understanding protein folding mechanisms and their sequence dependence requires the determination of residue-specific apparent kinetic rate constants for the folding and unfolding reactions. Conventional two-dimensional NMR, such as HSQC experiments, can provide residue-specific information for proteins. However, folding is generally too fast for such experiments. ZZ-exchange NMR spectroscopy allows determination of folding and unfolding rates on much faster time scales, yet even this regime is not fast enough for many protein folding reactions. The application of high hydrostatic pressure slows folding by orders of magnitude due to positive activation volumes for the folding reaction. We combined high pressure perturbation with ZZ-exchange spectroscopy on two autonomously folding protein domains derived from the ribosomal protein, L9. We obtained residue-specific apparent rates at 2500 bar for the N-terminal domain of L9 (NTL9), and rates at atmospheric pressure for a mutant of the C-terminal domain (CTL9) from pressure dependent ZZ-exchange measurements. Our results revealed that NTL9 folding is almost perfectly two-state, while small deviations from two-state behavior were observed for CTL9. Both domains exhibited large positive activation volumes for folding. The volumetric properties of these domains reveal that their transition states contain most of the internal solvent excluded voids that are found in the hydrophobic cores of the respective native states. These results demonstrate that by coupling it with high pressure, ZZ-exchange can be extended to investigate a large number of protein conformational transitions.

  6. The University of Canberra quantum key distribution testbed

    International Nuclear Information System (INIS)

    Ganeshkumar, G.; Edwards, P.J.; Cheung, W.N.; Barbopoulos, L.O.; Pham, H.; Hazel, J.C.

    1999-01-01

    Full text: We describe the design, operation and preliminary results obtained from a quantum key distribution (QKD) testbed constructed at the University of Canberra. Quantum cryptographic systems use shared secret keys exchanged in the form of sequences of polarisation coded or phase encoded single photons transmitted over an optical communications channel. Secrecy of this quantum key rests upon fundamental laws of quantum physics: measurements of linear or circular photon polarisation states introduce noise into the conjugate variable and so reveal eavesdropping. In its initial realisation reported here, pulsed light from a 650nm laser diode is attenuated by a factor of 10 6 , plane-polarised and then transmitted through a birefringent liquid crystal modulator (LCM) to a polarisation sensitive single photon receiver. This transmitted key sequence consists of a 1 kHz train of weak coherent 100ns wide light pulses, polarisation coded according to the BB84 protocol. Each pulse is randomly assigned one of four polarisation states (two orthogonal linear and two orthogonal circular) by computer PCA operated by the sender ('Alice'). This quaternary polarisation shift keyed photon stream is detected by the receiver ('Bob') whose computer (PCB) randomly chooses either a linear or a circular polarisation basis. Computer PCB is also used for final key selection, authentication, privacy amplification and eavesdropping. We briefly discuss the realisation of a mesoscopic single photon QKD source and the use of the testbed to simulate a global quantum key distribution system using earth satellites. Copyright (1999) Australian Optical Society

  7. Representing Microbial Dormancy in Soil Decomposition Models Improves Model Performance and Reveals Key Ecosystem Controls on Microbial Activity

    Science.gov (United States)

    He, Y.; Yang, J.; Zhuang, Q.; Wang, G.; Liu, Y.

    2014-12-01

    Climate feedbacks from soils can result from environmental change and subsequent responses of plant and microbial communities and nutrient cycling. Explicit consideration of microbial life history traits and strategy may be necessary to predict climate feedbacks due to microbial physiology and community changes and their associated effect on carbon cycling. In this study, we developed an explicit microbial-enzyme decomposition model and examined model performance with and without representation of dormancy at six temperate forest sites with observed soil efflux ranged from 4 to 10 years across different forest types. We then extrapolated the model to all temperate forests in the Northern Hemisphere (25-50°N) to investigate spatial controls on microbial and soil C dynamics. Both models captured the observed soil heterotrophic respiration (RH), yet no-dormancy model consistently exhibited large seasonal amplitude and overestimation in microbial biomass. Spatially, the total RH from temperate forests based on dormancy model amounts to 6.88PgC/yr, and 7.99PgC/yr based on no-dormancy model. However, no-dormancy model notably overestimated the ratio of microbial biomass to SOC. Spatial correlation analysis revealed key controls of soil C:N ratio on the active proportion of microbial biomass, whereas local dormancy is primarily controlled by soil moisture and temperature, indicating scale-dependent environmental and biotic controls on microbial and SOC dynamics. These developments should provide essential support to modeling future soil carbon dynamics and enhance the avenue for collaboration between empirical soil experiment and modeling in the sense that more microbial physiological measurements are needed to better constrain and evaluate the models.

  8. Integrated genomics of Mucorales reveals novel therapeutic targets

    Science.gov (United States)

    Mucormycosis is a life-threatening infection caused by Mucorales fungi. We sequenced 30 fungal genomes and performed transcriptomics with three representative Rhizopus and Mucor strains with human airway epithelial cells during fungal invasion to reveal key host and fungal determinants contributing ...

  9. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  10. Microarray analysis reveals key genes and pathways in Tetralogy of Fallot

    Science.gov (United States)

    He, Yue-E; Qiu, Hui-Xian; Jiang, Jian-Bing; Wu, Rong-Zhou; Xiang, Ru-Lian; Zhang, Yuan-Hai

    2017-01-01

    The aim of the present study was to identify key genes that may be involved in the pathogenesis of Tetralogy of Fallot (TOF) using bioinformatics methods. The GSE26125 microarray dataset, which includes cardiovascular tissue samples derived from 16 children with TOF and five healthy age-matched control infants, was downloaded from the Gene Expression Omnibus database. Differential expression analysis was performed between TOF and control samples to identify differentially expressed genes (DEGs) using Student's t-test, and the R/limma package, with a log2 fold-change of >2 and a false discovery rate of <0.01 set as thresholds. The biological functions of DEGs were analyzed using the ToppGene database. The ReactomeFIViz application was used to construct functional interaction (FI) networks, and the genes in each module were subjected to pathway enrichment analysis. The iRegulon plugin was used to identify transcription factors predicted to regulate the DEGs in the FI network, and the gene-transcription factor pairs were then visualized using Cytoscape software. A total of 878 DEGs were identified, including 848 upregulated genes and 30 downregulated genes. The gene FI network contained seven function modules, which were all comprised of upregulated genes. Genes enriched in Module 1 were enriched in the following three neurological disorder-associated signaling pathways: Parkinson's disease, Alzheimer's disease and Huntington's disease. Genes in Modules 0, 3 and 5 were dominantly enriched in pathways associated with ribosomes and protein translation. The Xbox binding protein 1 transcription factor was demonstrated to be involved in the regulation of genes encoding the subunits of cytoplasmic and mitochondrial ribosomes, as well as genes involved in neurodegenerative disorders. Therefore, dysfunction of genes involved in signaling pathways associated with neurodegenerative disorders, ribosome function and protein translation may contribute to the pathogenesis of TOF

  11. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  12. 5-Hydroxypyrido[2,3-b]pyrazin-6(5H)-one derivatives as novel dual inhibitors of HIV-1 reverse transcriptase-associated ribonuclease H and integrase.

    Science.gov (United States)

    Sun, Lin; Gao, Ping; Dong, Guanyu; Zhang, Xujie; Cheng, Xiqiang; Ding, Xiao; Wang, Xueshun; Daelemans, Dirk; De Clercq, Erik; Pannecouque, Christophe; Menéndez-Arias, Luis; Zhan, Peng; Liu, Xinyong

    2018-06-18

    We reported herein the design, synthesis and biological evaluation of a series of 5-hydroxypyrido[2,3-b]pyrazin-6(5H)-one derivatives as HIV-1 reverse transcriptase (RT) ribonuclease H (RNase H) inhibitors using a privileged structure-guided scaffold refining strategy. In view of the similarities between the pharmacophore model of RNase H and integrase (IN) inhibitors as well as their catalytic sites, we also performed IN inhibition assays. Notably, the majority of these derivatives inhibited RNase H and IN at micromolar concentrations. Among them, compound 7a exhibited similar inhibitory activity against RNase H and IN (IC 50 RNase H  = 1.77 μM, IC 50 IN  = 1.18 μM, ratio = 1.50). To the best of our knowledge, this is the first reported dual HIV-1 RNase H-IN inhibitor based on a 5-hydroxypyrido[2,3-b]pyrazin-6(5H)-one structure. Molecular modeling has been used to predict the binding mode of 7a in complex with the catalytic cores of HIV-1 RNase H and IN. Taken together these results strongly support the feasibility of developing HIV-1 dual inhibitors from analog-based optimization of divalent metal ion chelators. Recently, the identification of dual inhibitors proved to be a highly effective strategy for novel antivirals discovery. Therefore, these compounds appear to be useful leads that can be further modified to develop more valuable anti-HIV-1 molecules with suitable drug profiles. Copyright © 2018 Elsevier Masson SAS. All rights reserved.

  13. Evaluation of the effect of short-term treatment with the integrase inhibitor raltegravir (Isentress) on the course of progressive feline leukemia virus infection.

    Science.gov (United States)

    Boesch, Andrea; Cattori, Valentino; Riond, Barbara; Willi, Barbara; Meli, Marina L; Rentsch, Katharina M; Hosie, Margaret J; Hofmann-Lehmann, Regina; Lutz, Hans

    2015-02-25

    Cats persistently infected with the gammaretrovirus feline leukemia virus (FeLV) are at risk to die within months to years from FeLV-associated disease, such as immunosuppression, anemia or lymphoma/leukemia. The integrase inhibitor raltegravir has been demonstrated to reduce FeLV replication in vitro. The aim of the present study was to investigate raltegravir in vivo for its safety and efficacy to suppress FeLV replication. The safety was tested in three naïve specified pathogen-free (SPF) cats during a 15 weeks treatment period (initially 20mg then 40mg orally b.i.d.). No adverse effects were noted. The efficacy was tested in seven persistently FeLV-infected SPF cats attained from 18 cats experimentally exposed to FeLV-A/Glasgow-1. The seven cats were treated during nine weeks (40mg then 80mg b.i.d.). Raltegravir was well tolerated even at the higher dose. A significant decrease in plasma viral RNA loads (∼5×) was found; however, after treatment termination a rebound effect was observed. Only one cat developed anti-FeLV antibodies and viral RNA loads remained decreased after treatment termination. Of note, one of the untreated FeLV-A infected cats developed fatal FeLV-C associated anemia within 5 weeks of FeLV-A infection. Moreover, progressive FeLV infection was associated with significantly lower enFeLV loads prior to infection supporting that FeLV susceptibility may be related to the genetic background of the cat. Overall, our data demonstrate the ability of raltegravir to reduce viral replication also in vivo. However, no complete control of viremia was achieved. Further investigations are needed to find an optimized treatment against FeLV. (250 words). Copyright © 2014 Elsevier B.V. All rights reserved.

  14. Geometrically and conformationally restrained cinnamoyl compounds as inhibitors of HIV-1 integrase: synthesis, biological evaluation, and molecular modeling.

    Science.gov (United States)

    Artico, M; Di Santo, R; Costi, R; Novellino, E; Greco, G; Massa, S; Tramontano, E; Marongiu, M E; De Montis, A; La Colla, P

    1998-10-08

    Various cinnammoyl-based structures were synthesized and tested in enzyme assays as inhibitors of the HIV-1 integrase (IN). The majority of compounds were designed as geometrically or conformationally constrained analogues of caffeic acid phenethyl ester (CAPE) and were characterized by a syn disposition of the carbonyl group with respect to the vinylic double bond. Since the cinnamoyl moiety present in flavones such as quercetin (inactive on HIV-1-infected cells) is frozen in an anti arrangement, it was hoped that fixing our compounds in a syn disposition could favor anti-HIV-1 activity in cell-based assays. Geometrical and conformational properties of the designed compounds were taken into account through analysis of X-ray structures available from the Cambridge Structural Database. The polyhydroxylated analogues were prepared by reacting 3,4-bis(tetrahydropyran-2-yloxy)benzaldehyde with various compounds having active methylene groups such as 2-propanone, cyclopentanone, cyclohexanone, 1,3-diacetylbenzene, 2, 4-dihydroxyacetophenone, 2,3-dihydro-1-indanone, 2,3-dihydro-1, 3-indandione, and others. While active against both 3'-processing and strand-transfer reactions, the new compounds, curcumin included, failed to inhibit the HIV-1 multiplication in acutely infected MT-4 cells. Nevertheless, they specifically inhibited the enzymatic reactions associated with IN, being totally inactive against other viral (HIV-1 reverse transcriptase) and cellular (RNA polymerase II) nucleic acid-processing enzymes. On the other hand, title compounds were endowed with remarkable antiproliferative activity, whose potency correlated neither with the presence of catechols (possible source of reactive quinones) nor with inhibition of topoisomerases. The SARs developed for our compounds led to novel findings concerning the molecular determinants of IN inhibitory activity within the class of cinnamoyl-based structures. We hypothesize that these compounds bind to IN featuring the

  15. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  16. The ultimate security bounds of quantum key distribution protocols

    International Nuclear Information System (INIS)

    Nikolopoulos, G.M.; Alber, G.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols exploit quantum correlations in order to establish a secure key between two legitimate users. Recent work on QKD has revealed a remarkable link between quantum and secret correlations. In this talk we report on recent results concerning the ultimate upper security bounds of various QKD schemes (i.e., the maximal disturbance up to which the two legitimate users share quantum correlations) under the assumption of general coherent attacks. In particular, we derive an analytic expression for the ultimate upper security bound of QKD schemes that use two mutually unbiased bases. As long as the two legitimate users focus on the sifted key and treat each pair of data independently during the post processing, our results are valid for arbitrary dimensions of the information carriers. The bound we have derived is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is also discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions, however, such equivalence is generally no longer valid. (author)

  17. Incorporation of aptamers in the terminal loop of shRNAs yields an effective and novel combinatorial targeting strategy.

    Science.gov (United States)

    Pang, Ka Ming; Castanotto, Daniela; Li, Haitang; Scherer, Lisa; Rossi, John J

    2018-01-09

    Gene therapy by engineering patient's own blood cells to confer HIV resistance can potentially lead to a functional cure for AIDS. Toward this goal, we have previously developed an anti-HIV lentivirus vector that deploys a combination of shRNA, ribozyme and RNA decoy. To further improve this therapeutic vector against viral escape, we sought an additional reagent to target HIV integrase. Here, we report the development of a new strategy for selection and expression of aptamer for gene therapy. We developed a SELEX protocol (multi-tag SELEX) for selecting RNA aptamers against proteins with low solubility or stability, such as integrase. More importantly, we expressed these aptamers in vivo by incorporating them in the terminal loop of shRNAs. This novel strategy allowed efficient expression of the shRNA-aptamer fusions that targeted RNAs and proteins simultaneously. Expressed shRNA-aptamer fusions targeting HIV integrase or reverse transcriptase inhibited HIV replication in cell cultures. Viral inhibition was further enhanced by combining an anti-integrase aptamer with an anti-HIV Tat-Rev shRNA. This construct exhibited efficacy comparable to that of integrase inhibitor Raltegravir. Our strategy for the selection and expression of RNA aptamers can potentially extend to other gene therapy applications. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  18. Gene Expression in Class 2 Integrons Is SOS-Independent and Involves Two Pc Promoters.

    Science.gov (United States)

    Jové, Thomas; Da Re, Sandra; Tabesse, Aurore; Gassama-Sow, Amy; Ploy, Marie-Cécile

    2017-01-01

    Integrons are powerful bacterial genetic elements that permit the expression and dissemination of antibiotic-resistance gene cassettes. They contain a promoter Pc that allows the expression of gene cassettes captured through site-specific recombination catalyzed by IntI, the integron-encoded integrase. Class 1 and 2 integrons are found in both clinical and environmental settings. The regulation of intI and of Pc promoters has been extensively studied in class 1 integrons and the regulatory role of the SOS response on intI expression has been shown. Here we investigated class 2 integrons. We characterized the P intI2 promoter and showed that intI2 expression is not regulated via the SOS response. We also showed that, unlike class 1 integrons, class 2 integrons possess not one but two active Pc promoters that are located within the attI2 region that seem to contribute equally to gene cassette expression. Class 2 integrons mostly encode an inactive truncated integrase, but the rare class 2 integrons that encode an active integrase are associated with less efficient Pc2 promoter variants. We propose an evolutionary model for class 2 integrons in which the absence of repression of the integrase gene expression led to mutations resulting in either inactive integrase or Pc variants of weaker activity, thereby reducing the potential fitness cost of these integrons.

  19. 1,4-Bis(5-(naphthalen-1-yl)thiophen-2-yl)naphthalene, a small molecule, functions as a novel anti-HIV-1 inhibitor targeting the interaction between integrase and cellular Lens epithelium-derived growth factor.

    Science.gov (United States)

    Gu, Wan-gang; Ip, Denis Tsz-Ming; Liu, Si-jie; Chan, Joseph H; Wang, Yan; Zhang, Xuan; Zheng, Yong-tang; Wan, David Chi-Cheong

    2014-04-25

    Translocation of viral integrase (IN) into the nucleus is a critical precondition of integration during the life cycle of HIV, a causative agent of Acquired Immunodeficiency Syndromes (AIDS). As the first discovered cellular factor to interact with IN, Lens epithelium-derived growth factor (LEDGF/p75) plays an important role in the process of integration. Disruption of the LEDGF/p75-IN interaction has provided a great interest for anti-HIV agent discovery. In this work, we reported that one small molecular compound, 1,4-bis(5-(naphthalen-1-yl)thiophen-2-yl)naphthalene(Compound 15), potently inhibit the IN-LEDGF/p75 interaction and affect the HIV-1 IN nuclear distribution at 1 μM. The putative binding mode of Compound 15 was constructed by a molecular docking simulation to provide structural insights into the ligand-binding mechanism. Compound 15 suppressed viral replication by measuring p24 antigen production in HIV-1IIIB acute infected C8166 cells with EC50 value of 11.19 μM. Compound 15 might supply useful structural information for further anti-HIV agent discovery. Copyright © 2014. Published by Elsevier Ireland Ltd.

  20. Hacking on decoy-state quantum key distribution system with partial phase randomization

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  1. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  2. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  3. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  4. Museum specimens reveal loss of pollen host plants as key factor driving wild bee decline in The Netherlands

    NARCIS (Netherlands)

    Scheper, J.A.; Reemer, M.; Kats, van R.J.M.; Ozinga, W.A.; Linden, van der G.T.J.; Schaminee, J.H.J.; Siepel, H.; Kleijn, D.

    2014-01-01

    Evidence for declining populations of both wild and managed bees has raised concern about a potential global pollination crisis. Strategies to mitigate bee loss generally aim to enhance floral resources. However, we do not really know whether loss of preferred floral resources is the key driver of

  5. Practical private database queries based on a quantum-key-distribution protocol

    International Nuclear Information System (INIS)

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-01-01

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  6. Identification of TOEFAZ1-interacting proteins reveals key regulators of Trypanosoma brucei cytokinesis.

    Science.gov (United States)

    Hilton, Nicholas A; Sladewski, Thomas E; Perry, Jenna A; Pataki, Zemplen; Sinclair-Davis, Amy N; Muniz, Richard S; Tran, Holly L; Wurster, Jenna I; Seo, Jiwon; de Graffenried, Christopher L

    2018-05-21

    The protist parasite Trypanosoma brucei is an obligate extracellular pathogen that retains its highly-polarized morphology during cell division and has evolved a novel cytokinetic process independent of non-muscle myosin II. The polo-like kinase homolog TbPLK is essential for transmission of cell polarity during division and for cytokinesis. We previously identified a putative TbPLK substrate named Tip of the Extending FAZ 1 (TOEFAZ1) as an essential kinetoplastid-specific component of the T. brucei cytokinetic machinery. We performed a proximity-dependent biotinylation (BioID) screen using TOEFAZ1 as a means to identify additional proteins that are involved in cytokinesis. Using quantitative proteomic methods, we identified nearly 500 TOEFAZ1-proximal proteins and characterized 59 in further detail. Among the candidates, we identified an essential putative phosphatase that regulates the expression level and localization of both TOEFAZ1 and TbPLK, a previously uncharacterized protein that is necessary for the assembly of a new cell posterior, and a microtubule plus-end directed orphan kinesin that is required for completing cleavage furrow ingression. The identification of these proteins provides new insight into T. brucei cytokinesis and establishes TOEFAZ1 as a key component of this essential and uniquely-configured process in kinetoplastids. This article is protected by copyright. All rights reserved. © 2018 John Wiley & Sons Ltd.

  7. Retroviral DNA Integration

    Science.gov (United States)

    2016-01-01

    The integration of a DNA copy of the viral RNA genome into host chromatin is the defining step of retroviral replication. This enzymatic process is catalyzed by the virus-encoded integrase protein, which is conserved among retroviruses and LTR-retrotransposons. Retroviral integration proceeds via two integrase activities: 3′-processing of the viral DNA ends, followed by the strand transfer of the processed ends into host cell chromosomal DNA. Herein we review the molecular mechanism of retroviral DNA integration, with an emphasis on reaction chemistries and architectures of the nucleoprotein complexes involved. We additionally discuss the latest advances on anti-integrase drug development for the treatment of AIDS and the utility of integrating retroviral vectors in gene therapy applications. PMID:27198982

  8. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  9. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  10. Identification of the key factors for success in the hotel sector

    Directory of Open Access Journals (Sweden)

    Fernando Campa-Planas

    2018-02-01

    Design/methodology: A review of the literature has been carried out, which has provided references related to the hotel sector and different factors that impact it. The knowledge provided by the scientific community through the articles and texts consulted are reflected in this document and allow us to determine the existence of the key factors for success.  Contributions/results: Considering the importance of the hotel sector in the Spanish economy, this study identifies the key factors in the different hotel establishments. However, the materialization of these factors provides and shows us which financial aspects, management systems and other more global aspects, such as longevity or location, enable the company to be successful in the hotel sector.  Originality/value: Based on the literature reviewed, a list of key factors for success in the hotel sector was composed. This also revealed a lack of similar studies on this topic.

  11. Novel personalized pathway-based metabolomics models reveal key metabolic pathways for breast cancer diagnosis

    DEFF Research Database (Denmark)

    Huang, Sijia; Chong, Nicole; Lewis, Nathan

    2016-01-01

    diagnosis. We applied this method to predict breast cancer occurrence, in combination with correlation feature selection (CFS) and classification methods. Results: The resulting all-stage and early-stage diagnosis models are highly accurate in two sets of testing blood samples, with average AUCs (Area Under.......993. Moreover, important metabolic pathways, such as taurine and hypotaurine metabolism and the alanine, aspartate, and glutamate pathway, are revealed as critical biological pathways for early diagnosis of breast cancer. Conclusions: We have successfully developed a new type of pathway-based model to study...... metabolomics data for disease diagnosis. Applying this method to blood-based breast cancer metabolomics data, we have discovered crucial metabolic pathway signatures for breast cancer diagnosis, especially early diagnosis. Further, this modeling approach may be generalized to other omics data types for disease...

  12. Enhanced limonene production in cyanobacteria reveals photosynthesis limitations.

    Science.gov (United States)

    Wang, Xin; Liu, Wei; Xin, Changpeng; Zheng, Yi; Cheng, Yanbing; Sun, Su; Li, Runze; Zhu, Xin-Guang; Dai, Susie Y; Rentzepis, Peter M; Yuan, Joshua S

    2016-12-13

    Terpenes are the major secondary metabolites produced by plants, and have diverse industrial applications as pharmaceuticals, fragrance, solvents, and biofuels. Cyanobacteria are equipped with efficient carbon fixation mechanism, and are ideal cell factories to produce various fuel and chemical products. Past efforts to produce terpenes in photosynthetic organisms have gained only limited success. Here we engineered the cyanobacterium Synechococcus elongatus PCC 7942 to efficiently produce limonene through modeling guided study. Computational modeling of limonene flux in response to photosynthetic output has revealed the downstream terpene synthase as a key metabolic flux-controlling node in the MEP (2-C-methyl-d-erythritol 4-phosphate) pathway-derived terpene biosynthesis. By enhancing the downstream limonene carbon sink, we achieved over 100-fold increase in limonene productivity, in contrast to the marginal increase achieved through stepwise metabolic engineering. The establishment of a strong limonene flux revealed potential synergy between photosynthate output and terpene biosynthesis, leading to enhanced carbon flux into the MEP pathway. Moreover, we show that enhanced limonene flux would lead to NADPH accumulation, and slow down photosynthesis electron flow. Fine-tuning ATP/NADPH toward terpene biosynthesis could be a key parameter to adapt photosynthesis to support biofuel/bioproduct production in cyanobacteria.

  13. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  14. Comparative Genomic Analysis of Clinical and Environmental Vibrio Vulnificus Isolates Revealed Biotype 3 Evolutionary Relationships

    Directory of Open Access Journals (Sweden)

    Yael eKotton

    2015-01-01

    Full Text Available In 1996 a common-source outbreak of severe soft tissue and bloodstream infections erupted among Israeli fish farmers and fish consumers due to changes in fish marketing policies. The causative pathogen was a new strain of Vibrio vulnificus, named biotype 3, which displayed a unique biochemical and genotypic profile. Initial observations suggested that the pathogen erupted as a result of genetic recombination between two distinct populations. We applied a whole genome shotgun sequencing approach using several V. vulnificus strains from Israel in order to study the pan genome of V. vulnificus and determine the phylogenetic relationship of biotype 3 with existing populations. The core genome of V. vulnificus based on 16 draft and complete genomes consisted of 3068 genes, representing between 59% and 78% of the whole genome of 16 strains. The accessory genome varied in size from 781 kbp to 2044 kbp. Phylogenetic analysis based on whole, core, and accessory genomes displayed similar clustering patterns with two main clusters, clinical (C and environmental (E, all biotype 3 strains formed a distinct group within the E cluster. Annotation of accessory genomic regions found in biotype 3 strains and absent from the core genome yielded 1732 genes, of which the vast majority encoded hypothetical proteins, phage-related proteins, and mobile element proteins. A total of 1916 proteins (including 713 hypothetical proteins were present in all human pathogenic strains (both biotype 3 and non-biotype 3 and absent from the environmental strains. Clustering analysis of the non-hypothetical proteins revealed 148 protein clusters shared by all human pathogenic strains; these included transcriptional regulators, arylsulfatases, methyl-accepting chemotaxis proteins, acetyltransferases, GGDEF family proteins, transposases, type IV secretory system (T4SS proteins, and integrases. Our study showed that V. vulnificus biotype 3 evolved from environmental populations and

  15. Key attributes of expert NRL referees.

    Science.gov (United States)

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.

  16. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  17. RNA Sequencing and Coexpression Analysis Reveal Key Genes Involved in α-Linolenic Acid Biosynthesis in Perilla frutescens Seed

    Directory of Open Access Journals (Sweden)

    Tianyuan Zhang

    2017-11-01

    Full Text Available Perilla frutescen is used as traditional food and medicine in East Asia. Its seeds contain high levels of α-linolenic acid (ALA, which is important for health, but is scarce in our daily meals. Previous reports on RNA-seq of perilla seed had identified fatty acid (FA and triacylglycerol (TAG synthesis genes, but the underlying mechanism of ALA biosynthesis and its regulation still need to be further explored. So we conducted Illumina RNA-sequencing in seven temporal developmental stages of perilla seeds. Sequencing generated a total of 127 million clean reads, containing 15.88 Gb of valid data. The de novo assembly of sequence reads yielded 64,156 unigenes with an average length of 777 bp. A total of 39,760 unigenes were annotated and 11,693 unigenes were found to be differentially expressed in all samples. According to Kyoto Encyclopedia of Genes and Genomes (KEGG pathway analysis, 486 unigenes were annotated in the “lipid metabolism” pathway. Of these, 150 unigenes were found to be involved in fatty acid (FA biosynthesis and triacylglycerol (TAG assembly in perilla seeds. A coexpression analysis showed that a total of 104 genes were highly coexpressed (r > 0.95. The coexpression network could be divided into two main subnetworks showing over expression in the medium or earlier and late phases, respectively. In order to identify the putative regulatory genes, a transcription factor (TF analysis was performed. This led to the identification of 45 gene families, mainly including the AP2-EREBP, bHLH, MYB, and NAC families, etc. After coexpression analysis of TFs with highly expression of FAD2 and FAD3 genes, 162 TFs were found to be significantly associated with two FAD genes (r > 0.95. Those TFs were predicted to be the key regulatory factors in ALA biosynthesis in perilla seed. The qRT-PCR analysis also verified the relevance of expression pattern between two FAD genes and partial candidate TFs. Although it has been reported that some TFs

  18. High-capacity quantum key distribution via hyperentangled degrees of freedom

    International Nuclear Information System (INIS)

    Simon, David S; Sergienko, Alexander V

    2014-01-01

    Quantum key distribution (QKD) has long been a promising area for the application of quantum effects in solving real-world problems. However, two major obstacles have stood in the way of its widespread application: low secure key generation rates and short achievable operating distances. In this paper, a new physical mechanism for dealing with the first of these problems is proposed: the interplay between different degrees of freedom in a hyperentangled system (parametric down-conversion) is used to increase the Hilbert space dimension available for key generation while maintaining security. Polarization-based Bell tests provide security checking, while orbital angular momentum (OAM) and total angular momentum (TAM) provide a higher key generation rate. Whether to measure TAM or OAM is decided randomly in each trial. The concurrent noncommutativity of TAM with OAM and polarization provides the physical basis for quantum security. TAM measurements link polarization to OAM, so that if the legitimate participants measure OAM while the eavesdropper measures TAM (or vice-versa), then polarization entanglement is lost, revealing the eavesdropper. In contrast to other OAM-based QKD methods, complex active switching between OAM bases is not required; instead, passive switching by beam splitters combined with much simpler active switching between polarization bases makes implementation at high OAM more practical. (paper)

  19. [Key morphofunctional transformations in the evolution of chiropterans (Bats, Chiroptera)].

    Science.gov (United States)

    Kovaleva, I M

    2014-01-01

    Study on the morphology and morphogenesis of wing membranes in Bats has revealed some peculiarities in their structure and development. Understanding the embryogenesis of these animals, as well as attraction of data obtained on their molecular genetics and paleontology, allows one to single out some factors that could have initiated evolutionary modifications in development programs. A scenario of the key morphofunctional transformations in the forelimbs during the evolution of chiropterans is given.

  20. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  1. Comparative analysis of prophages in Streptococcus mutans genomes

    Science.gov (United States)

    Fu, Tiwei; Fan, Xiangyu; Long, Quanxin; Deng, Wanyan; Song, Jinlin

    2017-01-01

    Prophages have been considered genetic units that have an intimate association with novel phenotypic properties of bacterial hosts, such as pathogenicity and genomic variation. Little is known about the genetic information of prophages in the genome of Streptococcus mutans, a major pathogen of human dental caries. In this study, we identified 35 prophage-like elements in S. mutans genomes and performed a comparative genomic analysis. Comparative genomic and phylogenetic analyses of prophage sequences revealed that the prophages could be classified into three main large clusters: Cluster A, Cluster B, and Cluster C. The S. mutans prophages in each cluster were compared. The genomic sequences of phismuN66-1, phismuNLML9-1, and phismu24-1 all shared similarities with the previously reported S. mutans phages M102, M102AD, and ϕAPCM01. The genomes were organized into seven major gene clusters according to the putative functions of the predicted open reading frames: packaging and structural modules, integrase, host lysis modules, DNA replication/recombination modules, transcriptional regulatory modules, other protein modules, and hypothetical protein modules. Moreover, an integrase gene was only identified in phismuNLML9-1 prophages. PMID:29158986

  2. The Key Genes of Chronic Pancreatitis which Bridge Chronic Pancreatitis and Pancreatic Cancer Can be Therapeutic Targets.

    Science.gov (United States)

    Li, Shuang; Li, Rui; Wang, Heping; Li, Lisha; Li, Huiyu; Li, Yulin

    2018-04-01

    An important question in systems biology is what role the underlying molecular mechanisms play in disease progression. The relationship between chronic pancreatitis and pancreatic cancer needs further exploration in a system view. We constructed the disease network based on gene expression data and protein-protein interaction. We proposed an approach to discover the underlying core network and molecular factors in the progression of pancreatic diseases, which contain stages of chronic pancreatitis and pancreatic cancer. The chronic pancreatitis and pancreatic cancer core network and key factors were revealed and then verified by gene set enrichment analysis of pathways and diseases. The key factors provide the microenvironment for tumor initiation and the change of gene expression level of key factors bridge chronic pancreatitis and pancreatic cancer. Some new candidate genes need further verification by experiments. Transcriptome profiling-based network analysis reveals the importance of chronic pancreatitis genes and pathways in pancreatic cancer development on a system level by computational method and they can be therapeutic targets.

  3. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  4. Proteomic analysis reveals heat shock protein 70 has a key role in polycythemia Vera.

    Science.gov (United States)

    Gallardo, Miguel; Barrio, Santiago; Fernandez, Marisol; Paradela, Alberto; Arenas, Alicia; Toldos, Oscar; Ayala, Rosa; Albizua, Enriqueta; Jimenez, Ana; Redondo, Santiago; Garcia-Martin, Rosa Maria; Gilsanz, Florinda; Albar, Juan Pablo; Martinez-Lopez, Joaquin

    2013-11-19

    JAK-STAT signaling through the JAK2V617F mutation is central to the pathogenesis of myeloproliferative neoplasms (MPN). However, other events could precede the JAK2 mutation. The aim of this study is to analyze the phenotypic divergence between polycytemia vera (PV) and essential thrombocytemia (ET) to find novel therapeutics targets by a proteomic and functional approach to identify alternative routes to JAK2 activation. Through 2D-DIGE and mass spectrometry of granulocyte protein from 20 MPN samples, showed differential expression of HSP70 in PV and ET besides other 60 proteins. Immunohistochemistry of 46 MPN bone marrow samples confirmed HSP70 expression. The median of positive granulocytes was 80% in PV (SD 35%) vs. 23% in ET (SD 34.25%). In an ex vivo model KNK437 was used as an inhibition model assay of HSP70, showed dose-dependent inhibition of cell growth and burst formation unit erythroid (BFU-E) in PV and ET, increased apoptosis in the erythroid lineage, and decreased pJAK2 signaling, as well as a specific siRNA for HSP70. These data suggest a key role for HSP70 in proliferation and survival of the erythroid lineage in PV, and may represent a potential therapeutic target in MPN, especially in PV.

  5. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  6. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  7. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  8. Same pattern, different mechanism: Locking onto the role of key species in seafloor ecosystem process.

    Science.gov (United States)

    Woodin, Sarah Ann; Volkenborn, Nils; Pilditch, Conrad A; Lohrer, Andrew M; Wethey, David S; Hewitt, Judi E; Thrush, Simon F

    2016-05-27

    Seafloor biodiversity is a key mediator of ecosystem functioning, but its role is often excluded from global budgets or simplified to black boxes in models. New techniques allow quantification of the behavior of animals living below the sediment surface and assessment of the ecosystem consequences of complex interactions, yielding a better understanding of the role of seafloor animals in affecting key processes like primary productivity. Combining predictions based on natural history, behavior of key benthic species and environmental context allow assessment of differences in functioning and process, even when the measured ecosystem property in different systems is similar. Data from three sedimentary systems in New Zealand illustrate this. Analysis of the behaviors of the infaunal ecosystem engineers in each system revealed three very different mechanisms driving ecosystem function: density and excretion, sediment turnover and surface rugosity, and hydraulic activities and porewater bioadvection. Integrative metrics of ecosystem function in some cases differentiate among the systems (gross primary production) and in others do not (photosynthetic efficiency). Analyses based on behaviors and activities revealed important ecosystem functional differences and can dramatically improve our ability to model the impact of stressors on ecosystem and global processes.

  9. [Efficacy of dolutegravir in treatment-experienced patients: the SAILING and VIKING trials].

    Science.gov (United States)

    Moreno, Santiago; Berenguer, Juan

    2015-03-01

    Dolutegravir is an HIV integrase inhibitor with a high genetic barrier to resistance and is active against raltegravir- and/or elvitegravir-resistant strains. The clinical development of dolutegravir for HIV infection rescue therapy is based on 3 clinical trials. In the SAILING trial, dolutegravir (5 mg once daily) in combination with 2 other antiretroviral agents was well tolerated and showed greater virological effect than raltegravir (400 mg twice daily) in the treatment of integrase inhibitor-naïve adults with virological failure infected with HIV strains with at least two-class drug resistance. The VIKING studies were designed to evaluate the efficacy of dolutegravir as rescue therapy in treatment-experienced patients infected with HIV strains with resistance mutations to raltegravir and/or elvitegravir. VIKING-1-2 was a dose-ranging phase IIb trial. VIKING-3 was a phase III trial in which dolutegravir (50 mg twice daily) formed part of an optimized regimen and proved safe and effective in this difficult-to-treat group of patients. Dolutegravir is the integrase inhibitor of choice for rescue therapy in multiresistant HIV infection, both in integrase inhibitor-naïve patients and in those previously treated with raltegravir or elvitegravir. Copyright © 2015 Elsevier España, S.L.U. All rights reserved.

  10. ‘Candidatus Competibacter’-lineage genomes retrieved from metagenomes reveal functional metabolic diversity

    DEFF Research Database (Denmark)

    McIlroy, Simon Jon; Albertsen, Mads; Andresen, Eva Kammer

    2014-01-01

    as for denitrification, nitrogen fixation, fermentation, trehalose synthesis and utilisation of glucose and lactate. Genetic comparison of P metabolism pathways with sequenced PAOs revealed the absence of the Pit phosphate transporter in the Competibacter-lineage genomes—identifying a key metabolic difference...

  11. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  12. Structure-based virtual screening toward the discovery of novel inhibitors for impeding the protein-protein interaction between HIV-1 integrase and human lens epithelium-derived growth factor (LEDGF/p75).

    Science.gov (United States)

    Panwar, Umesh; Singh, Sanjeev Kumar

    2017-10-23

    HIV-1 integrase is a unique promising component of the viral replication cycle, catalyzing the integration of reverse transcribed viral cDNA into the host cell genome. Generally, IN activity requires both viral as well as a cellular co-factor in the processing replication cycle. Among them, the human lens epithelium-derived growth factor (LEDGF/p75) represented as promising cellular co-factor which supports the viral replication by tethering IN to the chromatin. Due to its major importance in the early steps of HIV replication, the interaction between IN and LEDGF/p75 has become a pleasing target for anti-HIV drug discovery. The present study involves the finding of novel inhibitor based on the information of dimeric CCD of IN in complex with known inhibitor, which were carried out by applying a structure-based virtual screening concept with molecular docking. Additionally, Free binding energy, ADME properties, PAINS analysis, Density Functional Theory, and Enrichment Calculations were performed on selected compounds for getting a best lead molecule. On the basis of these analyses, the current study proposes top 3 compounds: Enamine-Z742267384, Maybridge-HTS02400, and Specs-AE-848/37125099 with acceptable pharmacological properties and enhanced binding affinity to inhibit the interaction between IN and LEDGF/p75. Furthermore, Simulation studies were carried out on these molecules to expose their dynamics behavior and stability. We expect that the findings obtained here could be future therapeutic agents and may provide an outline for the experimental studies to stimulate the innovative strategy for research community.

  13. Genome-wide identification of key modulators of gene-gene interaction networks in breast cancer.

    Science.gov (United States)

    Chiu, Yu-Chiao; Wang, Li-Ju; Hsiao, Tzu-Hung; Chuang, Eric Y; Chen, Yidong

    2017-10-03

    With the advances in high-throughput gene profiling technologies, a large volume of gene interaction maps has been constructed. A higher-level layer of gene-gene interaction, namely modulate gene interaction, is composed of gene pairs of which interaction strengths are modulated by (i.e., dependent on) the expression level of a key modulator gene. Systematic investigations into the modulation by estrogen receptor (ER), the best-known modulator gene, have revealed the functional and prognostic significance in breast cancer. However, a genome-wide identification of key modulator genes that may further unveil the landscape of modulated gene interaction is still lacking. We proposed a systematic workflow to screen for key modulators based on genome-wide gene expression profiles. We designed four modularity parameters to measure the ability of a putative modulator to perturb gene interaction networks. Applying the method to a dataset of 286 breast tumors, we comprehensively characterized the modularity parameters and identified a total of 973 key modulator genes. The modularity of these modulators was verified in three independent breast cancer datasets. ESR1, the encoding gene of ER, appeared in the list, and abundant novel modulators were illuminated. For instance, a prognostic predictor of breast cancer, SFRP1, was found the second modulator. Functional annotation analysis of the 973 modulators revealed involvements in ER-related cellular processes as well as immune- and tumor-associated functions. Here we present, as far as we know, the first comprehensive analysis of key modulator genes on a genome-wide scale. The validity of filtering parameters as well as the conservativity of modulators among cohorts were corroborated. Our data bring new insights into the modulated layer of gene-gene interaction and provide candidates for further biological investigations.

  14. A Simple Exercise Reveals the Way Students Think about Scientific Modeling

    Science.gov (United States)

    Ruebush, Laura; Sulikowski, Michelle; North, Simon

    2009-01-01

    Scientific modeling is an integral part of contemporary science, yet many students have little understanding of how models are developed, validated, and used to predict and explain phenomena. A simple modeling exercise led to significant gains in understanding key attributes of scientific modeling while revealing some stubborn misconceptions.…

  15. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  16. Population genetics of two key mosquito vectors of Rift Valley Fever virus reveals new insights into the changing disease outbreak patterns in Kenya.

    Directory of Open Access Journals (Sweden)

    David P Tchouassi

    2014-12-01

    Full Text Available Rift Valley fever (RVF outbreaks in Kenya have increased in frequency and range to include northeastern Kenya where viruses are increasingly being isolated from known (Aedes mcintoshi and newly-associated (Ae. ochraceus vectors. The factors contributing to these changing outbreak patterns are unclear and the population genetic structure of key vectors and/or specific virus-vector associations, in particular, are under-studied. By conducting mitochondrial and nuclear DNA analyses on >220 Kenyan specimens of Ae. mcintoshi and Ae. ochraceus, we uncovered high levels of vector complexity which may partly explain the disease outbreak pattern. Results indicate that Ae. mcintoshi consists of a species complex with one of the member species being unique to the newly-established RVF outbreak-prone northeastern region of Kenya, whereas Ae. ochraceus is a homogeneous population that appears to be undergoing expansion. Characterization of specimens from a RVF-prone site in Senegal, where Ae. ochraceus is a primary vector, revealed direct genetic links between the two Ae. ochraceus populations from both countries. Our data strongly suggest that unlike Ae. mcintoshi, Ae. ochraceus appears to be a relatively recent, single 'introduction' into Kenya. These results, together with increasing isolations from this vector, indicate that Ae. ochraceus will likely be of greater epidemiological importance in future RVF outbreaks in Kenya. Furthermore, the overall vector complexity calls into question the feasibility of mosquito population control approaches reliant on genetic modification.

  17. Population Genetics of Two Key Mosquito Vectors of Rift Valley Fever Virus Reveals New Insights into the Changing Disease Outbreak Patterns in Kenya

    Science.gov (United States)

    Tchouassi, David P.; Bastos, Armanda D. S.; Sole, Catherine L.; Diallo, Mawlouth; Lutomiah, Joel; Mutisya, James; Mulwa, Francis; Borgemeister, Christian; Sang, Rosemary; Torto, Baldwyn

    2014-01-01

    Rift Valley fever (RVF) outbreaks in Kenya have increased in frequency and range to include northeastern Kenya where viruses are increasingly being isolated from known (Aedes mcintoshi) and newly-associated (Ae. ochraceus) vectors. The factors contributing to these changing outbreak patterns are unclear and the population genetic structure of key vectors and/or specific virus-vector associations, in particular, are under-studied. By conducting mitochondrial and nuclear DNA analyses on >220 Kenyan specimens of Ae. mcintoshi and Ae. ochraceus, we uncovered high levels of vector complexity which may partly explain the disease outbreak pattern. Results indicate that Ae. mcintoshi consists of a species complex with one of the member species being unique to the newly-established RVF outbreak-prone northeastern region of Kenya, whereas Ae. ochraceus is a homogeneous population that appears to be undergoing expansion. Characterization of specimens from a RVF-prone site in Senegal, where Ae. ochraceus is a primary vector, revealed direct genetic links between the two Ae. ochraceus populations from both countries. Our data strongly suggest that unlike Ae. mcintoshi, Ae. ochraceus appears to be a relatively recent, single 'introduction' into Kenya. These results, together with increasing isolations from this vector, indicate that Ae. ochraceus will likely be of greater epidemiological importance in future RVF outbreaks in Kenya. Furthermore, the overall vector complexity calls into question the feasibility of mosquito population control approaches reliant on genetic modification. PMID:25474018

  18. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  19. Quantitative transcription dynamic analysis reveals candidate genes and key regulators for ethanol tolerance in Saccharomyces cerevisiae

    Directory of Open Access Journals (Sweden)

    Ma Menggen

    2010-06-01

    Full Text Available Abstract Background Derived from our lignocellulosic conversion inhibitor-tolerant yeast, we generated an ethanol-tolerant strain Saccharomyces cerevisiae NRRL Y-50316 by enforced evolutionary adaptation. Using a newly developed robust mRNA reference and a master equation unifying gene expression data analyses, we investigated comparative quantitative transcription dynamics of 175 genes selected from previous studies for an ethanol-tolerant yeast and its closely related parental strain. Results A highly fitted master equation was established and applied for quantitative gene expression analyses using pathway-based qRT-PCR array assays. The ethanol-tolerant Y-50316 displayed significantly enriched background of mRNA abundance for at least 35 genes without ethanol challenge compared with its parental strain Y-50049. Under the ethanol challenge, the tolerant Y-50316 responded in consistent expressions over time for numerous genes belonging to groups of heat shock proteins, trehalose metabolism, glycolysis, pentose phosphate pathway, fatty acid metabolism, amino acid biosynthesis, pleiotropic drug resistance gene family and transcription factors. The parental strain showed repressed expressions for many genes and was unable to withstand the ethanol stress and establish a viable culture and fermentation. The distinct expression dynamics between the two strains and their close association with cell growth, viability and ethanol fermentation profiles distinguished the tolerance-response from the stress-response in yeast under the ethanol challenge. At least 82 genes were identified as candidate and key genes for ethanol-tolerance and subsequent fermentation under the stress. Among which, 36 genes were newly recognized by the present study. Most of the ethanol-tolerance candidate genes were found to share protein binding motifs of transcription factors Msn4p/Msn2p, Yap1p, Hsf1p and Pdr1p/Pdr3p. Conclusion Enriched background of transcription abundance

  20. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  1. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  2. Network analysis of ChIP-Seq data reveals key genes in prostate cancer.

    Science.gov (United States)

    Zhang, Yu; Huang, Zhen; Zhu, Zhiqiang; Liu, Jianwei; Zheng, Xin; Zhang, Yuhai

    2014-09-03

    Prostate cancer (PC) is the second most common cancer among men in the United States, and it imposes a considerable threat to human health. A deep understanding of its underlying molecular mechanisms is the premise for developing effective targeted therapies. Recently, deep transcriptional sequencing has been used as an effective genomic assay to obtain insights into diseases and may be helpful in the study of PC. In present study, ChIP-Seq data for PC and normal samples were compared, and differential peaks identified, based upon fold changes (with P-values calculated with t-tests). Annotations of these peaks were performed. Protein-protein interaction (PPI) network analysis was performed with BioGRID and constructed with Cytoscape, following which the highly connected genes were screened. We obtained a total of 5,570 differential peaks, including 3,726 differentially enriched peaks in tumor samples and 1,844 differentially enriched peaks in normal samples. There were eight significant regions of the peaks. The intergenic region possessed the highest score (51%), followed by intronic (31%) and exonic (11%) regions. The analysis revealed the top 35 highly connected genes, which comprised 33 differential genes (such as YWHAQ, tyrosine 3-monooxygenase/tryptophan 5-monooxygenase activation protein and θ polypeptide) from ChIP-Seq data and 2 differential genes retrieved from the PPI network: UBA52 (ubiquitin A-52 residue ribosomal protein fusion product (1) and SUMO2 (SMT3 suppressor of mif two 3 homolog (2) . Our findings regarding potential PC-related genes increase the understanding of PC and provides direction for future research.

  3. Cellular and molecular mechanisms of HIV-1 integration targeting.

    Science.gov (United States)

    Engelman, Alan N; Singh, Parmit K

    2018-07-01

    Integration is central to HIV-1 replication and helps mold the reservoir of cells that persists in AIDS patients. HIV-1 interacts with specific cellular factors to target integration to interior regions of transcriptionally active genes within gene-dense regions of chromatin. The viral capsid interacts with several proteins that are additionally implicated in virus nuclear import, including cleavage and polyadenylation specificity factor 6, to suppress integration into heterochromatin. The viral integrase protein interacts with transcriptional co-activator lens epithelium-derived growth factor p75 to principally position integration within gene bodies. The integrase additionally senses target DNA distortion and nucleotide sequence to help fine-tune the specific phosphodiester bonds that are cleaved at integration sites. Research into virus-host interactions that underlie HIV-1 integration targeting has aided the development of a novel class of integrase inhibitors and may help to improve the safety of viral-based gene therapy vectors.

  4. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  5. Kochen-Specker theorem as a precondition for secure quantum key distribution

    International Nuclear Information System (INIS)

    Nagata, Koji

    2005-01-01

    We show that (1) the violation of the Ekert 1991 inequality is a sufficient condition for certification of the Kochen-Specker (KS) theorem, and (2) the violation of the Bennett-Brassard-Mermin 1992 (BBM92) inequality is, also, a sufficient condition for certification of the KS theorem. Therefore the success in each quantum key distribution protocol reveals the nonclassical feature of quantum theory, in the sense that the KS realism is violated. Further, it turned out that the Ekert inequality and the BBM inequality are depictured by distillable entanglement witness inequalities. Here, we connect the success in these two key distribution processes into the no-hidden-variables theorem and into witness on distillable entanglement. We also discuss the explicit difference between the KS realism and Bell's local realism in the Hilbert space formalism of quantum theory

  6. Cooperative Secret Sharing Using QR Codes and Symmetric Keys

    Directory of Open Access Journals (Sweden)

    Yang-Wai Chow

    2018-04-01

    Full Text Available Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.

  7. Museum specimens reveal loss of pollen host plants as key factor driving wild bee decline in The Netherlands

    Science.gov (United States)

    Scheper, Jeroen; Reemer, Menno; van Kats, Ruud; Ozinga, Wim A.; van der Linden, Giel T. J.; Schaminée, Joop H. J.; Siepel, Henk; Kleijn, David

    2014-01-01

    Evidence for declining populations of both wild and managed bees has raised concern about a potential global pollination crisis. Strategies to mitigate bee loss generally aim to enhance floral resources. However, we do not really know whether loss of preferred floral resources is the key driver of bee decline because accurate assessment of host plant preferences is difficult, particularly for species that have become rare. Here we examine whether population trends of wild bees in The Netherlands can be explained by trends in host plants, and how this relates to other factors such as climate change. We determined host plant preference of bee species using pollen loads on specimens in entomological collections that were collected before the onset of their decline, and used atlas data to quantify population trends of bee species and their host plants. We show that decline of preferred host plant species was one of two main factors associated with bee decline. Bee body size, the other main factor, was negatively related to population trend, which, because larger bee species have larger pollen requirements than smaller species, may also point toward food limitation as a key factor driving wild bee loss. Diet breadth and other potential factors such as length of flight period or climate change sensitivity were not important in explaining twentieth century bee population trends. These results highlight the species-specific nature of wild bee decline and indicate that mitigation strategies will only be effective if they target the specific host plants of declining species. PMID:25422416

  8. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  9. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  10. Transcriptomic analysis reveals key genes related to betalain biosynthesis in pulp coloration of Hylocereus polyrhizus

    Directory of Open Access Journals (Sweden)

    Hua eQingzhu

    2016-01-01

    Full Text Available Betalains have high nutritional value and bioactivities. Red pulp pitaya (Hylocereus polyrhizus is the only fruit containing abundant betalains for consumer. However, no information is available about genes involved in betalain biosynthesis in H. polyrhizus. Herein, two cDNA libraries of pitaya pulps with two different coloration stages (white and red pulp stages of Guanhuahong (H. polyrhizus were constructed. A total of about 12 Gb raw RNA-Seq data was generated and was de novo assembled into 122,677 transcripts with an average length of 1,183 bp and an N50 value of 2008. Approximately 99.99% of all transcripts were annotated based on seven public databases. A total of 8,871 transcripts were significantly regulated. Thirty-three candidate transcripts related to betalain biosynthesis were obtained from the transcriptome data. Transcripts encoding enzymes involved in betalain biosynthesis were analyzed using RT-qPCR at the whole pulp coloration stages of H. Polyrhizus (7-1 and H. Undatus (132-4. Nine key transcripts of betalain biosynthesis were identified. They were assigned to four kinds of genes in betalain biosynthetic pathway, including tyrosinase, 4, 5-DOPA dioxygenase extradiol, cytochrome P450 and glucosyltransferase. Ultimately, a preliminary betalain biosynthetic pathway for pitaya was proposed based on betalain analyses and gene expression profiles.

  11. Key electronic states in lithium battery materials probed by soft X-ray spectroscopy

    International Nuclear Information System (INIS)

    Yang, Wanli; Liu, Xiaosong; Qiao, Ruimin; Olalde-Velasco, Paul; Spear, Jonathan D.; Roseguo, Louis; Pepper, John X.; Chuang, Yi-de; Denlinger, Jonathan D.; Hussain, Zahid

    2013-01-01

    Highlights: •Key electronic states in battery materials revealed by soft X-ray spectroscopy. •Soft X-ray absorption consistently probes Mn oxidation states in different systems. •Soft X-ray absorption and emission fingerprint battery operations in LiFePO 4 . •Spectroscopic guidelines for selecting/optimizing polymer materials for batteries. •Distinct SEI formation on same electrode material with different crystal orientations. -- Abstract: The formidable challenges for developing a safe, low-cost, high-capacity, and high-power battery necessitate employing advanced tools that are capable of directly probing the key electronic states relevant to battery performance. Synchrotron based soft X-ray spectroscopy directly measures both the occupied and unoccupied states in the vicinity of the Fermi level, including transition-metal-3d and anion-p states. This article presents the basic concepts on how fundamental physics in electronic structure could provide valuable information for lithium-ion battery applications. We then discuss some of our recent studies on transition-metal oxide based cathodes, silicon based anode, and solid-electrolyte-interphase through soft X-ray absorption and emission spectroscopy. We argue that spectroscopic results reveal the evolution of electronic states for fingerprinting, understanding, and optimizing lithium-ion battery operations

  12. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  13. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  14. Key Concept Identification: A Comprehensive Analysis of Frequency and Topical Graph-Based Approaches

    Directory of Open Access Journals (Sweden)

    Muhammad Aman

    2018-05-01

    Full Text Available Automatic key concept extraction from text is the main challenging task in information extraction, information retrieval and digital libraries, ontology learning, and text analysis. The statistical frequency and topical graph-based ranking are the two kinds of potentially powerful and leading unsupervised approaches in this area, devised to address the problem. To utilize the potential of these approaches and improve key concept identification, a comprehensive performance analysis of these approaches on datasets from different domains is needed. The objective of the study presented in this paper is to perform a comprehensive empirical analysis of selected frequency and topical graph-based algorithms for key concept extraction on three different datasets, to identify the major sources of error in these approaches. For experimental analysis, we have selected TF-IDF, KP-Miner and TopicRank. Three major sources of error, i.e., frequency errors, syntactical errors and semantical errors, and the factors that contribute to these errors are identified. Analysis of the results reveals that performance of the selected approaches is significantly degraded by these errors. These findings can help us develop an intelligent solution for key concept extraction in the future.

  15. Understanding Key Determinants of Brand Loyalty in Full Service Restaurants in Uganda

    Directory of Open Access Journals (Sweden)

    Samson Omuudu OTENGEI

    2014-12-01

    Full Text Available The study investigates the key determinants of brand loyalty in full service restaurants in Uganda. The study used a quantitative research approach and adopted a cross sectional correlation survey design to test the study hypotheses. A total of 348 completed questionnaires collected from 116 restaurants were used in the analysis. To the best of our knowledge, this is the first study to propose a model that examines the key determinants of brand loyalty in full service restaurants in Uganda. The findings from the study revealed that dining experience and restaurant image were significant predictors of brand loyalty in full service restaurants in Uganda and customer satisfaction was not a significant predictor of guest loyalty. Despite its managerial implications, several limitations of the study call for further empirical enquiry.

  16. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  17. Transcriptome Analysis of Ullrich Congenital Muscular Dystrophy Fibroblasts Reveals a Disease Extracellular Matrix Signature and Key Molecular Regulators.

    Directory of Open Access Journals (Sweden)

    Sonia Paco

    Full Text Available Collagen VI related myopathies encompass a range of phenotypes with involvement of skeletal muscle, skin and other connective tissues. They represent a severe and relatively common form of congenital disease for which there is no treatment. Collagen VI in skeletal muscle and skin is produced by fibroblasts.In order to gain insight into the consequences of collagen VI mutations and identify key disease pathways we performed global gene expression analysis of dermal fibroblasts from patients with Ullrich Congenital Muscular Dystrophy with and without vitamin C treatment. The expression data were integrated using a range of systems biology tools. Results were validated by real-time PCR, western blotting and functional assays.We found significant changes in the expression levels of almost 600 genes between collagen VI deficient and control fibroblasts. Highly regulated genes included extracellular matrix components and surface receptors, including integrins, indicating a shift in the interaction between the cell and its environment. This was accompanied by a significant increase in fibroblasts adhesion to laminin. The observed changes in gene expression profiling may be under the control of two miRNAs, miR-30c and miR-181a, which we found elevated in tissue and serum from patients and which could represent novel biomarkers for muscular dystrophy. Finally, the response to vitamin C of collagen VI mutated fibroblasts significantly differed from healthy fibroblasts. Vitamin C treatment was able to revert the expression of some key genes to levels found in control cells raising the possibility of a beneficial effect of vitamin C as a modulator of some of the pathological aspects of collagen VI related diseases.

  18. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  19. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  20. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  1. Key Features of Electric Vehicle Diffusion and Its Impact on the Korean Power Market

    Directory of Open Access Journals (Sweden)

    Dongnyok Shim

    2018-06-01

    Full Text Available The market share of electric vehicles is growing and the interest in these vehicles is rapidly increasing in industrialized countries. In the light of these circumstances, this study provides an integrated policy-making package, which includes key features for electric vehicle diffusion and its impact on the Korean power market. This research is based on a quantitative analysis with the following steps: (1 it analyzes drivers’ preferences for electric or traditional internal combustion engine (ICE vehicles with respect to key automobile attributes and these key attributes indicate what policy makers should focus on; (2 it forecasts the achievable level of market share of electric vehicles in relation to improvements in their key attributes; and (3 it evaluates the impact of electric vehicle diffusion on the Korean power market based on an achievable level of market share with different charging demand profiles. Our results reveal the market share of electric vehicles can increase to around 40% of the total market share if the key features of electric vehicles reach a similar level to those of traditional vehicles. In this estimation, an increase in the power market’s system generation costs will reach around 10% of the cost in the baseline scenario, which differs slightly depending on charging demand profiles.

  2. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  3. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  4. Genetic variability of psychrotolerant Acidithiobacillus ferrivorans revealed by (meta)genomic analysis.

    Science.gov (United States)

    González, Carolina; Yanquepe, María; Cardenas, Juan Pablo; Valdes, Jorge; Quatrini, Raquel; Holmes, David S; Dopson, Mark

    2014-11-01

    Acidophilic microorganisms inhabit low pH environments such as acid mine drainage that is generated when sulfide minerals are exposed to air. The genome sequence of the psychrotolerant Acidithiobacillus ferrivorans SS3 was compared to a metagenome from a low temperature acidic stream dominated by an A. ferrivorans-like strain. Stretches of genomic DNA characterized by few matches to the metagenome, termed 'metagenomic islands', encoded genes associated with metal efflux and pH homeostasis. The metagenomic islands were enriched in mobile elements such as phage proteins, transposases, integrases and in one case, predicted to be flanked by truncated tRNAs. Cus gene clusters predicted to be involved in copper efflux and further Cus-like RND systems were predicted to be located in metagenomic islands and therefore, constitute part of the flexible gene complement of the species. Phylogenetic analysis of Cus clusters showed both lineage specificity within the Acidithiobacillus genus as well as niche specificity associated with an acidic environment. The metagenomic islands also contained a predicted copper efflux P-type ATPase system and a polyphosphate kinase potentially involved in polyphosphate mediated copper resistance. This study identifies genetic variability of low temperature acidophiles that likely reflects metal resistance selective pressures in the copper rich environment. Copyright © 2014 Institut Pasteur. Published by Elsevier Masson SAS. All rights reserved.

  5. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  6. NASA's Chandra Reveals Origin of Key Cosmic Explosions

    Science.gov (United States)

    2010-02-01

    WASHINGTON -- New findings from NASA's Chandra X-ray Observatory have provided a major advance in understanding a type of supernova critical for studying the dark energy that astronomers think pervades the universe. The results show mergers of two dense stellar remnants are the likely cause of many of the supernovae that have been used to measure the accelerated expansion of the universe. These supernovae, called Type Ia, serve as cosmic mile markers to measure expansion of the universe because they can be seen at large distances, and they follow a reliable pattern of brightness. However, until now, scientists have been unsure what actually causes the explosions. "These are such critical objects in understanding the universe," said Marat Gilfanov of the Max Planck Institute for Astrophysics in Germany and lead author of the study that appears in the Feb. 18 edition of the journal Nature. "It was a major embarrassment that we did not know how they worked. Now we are beginning to understand what lights the fuse of these explosions." Most scientists agree a Type Ia supernova occurs when a white dwarf star -- a collapsed remnant of an elderly star -- exceeds its weight limit, becomes unstable and explodes. Scientists have identified two main possibilities for pushing the white dwarf over the edge: two white dwarfs merging or accretion, a process in which the white dwarf pulls material from a sun-like companion star until it exceeds its weight limit. "Our results suggest the supernovae in the galaxies we studied almost all come from two white dwarfs merging," said co-author Akos Bogdan, also of Max Planck. "This is probably not what many astronomers would expect." The difference between these two scenarios may have implications for how these supernovae can be used as "standard candles" -- objects of a known brightness -- to track vast cosmic distances. Because white dwarfs can come in a range of masses, the merger of two could result in explosions that vary somewhat in brightness. Because these two scenarios would generate different amounts of X-ray emission, Gilfanov and Bogdan used Chandra to observe five nearby elliptical galaxies and the central region of the Andromeda galaxy. A Type 1a supernova caused by accreting material produces significant X- ray emission prior to the explosion. A supernova from a merger of two white dwarfs, on the other hand, would create significantly less X-ray emission than the accretion scenario. The scientists found the observed X-ray emission was a factor of 30 to 50 times smaller than expected from the accretion scenario, effectively ruling it out. This implies that white dwarf mergers dominate in these galaxies. An open question remains whether these white dwarf mergers are the primary catalyst for Type Ia supernovae in spiral galaxies. Further studies are required to know if supernovae in spiral galaxies are caused by mergers or a mixture of the two processes. Another intriguing consequence of this result is that a pair of white dwarfs is relatively hard to spot, even with the best telescopes. "To many astrophysicists, the merger scenario seemed to be less likely because too few double-white-dwarf systems appeared to exist," said Gilfanov. "Now this path to supernovae will have to be investigated in more detail." In addition to the X-rays observed with Chandra, other data critical for this result came from NASA's Spitzer Space Telescope and the ground-based, infrared Two Micron All Sky Survey. The infrared brightness of the galaxies allowed the team to estimate how many supernovae should occur. NASA's Marshall Space Flight Center in Huntsville, Ala., manages the Chandra program for NASA's Science Mission Directorate in Washington. The Smithsonian Astrophysical Observatory controls Chandra's science and flight operations from Cambridge, Mass. More information, including images and other multimedia, can be found at: http://chandra.harvard.edu and http://chandra.nasa.gov

  7. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  8. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  9. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study.

    Science.gov (United States)

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.

  10. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  11. DNA microarray revealed and RNAi plants confirmed key genes conferring low Cd accumulation in barley grains

    DEFF Research Database (Denmark)

    Sun, Hongyan; Chen, Zhong-Hua; Chen, Fei

    2015-01-01

    Background Understanding the mechanism of low Cd accumulation in crops is crucial for sustainable safe food production in Cd-contaminated soils. Results Confocal microscopy, atomic absorption spectrometry, gas exchange and chlorophyll fluorescence analyses revealed a distinct difference in Cd...... with a substantial difference between the two genotypes. Cd stress led to higher expression of genes involved in transport, carbohydrate metabolism and signal transduction in the low-grain-Cd-accumulating genotype. Novel transporter genes such as zinc transporter genes were identified as being associated with low Cd...... accumulation. Quantitative RT-PCR confirmed our microarray data. Furthermore, suppression of the zinc transporter genes HvZIP3 and HvZIP8 by RNAi silencing showed increased Cd accumulation and reduced Zn and Mn concentrations in barley grains. Thus, HvZIP3 and HvZIP8 could be candidate genes related to low...

  12. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    Science.gov (United States)

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  13. A novel genetic tool for metabolic optimization of Corynebacterium glutamicum: efficient and repetitive chromosomal integration of synthetic promoter-driven expression libraries

    DEFF Research Database (Denmark)

    Shen, Jing; Chen, Jun; Jensen, Peter Ruhdal

    2017-01-01

    readily could integrate into the attB site in this strain providing expression of the corresponding integrase. Subsequent expression of the Cre recombinase promoted recombination between the modified loxP sites, resulting in a strain only retaining the target insertions and an attB site. To simplify...... the procedure, non-replicating circular expression units for the phage integrase and the Cre recombinase were used. As a showcase, we used the tool to construct a battery of strains simultaneously expressing the two reporter genes, lacZ (encoding β-galactosidase) and gusA (encoding β...

  14. A Recommended Set of Key Arctic Indicators

    Science.gov (United States)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  15. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    Science.gov (United States)

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  16. Emerging contaminants and nutrients synergistically affect the spread of class 1 integron-integrase (intI1) and sul1 genes within stable streambed bacterial communities.

    Science.gov (United States)

    Subirats, Jèssica; Timoner, Xisca; Sànchez-Melsió, Alexandre; Balcázar, José Luis; Acuña, Vicenç; Sabater, Sergi; Borrego, Carles M

    2018-07-01

    Wastewater effluents increase the nutrient load of receiving streams while introducing a myriad of anthropogenic chemical pollutants that challenge the resident aquatic (micro)biota. Disentangling the effects of both kind of stressors and their potential interaction on the dissemination of antibiotic resistance genes in bacterial communities requires highly controlled manipulative experiments. In this work, we investigated the effects of a combined regime of nutrients (at low, medium and high concentrations) and a mixture of emerging contaminants (ciprofloxacin, erythromycin, sulfamethoxazole, diclofenac, and methylparaben) on the bacterial composition, abundance and antibiotic resistance profile of biofilms grown in artificial streams. In particular, we investigated the effect of this combined stress on genes encoding resistance to ciprofloxacin (qnrS), erythromycin (ermB), sulfamethoxazole (sul1 and sul2) as well as the class 1 integron-integrase gene (intI1). Only genes conferring resistance to sulfonamides (sul1 and sul2) and intI1 gene were detected in all treatments during the study period. Besides, bacterial communities exposed to emerging contaminants showed higher copy numbers of sul1 and intI1 genes than those not exposed, whereas nutrient amendments did not affect their abundance. However, bacterial communities exposed to both emerging contaminants and a high nutrient concentration (1, 25 and 1 mg L -1 of phosphate, nitrate and ammonium, respectively) showed the highest increase on the abundance of sul1 and intI1 genes thus suggesting a factors synergistic effect of both stressors. Since none of the treatments caused a significant change on the composition of bacterial communities, the enrichment of sul1 and intI1 genes within the community was caused by their dissemination under the combined pressure exerted by nutrients and emerging contaminants. To the best of our knowledge, this is the first study demonstrating the contribution of nutrients on

  17. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  18. Gene expression profiles reveal key genes for early diagnosis and treatment of adamantinomatous craniopharyngioma.

    Science.gov (United States)

    Yang, Jun; Hou, Ziming; Wang, Changjiang; Wang, Hao; Zhang, Hongbing

    2018-04-23

    Adamantinomatous craniopharyngioma (ACP) is an aggressive brain tumor that occurs predominantly in the pediatric population. Conventional diagnosis method and standard therapy cannot treat ACPs effectively. In this paper, we aimed to identify key genes for ACP early diagnosis and treatment. Datasets GSE94349 and GSE68015 were obtained from Gene Expression Omnibus database. Consensus clustering was applied to discover the gene clusters in the expression data of GSE94349 and functional enrichment analysis was performed on gene set in each cluster. The protein-protein interaction (PPI) network was built by the Search Tool for the Retrieval of Interacting Genes, and hubs were selected. Support vector machine (SVM) model was built based on the signature genes identified from enrichment analysis and PPI network. Dataset GSE94349 was used for training and testing, and GSE68015 was used for validation. Besides, RT-qPCR analysis was performed to analyze the expression of signature genes in ACP samples compared with normal controls. Seven gene clusters were discovered in the differentially expressed genes identified from GSE94349 dataset. Enrichment analysis of each cluster identified 25 pathways that highly associated with ACP. PPI network was built and 46 hubs were determined. Twenty-five pathway-related genes that overlapped with the hubs in PPI network were used as signatures to establish the SVM diagnosis model for ACP. The prediction accuracy of SVM model for training, testing, and validation data were 94, 85, and 74%, respectively. The expression of CDH1, CCL2, ITGA2, COL8A1, COL6A2, and COL6A3 were significantly upregulated in ACP tumor samples, while CAMK2A, RIMS1, NEFL, SYT1, and STX1A were significantly downregulated, which were consistent with the differentially expressed gene analysis. SVM model is a promising classification tool for screening and early diagnosis of ACP. The ACP-related pathways and signature genes will advance our knowledge of ACP pathogenesis

  19. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  20. Mechanical unfolding reveals stable 3-helix intermediates in talin and α-catenin.

    Directory of Open Access Journals (Sweden)

    Vasyl V Mykuliak

    2018-04-01

    Full Text Available Mechanical stability is a key feature in the regulation of structural scaffolding proteins and their functions. Despite the abundance of α-helical structures among the human proteome and their undisputed importance in health and disease, the fundamental principles of their behavior under mechanical load are poorly understood. Talin and α-catenin are two key molecules in focal adhesions and adherens junctions, respectively. In this study, we used a combination of atomistic steered molecular dynamics (SMD simulations, polyprotein engineering, and single-molecule atomic force microscopy (smAFM to investigate unfolding of these proteins. SMD simulations revealed that talin rod α-helix bundles as well as α-catenin α-helix domains unfold through stable 3-helix intermediates. While the 5-helix bundles were found to be mechanically stable, a second stable conformation corresponding to the 3-helix state was revealed. Mechanically weaker 4-helix bundles easily unfolded into a stable 3-helix conformation. The results of smAFM experiments were in agreement with the findings of the computational simulations. The disulfide clamp mutants, designed to protect the stable state, support the 3-helix intermediate model in both experimental and computational setups. As a result, multiple discrete unfolding intermediate states in the talin and α-catenin unfolding pathway were discovered. Better understanding of the mechanical unfolding mechanism of α-helix proteins is a key step towards comprehensive models describing the mechanoregulation of proteins.

  1. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    Science.gov (United States)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  2. An Analysis of Key Factors in Developing a Smart City

    Directory of Open Access Journals (Sweden)

    Aidana Šiurytė

    2016-06-01

    Full Text Available The concept Smart City is used widely but it is perceived differently as well. Literature review reveals key elements of the Smart City – Information and Communication Technologies and Smart Citizens. Nevertheless, raising public awareness is not a priority of local municipalities which are trying to develop cities. Focus group discussion aims to analyse citizens’ insights in regards to the Smart City and their contribution to creation of it. Case study of Vilnius examines a position of mu-nicipality in developing city as smart. Study contains suggestions for the improvement of communication in the city. Methods employed: comparative literature analysis, focus group investigation, case study.

  3. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  4. Uncovering SUMOylation Dynamics during Cell-Cycle Progression Reveals FoxM1 as a Key Mitotic SUMO Target Protein

    DEFF Research Database (Denmark)

    Schimmel, Joost; Eifler, Karolin; Sigurdsson, Jón Otti

    2014-01-01

    Loss of small ubiquitin-like modification (SUMOylation) in mice causes genomic instability due to the missegregation of chromosomes. Currently, little is known about the identity of relevant SUMO target proteins that are involved in this process and about global SUMOylation dynamics during cell......-cycle progression. We performed a large-scale quantitative proteomics screen to address this and identified 593 proteins to be SUMO-2 modified, including the Forkhead box transcription factor M1 (FoxM1), a key regulator of cell-cycle progression and chromosome segregation. SUMOylation of FoxM1 peaks during G2 and M...... relieving FoxM1 autorepression. Cells deficient for FoxM1 SUMOylation showed increased levels of polyploidy. Our findings contribute to understanding the role of SUMOylation during cell-cycle progression....

  5. Key volatile aroma compounds of lactic acid fermented malt based beverages - impact of lactic acid bacteria strains.

    Science.gov (United States)

    Nsogning Dongmo, Sorelle; Sacher, Bertram; Kollmannsberger, Hubert; Becker, Thomas

    2017-08-15

    This study aims to define the aroma composition and key aroma compounds of barley malt wort beverages produced from fermentation using six lactic acid bacteria (LAB) strains. Gas chromatography mass spectrometry-olfactometry and flame ionization detection was employed; key aroma compounds were determined by means of aroma extract dilution analysis. Fifty-six detected volatile compounds were similar among beverages. However, significant differences were observed in the concentration of individual compounds. Key aroma compounds (flavor dilution (FD) factors ≥16) were β-damascenone, furaneol, phenylacetic acid, 2-phenylethanol, 4-vinylguaiacol, sotolon, methional, vanillin, acetic acid, nor-furaneol, guaiacol and ethyl 2-methylbutanoate. Furthermore, acetaldehyde had the greatest odor activity value of up to 4266. Sensory analyses revealed large differences in the flavor profile. Beverage from L. plantarum Lp. 758 showed the highest FD factors in key aroma compounds and was correlated to fruity flavors. Therefore, we suggest that suitable LAB strain selection may improve the flavor of malt based beverages. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  7. Studies on the key aroma compounds in raw (unheated) and heated Japanese soy sauce.

    Science.gov (United States)

    Kaneko, Shu; Kumazawa, Kenji; Nishimura, Osamu

    2013-04-10

    An investigation using the aroma extract dilution analysis (AEDA) technique of the aroma concentrate from a raw Japanese soy sauce and the heated soy sauce revealed 40 key aroma compounds including 7 newly identified compounds. Among them, 5(or 2)-ethyl-4-hydroxy-2(or 5)-methyl-3(2H)-furanone and 3-hydroxy-4,5-dimethyl-2(5H)-furanone exhibited the highest flavor dilution (FD) factor of 2048, followed by 3-(methylthio)propanal, 4-ethyl-2-methoxyphenol, and 4-hydroxy-2,5-dimethyl-3(2H)-furanone having FD factors from 128 to 512 in the raw soy sauce. Furthermore, comparative AEDAs, a quantitative analysis, and a sensory analysis demonstrated that whereas most of the key aroma compounds in the raw soy sauce were common in the heated soy sauce, some of the Strecker aldehydes and 4-vinylphenols contributed less to the raw soy sauce aroma. The model decarboxylation reactions of the phenolic acids during heating of the raw soy sauce revealed that although all reactions resulted in low yields, the hydroxycinnamic acid derivatives were much more reactive than the hydroxybenzoic acid derivatives due to the stable reaction intermediates. Besides the quantitative analyses of the soy sauces, the estimation of the reaction yields of the phenolic compounds in the heated soy sauce revealed that although only the 4-vinylphenols increased during heating of the raw soy sauce, they might not mainly be formed as decarboxylation products from the corresponding hydroxycinnamic acids but from the other proposed precursors, such as lignin, shakuchirin, and esters with arabinoxylan.

  8. Origins of the Xylella fastidiosa prophage-like regions and their impact in genome differentiation.

    Directory of Open Access Journals (Sweden)

    Alessandro de Mello Varani

    Full Text Available Xylella fastidiosa is a Gram negative plant pathogen causing many economically important diseases, and analyses of completely sequenced X. fastidiosa genome strains allowed the identification of many prophage-like elements and possibly phage remnants, accounting for up to 15% of the genome composition. To better evaluate the recent evolution of the X. fastidiosa chromosome backbone among distinct pathovars, the number and location of prophage-like regions on two finished genomes (9a5c and Temecula1, and in two candidate molecules (Ann1 and Dixon were assessed. Based on comparative best bidirectional hit analyses, the majority (51% of the predicted genes in the X. fastidiosa prophage-like regions are related to structural phage genes belonging to the Siphoviridae family. Electron micrograph reveals the existence of putative viral particles with similar morphology to lambda phages in the bacterial cell in planta. Moreover, analysis of microarray data indicates that 9a5c strain cultivated under stress conditions presents enhanced expression of phage anti-repressor genes, suggesting switches from lysogenic to lytic cycle of phages under stress-induced situations. Furthermore, virulence-associated proteins and toxins are found within these prophage-like elements, thus suggesting an important role in host adaptation. Finally, clustering analyses of phage integrase genes based on multiple alignment patterns reveal they group in five lineages, all possessing a tyrosine recombinase catalytic domain, and phylogenetically close to other integrases found in phages that are genetic mosaics and able to perform generalized and specialized transduction. Integration sites and tRNA association is also evidenced. In summary, we present comparative and experimental evidence supporting the association and contribution of phage activity on the differentiation of Xylella genomes.

  9. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  10. Genome-wide functional analysis of plasmodium protein phosphatases reveals key regulators of parasite development and differentiation

    KAUST Repository

    Guttery, David  S.; Poulin, Benoit; Ramaprasad, Abhinay; Wall, Richard  J.; Ferguson, David  J.P.; Brady, Declan; Patzewitz, Eva-Maria; Whipple, Sarah; Straschil, Ursula; Wright, Megan  H.; Mohamed, Alyaa  M.A.H.; Radhakrishnan, Anand; Arold, Stefan T.; Tate, Edward  W.; Holder, Anthony  A.; Wickstead, Bill; Pain, Arnab; Tewari, Rita

    2014-01-01

    Reversible protein phosphorylation regulated by kinases and phosphatases controls many cellular processes. Although essential functions for the malaria parasite kinome have been reported, the roles of most protein phosphatases (PPs) during Plasmodium development are unknown. We report a functional analysis of the Plasmodium berghei protein phosphatome, which exhibits high conservation with the P. falciparum phosphatome and comprises 30 predicted PPs with differential and distinct expression patterns during various stages of the life cycle. Gene disruption analysis of P. berghei PPs reveals that half of the genes are likely essential for asexual blood stage development, whereas six are required for sexual development/sporogony in mosquitoes. Phenotypic screening coupled with transcriptome sequencing unveiled morphological changes and altered gene expression in deletion mutants of two N-myristoylated PPs. These findings provide systematic functional analyses of PPs in Plasmodium, identify how phosphatases regulate parasite development and differentiation, and can inform the identification of drug targets for malaria. © 2014 The Authors.

  11. Genome-wide functional analysis of plasmodium protein phosphatases reveals key regulators of parasite development and differentiation

    KAUST Repository

    Guttery, David S.

    2014-07-09

    Reversible protein phosphorylation regulated by kinases and phosphatases controls many cellular processes. Although essential functions for the malaria parasite kinome have been reported, the roles of most protein phosphatases (PPs) during Plasmodium development are unknown. We report a functional analysis of the Plasmodium berghei protein phosphatome, which exhibits high conservation with the P. falciparum phosphatome and comprises 30 predicted PPs with differential and distinct expression patterns during various stages of the life cycle. Gene disruption analysis of P. berghei PPs reveals that half of the genes are likely essential for asexual blood stage development, whereas six are required for sexual development/sporogony in mosquitoes. Phenotypic screening coupled with transcriptome sequencing unveiled morphological changes and altered gene expression in deletion mutants of two N-myristoylated PPs. These findings provide systematic functional analyses of PPs in Plasmodium, identify how phosphatases regulate parasite development and differentiation, and can inform the identification of drug targets for malaria. © 2014 The Authors.

  12. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  13. Sustainability of the Tourism Industry, Based on Financial Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Adriana Dutescu

    2014-11-01

    Full Text Available Even if there is a real need of a set of key performance indicators for small and medium sized enterprises, this is not yet considered to be satisfied. Our research is focused on two main aspects, each of them individually important for the users of accounting information: the basic indicators specific for analysing operational performance and for decision making and the trend of the key performance indicators in the context of the economic crisis. The starting point of the study is a questionnaire addressed to small and medium sized enterprises activating in the tourism area, especially in the hotel industry. The respondents answered the questions in perfect anonymity by choosing one of the multiple choices for some of them and offering open answers to the others. Our analysis reveals a fair view of the dynamic of the most used key performance indicators in Romanian hotel industry, the limits of their interpretation and usage and the evolution of the financial and economic performance. The declared purpose of the research is to set the bases of a starting point in order to provide solutions for improving the relevance and the usage of these indicators in this domain, in the context of a sustainable business, taking into account the nowadays status of the economy in general and in particular the hotel industry.

  14. THE EFFECT OF TEACHING WITHIN-TEXT KEY WORDS ON STUDENTS’ PERFORMANCE IN READING COMPREHENSION

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Khodasenas

    2013-07-01

    Full Text Available Abstract: The present study was conducted to investigate the effects of teaching within-text key word synonyms, opposites and related words on students’ performance on reading comprehension of TOEFL among Iranian EFL learners. To carry out the research, 60 Iranian EFL learners, who participated in a TOEFL preparation course, were selected as the participants of the study. Afterward they were randomly assigned into experimental and comparison groups. The experimental group was given a treatment including within-text key word synonyms, opposites and their translations, while the comparison group was given a placebo. To collect the required data, two instruments (a pre-test, and a post-test were administered to both groups during the experimentation. Subsequently, students’ scores were collected through the administration of different tests and the results were statistically analyzed. The results of these analyses revealed that the experimental group outperformed the comparison group and thus, it was concluded that teaching within-text key word synonyms, opposites and related words can improve the reading comprehension ability and general proficiency of EFL language learners.

  15. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  16. Long-term monitoring reveals carbon-nitrogen metabolism key to microcystin production in eutrophic lakes

    Directory of Open Access Journals (Sweden)

    Lucas J Beversdorf

    2015-05-01

    Full Text Available The environmental drivers contributing to cyanobacterial dominance in aquatic systems have been extensively studied. However, understanding of toxic versus non-toxic cyanobacterial population dynamics and the mechanisms regulating cyanotoxin production remain elusive, both physiologically and ecologically. One reason is the disconnect between laboratory and field-based studies. Here, we combined three years of temporal data, including microcystin (MC concentrations, 16 years of long-term ecological research, and 10 years of molecular data to investigate the potential factors leading to the selection of toxic Microcystis and MC production. Our analysis revealed that nitrogen (N speciation and inorganic carbon (C availability might be important drivers of Microcystis population dynamics and that an imbalance in cellular C: N ratios may trigger MC production. More specifically, precipitous declines in ammonium concentrations lead to a transitional period of N stress, even in the presence of high nitrate concentrations, that we call the toxic phase. Following the toxic phase, temperature and cyanobacterial abundance remained elevated but MC concentrations drastically declined. Increases in ammonium due to lake turnover may have led to down regulation of MC synthesis or a shift in the community from toxic to non-toxic species. While total phosphorus (P to total N ratios were relatively low over the time-series, MC concentrations were highest when total N to total P ratios were also highest. Similarly, high C: N ratios were also strongly correlated to the toxic phase. We propose a metabolic model that corroborates molecular studies and reflects our ecological observations that C and N metabolism may regulate MC production physiologically and ecologically. In particular, we hypothesize that an imbalance between 2-oxoglutarate and ammonium in the cell regulates MC synthesis in the environment.

  17. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  18. Effects of Combined CCR5/Integrase Inhibitors-Based Regimen on Mucosal Immunity in HIV-Infected Patients Naïve to Antiretroviral Therapy: A Pilot Randomized Trial.

    Directory of Open Access Journals (Sweden)

    Sergio Serrano-Villar

    2016-01-01

    Full Text Available Whether initiation of antiretroviral therapy (ART regimens aimed at achieving greater concentrations within gut associated lymphoid tissue (GALT impacts the level of mucosal immune reconstitution, inflammatory markers and the viral reservoir remains unknown. We included 12 HIV- controls and 32 ART-naïve HIV patients who were randomized to efavirenz, maraviroc or maraviroc+raltegravir, each with fixed-dose tenofovir disoproxil fumarate/emtricitabine. Rectal and duodenal biopsies were obtained at baseline and at 9 months of ART. We performed a comprehensive assay of T-cell subsets by flow cytometry, T-cell density in intestinal biopsies, plasma and tissue concentrations of antiretroviral drugs by high-performance liquid chromatography/mass spectroscopy, and plasma interleukin-6 (IL-6, lipoteichoic acid (LTA, soluble CD14 (sCD14 and zonulin-1 each measured by ELISA. Total cell-associated HIV DNA was measured in PBMC and rectal and duodenal mononuclear cells. Twenty-six HIV-infected patients completed the follow-up. In the duodenum, the quadruple regimen resulted in greater CD8+ T-cell density decline, greater normalization of mucosal CCR5+CD4+ T-cells and increase of the naïve/memory CD8+ T-cell ratio, and a greater decline of sCD14 levels and duodenal HIV DNA levels (P = 0.004 and P = 0.067, respectively, with no changes in HIV RNA in plasma or tissue. Maraviroc showed the highest drug distribution to the gut tissue, and duodenal concentrations correlated well with other T-cell markers in duodenum, i.e., the CD4/CD8 ratio, %CD4+ and %CD8+ HLA-DR+CD38+ T-cells. Maraviroc use elicited greater activation of the mucosal naïve CD8+ T-cell subset, ameliorated the distribution of the CD8+ T-cell maturational subsets and induced higher improvement of zonulin-1 levels. These data suggest that combined CCR5 and integrase inhibitor based combination therapy in ART treatment naïve patients might more effectively reconstitute duodenal immunity, decrease

  19. Transcriptional profiling of human brain endothelial cells reveals key properties crucial for predictive in vitro blood-brain barrier models.

    Directory of Open Access Journals (Sweden)

    Eduard Urich

    Full Text Available Brain microvascular endothelial cells (BEC constitute the blood-brain barrier (BBB which forms a dynamic interface between the blood and the central nervous system (CNS. This highly specialized interface restricts paracellular diffusion of fluids and solutes including chemicals, toxins and drugs from entering the brain. In this study we compared the transcriptome profiles of the human immortalized brain endothelial cell line hCMEC/D3 and human primary BEC. We identified transcriptional differences in immune response genes which are directly related to the immortalization procedure of the hCMEC/D3 cells. Interestingly, astrocytic co-culturing reduced cell adhesion and migration molecules in both BECs, which possibly could be related to regulation of immune surveillance of the CNS controlled by astrocytic cells within the neurovascular unit. By matching the transcriptome data from these two cell lines with published transcriptional data from freshly isolated mouse BECs, we discovered striking differences that could explain some of the limitations of using cultured BECs to study BBB properties. Key protein classes such as tight junction proteins, transporters and cell surface receptors show differing expression profiles. For example, the claudin-5, occludin and JAM2 expression is dramatically reduced in the two human BEC lines, which likely explains their low transcellular electric resistance and paracellular leakiness. In addition, the human BEC lines express low levels of unique brain endothelial transporters such as Glut1 and Pgp. Cell surface receptors such as LRP1, RAGE and the insulin receptor that are involved in receptor-mediated transport are also expressed at very low levels. Taken together, these data illustrate that BECs lose their unique protein expression pattern outside of their native environment and display a more generic endothelial cell phenotype. A collection of key genes that seems to be highly regulated by the local

  20. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  1. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  2. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  3. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  4. Hydra meiosis reveals unexpected conservation of structural synaptonemal complex proteins across metazoans

    OpenAIRE

    Fraune, Johanna; Alsheimer, Manfred; Volff, Jean-Nicolas; Busch, Karoline; Fraune, Sebastian; Bosch, Thomas C. G.; Benavente, Ricardo

    2012-01-01

    The synaptonemal complex (SC) is a key structure of meiosis, mediating the stable pairing (synapsis) of homologous chromosomes during prophase I. Its remarkable tripartite structure is evolutionarily well conserved and can be found in almost all sexually reproducing organisms. However, comparison of the different SC protein components in the common meiosis model organisms Saccharomyces cerevisiae, Arabidopsis thaliana, Caenorhabditis elegans, Drosophila melanogaster, and Mus musculus revealed...

  5. One-way quantum key distribution: Simple upper bound on the secret key rate

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  6. Meta-Key: A Secure Data-Sharing Protocol under Blockchain-Based Decentralised Storage Architecture

    OpenAIRE

    Fu, Yue

    2017-01-01

    In this paper a secure data-sharing protocol under blockchain-based decentralised storage architecture is proposed, which fulfils users who need to share their encrypted data on-cloud. It implements a remote data-sharing mechanism that enables data owners to share their encrypted data to other users without revealing the original key. Nor do they have to download on-cloud data with re-encryption and re-uploading. Data security as well as efficiency are ensured by symmetric encryption, whose k...

  7. Development of an SSR-based identification key for Tunisian local almonds

    Directory of Open Access Journals (Sweden)

    Hassouna Gouta

    2012-04-01

    Full Text Available Ten simple sequence repeat (SSR loci were used to study polymorphism in 54 almond genotypes. All genotypes used in this study originated from almond-growing areas in Tunisia with different climatic conditions ranging from the sub-humid to the arid and are preserved in the national collection at Sidi Bouzid. Using ten SSR, 130 alleles and 250 genotypes were revealed. In order to develop an identification key for each accession, the data were analysed separately for each microsatellite marker. The most polymorphic microsatellite (CPDCT042 was used as a first marker. Two microsatellite loci (CPDCT042 and CPDCT025 were sufficient to discriminate among all accessions studied. Neighbour-joining clustering and principal coordinate analysis were performed to arrange the genotypes according to their genetic relationships and origin. The results are discussed in the context of almond collection management, conformity checks, identification of homonyms, and screening of the local almond germplasm. Furthermore, this microsatellite-based key is a first step toward a marker-assisted identification almond database.

  8. An improved authenticated key agreement protocol for telecare medicine information system.

    Science.gov (United States)

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  9. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  10. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  11. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  12. A resolvase-like protein is requered for the site-specific integration of the temperate lactococcal bacteriophage TP901-1

    DEFF Research Database (Denmark)

    Christiansen, Bettina; Brøndsted, Lone; Vogensen, Finn K.

    1996-01-01

    upstream of attP. The N-terminal 150 to 1180 amino acids of Orf1 showed 38 to 44% similarity to the resolvase group of site-specific integrases, while no similarity to know proteins was found in the C-terminal end. Bacteriophage 'TP901-1 therefore contains a unique integration system that does not resemble...... the Int class of site-specific integrases usually found in temperate bacteriophages. The constructed integration vector, pBC170, integrates into the chromosomal attachment site very efficiently and forms stable transformants with a frequency corresponding to 20% of the transformation efficiency....

  13. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  14. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  15. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  16. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  17. Applying Statistical and Complex Network Methods to Explore the Key Signaling Molecules of Acupuncture Regulating Neuroendocrine-Immune Network

    Directory of Open Access Journals (Sweden)

    Kuo Zhang

    2018-01-01

    Full Text Available The mechanisms of acupuncture are still unclear. In order to reveal the regulatory effect of manual acupuncture (MA on the neuroendocrine-immune (NEI network and identify the key signaling molecules during MA modulating NEI network, we used a rat complete Freund’s adjuvant (CFA model to observe the analgesic and anti-inflammatory effect of MA, and, what is more, we used statistical and complex network methods to analyze the data about the expression of 55 common signaling molecules of NEI network in ST36 (Zusanli acupoint, and serum and hind foot pad tissue. The results indicate that MA had significant analgesic, anti-inflammatory effects on CFA rats; the key signaling molecules may play a key role during MA regulating NEI network, but further research is needed.

  18. In vitro model of production of antibodies; a new approach to reveal the presence of key bacteria in polymicrobial environments.

    Science.gov (United States)

    Wu, Chongcong; Nakka, Sravya; Mansouri, Sepahdar; Bengtsson, Torbjörn; Nayeri, Tayeb; Nayeri, Fariba

    2016-09-09

    There is a rapid emergence of multiple resistant gram-negative bacteria due to overuse of antibiotics in the treatment of infections. Biofilms consist of polymicrobial communities that survive the host's defense system. The key bacteria in biofilms are slow growing and support an attachment and rapid growth of other microorganisms. Current antimicrobial strategies often fail due to poor diagnosis of key pathogens in biofilms. The study aims to develop anti-bacterial human antibodies in vitro from patients who had recently undergone a systemic infection by pathogenic bacteria and to use these antibodies as a tool for detecting bacteria in biofilms. Lymphocytes were separated from whole blood of patients (n = 10) and stimulated with heat-killed bacteria to produce antibodies in vitro. The specificity of antibodies in recognizing the bacteria against which they were directed was evaluated by surface plasmon resonance system (SPR) and electron microscopy. The ulcer secretions from patients with chronic and acute leg ulcers and healthy controls were analyzed by the SPR system and the results were compared with culture studies. The produced antibodies recognized bacteria with high sensitivity (SPR). The antibodies against Enterococcus fecalis bound specifically to the microorganism in a bacterial co-culture that was visualized by electron microscopy. In the present work, a method for producing specific antibodies against bacteria is introduced to recognize bacterial components in body fluids of patients suffering from pathogenic biofilms. This diagnostic technique may be most useful in clinical microbiology and in the choice of antibiotics in the treatment of serious infections.

  19. No Child Left Behind in Art Education Policy: A Review of Key Recommendations for Arts Language Revisions

    Science.gov (United States)

    Grey, Anne C.

    2010-01-01

    From bipartisan origins and a laudable intent, the No Child Left Behind (Act) of 2001 has profoundly altered the condition of art education. A historical vantage point and review of literature reveals the current status of pending arts language revisions to the NCLB Act, as well as a pressing need to examine the key recommendations and to consider…

  20. Widespread dissemination of class 1 integron components in soils and related ecosystems as revealed by cultivation-independent analysis.

    Science.gov (United States)

    Jechalke, Sven; Schreiter, Susanne; Wolters, Birgit; Dealtry, Simone; Heuer, Holger; Smalla, Kornelia

    2013-01-01

    Class 1 integrons contribute to the emerging problem of antibiotic resistance in human medicine by acquisition, exchange, and expression of resistance genes embedded within gene cassettes. Besides the clinical setting they were recently reported from environmental habitats and often located on plasmids and transposons, facilitating their transfer and spread within bacterial communities. In this study we aimed to provide insights into the occurrence of genes typically associated with the class 1 integrons in previously not studied environments with or without human impact and their association with IncP-1 plasmids. Total community DNA was extracted from manure-treated and untreated soils, lettuce and potato rhizosphere, digestates, and an on-farm biopurification system and screened by PCR with subsequent Southern blot hybridization for the presence of the class 1 integrase gene intI1 as well as qacE and qacEΔ 1 resistance genes. The results revealed a widespread dissemination of class 1 integrons in the environments analyzed, mainly related to the presence of qacEΔ 1 genes. All 28 IncP-1ε plasmids carrying class 1 integrons, which were captured exogenously in a recent study from piggery manure and soils treated with manure, carried qacEΔ 1 genes. Based on the strong hybridization signals in the rhizosphere of lettuce compared to the potato rhizosphere, the abundances of intI1, qacE/qacEΔ 1, and sul1 genes were quantified relative to the 16S rRNA gene abundance by real-time PCR in the rhizosphere of lettuce planted in three different soils and in the corresponding bulk soil. A significant enrichment of intI1 and qacE/qacEΔ 1 genes was confirmed in the rhizosphere of lettuce compared to bulk soil. Additionally, the relative abundance of korB genes specific for IncP-1 plasmids was enriched in the rhizosphere and correlated to the intI1 gene abundance indicating that IncP-1 plasmids might have contributed to the spread of class 1 integrons in the analyzed soils.

  1. Widespread dissemination of class 1 integron components in soils and related ecosystems as revealed by cultivation-independent analysis

    Directory of Open Access Journals (Sweden)

    Sven eJechalke

    2014-01-01

    Full Text Available Class 1 integrons contribute to the emerging problem of antibiotic resistance in human medicine by acquisition, exchange, and expression of resistance genes embedded within gene cassettes. Besides the clinical setting they were recently reported from environmental habitats and often located on plasmids and transposons, facilitating their transfer and spread within bacterial communities. In this study we aimed to provide insights into the occurrence of genes typically associated with the class 1 integrons in previously not studied environments with or without human impact and their association with IncP-1 plasmids. Total community DNA was extracted from manure-treated and untreated soils, lettuce and potato rhizosphere, digestates, and an on-farm biopurification system and screened by PCR with subsequent Southern blot hybridization for the presence of the class 1 integrase gene intI1 as well as qacE and qacEΔ1 resistance genes. The results revealed a widespread dissemination of class 1 integrons in the environments analyzed, mainly related to the presence of qacEΔ1 genes. All 28 IncP-1ε plasmids carrying class 1 integrons, which were captured exogenously in a recent study from piggery manure and soils treated with manure, carried qacEΔ1 genes. Based on the strong hybridization signals in the rhizosphere of lettuce compared to the potato rhizosphere, the abundances of intI1, qacE/qacEΔ1, and sul1 genes were quantified relative to the 16S rRNA gene abundance by real time PCR in the rhizosphere of lettuce planted in three different soils and in the corresponding bulk soil. A significant enrichment of intI1 and qacE/qacEΔ1 genes was confirmed in the rhizosphere of lettuce compared to bulk soil. Additionally, the relative abundance of korB genes specific for IncP-1 plasmids was enriched in the rhizosphere and correlated to the intI1 gene abundance indicating that IncP-1 plasmids might have contributed to the spread of class 1 integrons in the

  2. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  3. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  4. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  5. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  6. Network theory inspired analysis of time-resolved expression data reveals key players guiding P. patens stem cell development.

    Science.gov (United States)

    Busch, Hauke; Boerries, Melanie; Bao, Jie; Hanke, Sebastian T; Hiss, Manuel; Tiko, Theodhor; Rensing, Stefan A

    2013-01-01

    Transcription factors (TFs) often trigger developmental decisions, yet, their transcripts are often only moderately regulated and thus not easily detected by conventional statistics on expression data. Here we present a method that allows to determine such genes based on trajectory analysis of time-resolved transcriptome data. As a proof of principle, we have analysed apical stem cells of filamentous moss (P. patens) protonemata that develop from leaflets upon their detachment from the plant. By our novel correlation analysis of the post detachment transcriptome kinetics we predict five out of 1,058 TFs to be involved in the signaling leading to the establishment of pluripotency. Among the predicted regulators is the basic helix loop helix TF PpRSL1, which we show to be involved in the establishment of apical stem cells in P. patens. Our methodology is expected to aid analysis of key players of developmental decisions in complex plant and animal systems.

  7. High-efficiency Gaussian key reconciliation in continuous variable quantum key distribution

    Science.gov (United States)

    Bai, ZengLiang; Wang, XuYang; Yang, ShenShen; Li, YongMin

    2016-01-01

    Efficient reconciliation is a crucial step in continuous variable quantum key distribution. The progressive-edge-growth (PEG) algorithm is an efficient method to construct relatively short block length low-density parity-check (LDPC) codes. The qua-sicyclic construction method can extend short block length codes and further eliminate the shortest cycle. In this paper, by combining the PEG algorithm and qua-si-cyclic construction method, we design long block length irregular LDPC codes with high error-correcting capacity. Based on these LDPC codes, we achieve high-efficiency Gaussian key reconciliation with slice recon-ciliation based on multilevel coding/multistage decoding with an efficiency of 93.7%.

  8. Identification and Characterization of Putative Integron-Like Elements of the Heavy-Metal-Hypertolerant Strains of Pseudomonas spp.

    Science.gov (United States)

    Ciok, Anna; Adamczuk, Marcin; Bartosik, Dariusz; Dziewit, Lukasz

    2016-11-28

    Pseudomonas strains isolated from the heavily contaminated Lubin copper mine and Zelazny Most post-flotation waste reservoir in Poland were screened for the presence of integrons. This analysis revealed that two strains carried homologous DNA regions composed of a gene encoding a DNA_BRE_C domain-containing tyrosine recombinase (with no significant sequence similarity to other integrases of integrons) plus a three-component array of putative integron gene cassettes. The predicted gene cassettes encode three putative polypeptides with homology to (i) transmembrane proteins, (ii) GCN5 family acetyltransferases, and (iii) hypothetical proteins of unknown function (homologous proteins are encoded by the gene cassettes of several class 1 integrons). Comparative sequence analyses identified three structural variants of these novel integron-like elements within the sequenced bacterial genomes. Analysis of their distribution revealed that they are found exclusively in strains of the genus Pseudomonas .

  9. Derivation of ozone flux-yield relationships for lettuce: A key horticultural crop

    Energy Technology Data Exchange (ETDEWEB)

    Goumenaki, Eleni [Environmental and Molecular Plant Physiology, Institute for Research on the Environment and Sustainability, School of Biology and Psychology, Division of Biology, Devonshire Building, Newcastle University, Newcastle Upon Tyne NE1 7RU (United Kingdom); School of Agricultural Technology, Technological Education Institute of Crete, P.O. Box 1939, 71004 Heraklion (Greece); Fernandez, Ignacio Gonzalez [Environmental and Molecular Plant Physiology, Institute for Research on the Environment and Sustainability, School of Biology and Psychology, Division of Biology, Devonshire Building, Newcastle University, Newcastle Upon Tyne NE1 7RU (United Kingdom); CIEMAT, Ecotoxicology of Air Pollution, Avda. Complutense 22, 28040 Madrid (Spain); Papanikolaou, Antigoni [School of Agricultural Technology, Technological Education Institute of Crete, P.O. Box 1939, 71004 Heraklion (Greece); Papadopoulou, Despoina [School of Agricultural Technology, Technological Education Institute of Crete, P.O. Box 1939, 71004 Heraklion (Greece); Askianakis, Christos [School of Agricultural Technology, Technological Education Institute of Crete, P.O. Box 1939, 71004 Heraklion (Greece); Kouvarakis, George [Environmental and Chemical Processes Laboratory, Department of Chemistry, University of Crete, P.O. Box 1470, 71409 Heraklion (Greece); Barnes, Jeremy [Environmental and Molecular Plant Physiology, Institute for Research on the Environment and Sustainability, School of Biology and Psychology, Division of Biology, Devonshire Building, Newcastle University, Newcastle Upon Tyne NE1 7RU (United Kingdom)]. E-mail: j.d.barnes@ncl.ac.uk

    2007-04-15

    Ozone flux-response relationships were derived for lettuce, employing a multiplicative approach to model the manner in which stomatal conductance is influenced by key environmental variables, using a dataset collected during field experimentation in Crete and yield-response relationships derived from parallel open-top chamber experiments. Regional agronomic practices were adopted throughout. Computed versus measured data revealed that the derived model explained 51% (P < 0.001) of the observed variation in stomatal conductance. Concentration-based indices were compared with flux-based indices. Analyses revealed a significant relationship between accumulated stomatal ozone flux and yield employing flux threshold cut-offs up to 4 nmol m{sup -2} s{sup -1}. Regressions employing very low or zero flux thresholds resulted in the strongest yield-flux relationships (explaining {approx}80% (P < 0.05) of the variation in the dataset). - Establishment of ozone flux-yield relationships for a commercially-important horticultural crop grown widely in the Mediterranean.

  10. Human Activity Determines the Presence of Integron-Associated and Antibiotic Resistance Genes in Southwestern British Columbia

    Directory of Open Access Journals (Sweden)

    Miguel I. Uyaguari-Díaz

    2018-05-01

    Full Text Available The dissemination of antibiotic resistant bacteria from anthropogenic sources into the environment poses an emerging public health threat. Antibiotic resistance genes (ARGs and gene-capturing systems such as integron-associated integrase genes (intI play a key role in alterations of microbial communities and the spread of antibiotic resistant bacteria into the environment. In order to assess the effect of anthropogenic activities on watersheds in southwestern British Columbia, the presence of putative antibiotic resistance and integrase genes was analyzed in the microbiome of agricultural, urban influenced, and protected watersheds. A metagenomics approach and high-throughput quantitative PCR (HT qPCR were used to screen for elements of resistance including ARGs and intI. Metagenomic sequencing of bacterial genomic DNA was used to characterize the resistome of microbial communities present in watersheds over a 1-year period. There was a low prevalence of ARGs relative to the microbial population (<1%. Analysis of the metagenomic sequences detected a total of 60 elements of resistance including 46 ARGs, intI1, and groEL/intI1 genes and 12 quaternary ammonium compounds (qac resistance genes across all watershed locations. The relative abundance and richness of ARGs was found to be highest in agriculture impacted watersheds compared to urban and protected watersheds. A downstream transport pattern was observed in the impacted watersheds (urban and agricultural during dry months. Similar to other reports, this study found a strong association between intI1 and ARGs (e.g., sul1, an association which may be used as a proxy for anthropogenic activities. Chemical analysis of water samples for three major groups of antibiotics was below the detection limit. However, the high richness and gene copy numbers (GCNs of ARGs in impacted sites suggest that the effects of effluents on microbial communities are occurring even at low concentrations of

  11. Human Activity Determines the Presence of Integron-Associated and Antibiotic Resistance Genes in Southwestern British Columbia.

    Science.gov (United States)

    Uyaguari-Díaz, Miguel I; Croxen, Matthew A; Luo, Zhiyao; Cronin, Kirby I; Chan, Michael; Baticados, Waren N; Nesbitt, Matthew J; Li, Shaorong; Miller, Kristina M; Dooley, Damion; Hsiao, William; Isaac-Renton, Judith L; Tang, Patrick; Prystajecky, Natalie

    2018-01-01

    The dissemination of antibiotic resistant bacteria from anthropogenic sources into the environment poses an emerging public health threat. Antibiotic resistance genes (ARGs) and gene-capturing systems such as integron-associated integrase genes ( intI ) play a key role in alterations of microbial communities and the spread of antibiotic resistant bacteria into the environment. In order to assess the effect of anthropogenic activities on watersheds in southwestern British Columbia, the presence of putative antibiotic resistance and integrase genes was analyzed in the microbiome of agricultural, urban influenced, and protected watersheds. A metagenomics approach and high-throughput quantitative PCR (HT qPCR) were used to screen for elements of resistance including ARGs and intI . Metagenomic sequencing of bacterial genomic DNA was used to characterize the resistome of microbial communities present in watersheds over a 1-year period. There was a low prevalence of ARGs relative to the microbial population (<1%). Analysis of the metagenomic sequences detected a total of 60 elements of resistance including 46 ARGs, intI1 , and groEL/ intI1 genes and 12 quaternary ammonium compounds ( qac ) resistance genes across all watershed locations. The relative abundance and richness of ARGs was found to be highest in agriculture impacted watersheds compared to urban and protected watersheds. A downstream transport pattern was observed in the impacted watersheds (urban and agricultural) during dry months. Similar to other reports, this study found a strong association between intI1 and ARGs (e.g., sul1 ), an association which may be used as a proxy for anthropogenic activities. Chemical analysis of water samples for three major groups of antibiotics was below the detection limit. However, the high richness and gene copy numbers (GCNs) of ARGs in impacted sites suggest that the effects of effluents on microbial communities are occurring even at low concentrations of antimicrobials

  12. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  13. Investigating on the fermentation behavior of six lactic acid bacteria strains in barley malt wort reveals limitation in key amino acids and buffer capacity.

    Science.gov (United States)

    Nsogning, Sorelle Dongmo; Fischer, Susann; Becker, Thomas

    2018-08-01

    Understanding lactic acid bacteria (LAB) fermentation behavior in malt wort is a milestone towards flavor improvement of lactic acid fermented malt beverages. Therefore, this study aims to outline deficiencies that may exist in malt wort fermentation. First, based on six LAB strains, cell viability and vitality were evaluated. Second, sugars, organic acids, amino acids, pH value and buffering capacity (BC) were monitored. Finally, the implication of key amino acids, fructose and wort BC on LAB growth was determined. Short growth phase coupled with prompt cell death and a decrease in metabolic activity was observed. Low wort BC caused rapid pH drop with lactic acid accumulation, which conversely increased the BC leading to less pH change at late-stage fermentation. Lactic acid content (≤3.9 g/L) was higher than the reported inhibitory concentration (1.8 g/L). Furthermore, sugars were still available but fructose and key amino acids lysine, arginine and glutamic acid were considerably exhausted (≤98%). Wort supplementations improved cell growth and viability leading to conclude that key amino acid depletion coupled with low BC limits LAB growth in malt wort. Then, a further increase in organic acid reduces LAB viability. This knowledge opens doors for LAB fermentation process optimization in malt wort. Copyright © 2018 Elsevier Ltd. All rights reserved.

  14. Automatic generation of predictive dynamic models reveals nuclear phosphorylation as the key Msn2 control mechanism.

    Science.gov (United States)

    Sunnåker, Mikael; Zamora-Sillero, Elias; Dechant, Reinhard; Ludwig, Christina; Busetto, Alberto Giovanni; Wagner, Andreas; Stelling, Joerg

    2013-05-28

    Predictive dynamical models are critical for the analysis of complex biological systems. However, methods to systematically develop and discriminate among systems biology models are still lacking. We describe a computational method that incorporates all hypothetical mechanisms about the architecture of a biological system into a single model and automatically generates a set of simpler models compatible with observational data. As a proof of principle, we analyzed the dynamic control of the transcription factor Msn2 in Saccharomyces cerevisiae, specifically the short-term mechanisms mediating the cells' recovery after release from starvation stress. Our method determined that 12 of 192 possible models were compatible with available Msn2 localization data. Iterations between model predictions and rationally designed phosphoproteomics and imaging experiments identified a single-circuit topology with a relative probability of 99% among the 192 models. Model analysis revealed that the coupling of dynamic phenomena in Msn2 phosphorylation and transport could lead to efficient stress response signaling by establishing a rate-of-change sensor. Similar principles could apply to mammalian stress response pathways. Systematic construction of dynamic models may yield detailed insight into nonobvious molecular mechanisms.

  15. Key Management Strategies for Safeguards Authentication and Encryption

    International Nuclear Information System (INIS)

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  16. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  17. Iterative key-residues interrogation of a phytase with thermostability increasing substitutions identified in directed evolution.

    Science.gov (United States)

    Shivange, Amol V; Roccatano, Danilo; Schwaneberg, Ulrich

    2016-01-01

    Bacterial phytases have attracted industrial interest as animal feed supplement due to their high activity and sufficient thermostability (required for feed pelleting). We devised an approach named KeySIDE,  an iterative Key-residues interrogation of the wild type with Substitutions Identified in Directed Evolution for improving Yersinia mollaretii phytase (Ymphytase) thermostability by combining key beneficial substitutions and elucidating their individual roles. Directed evolution yielded in a discovery of nine positions in Ymphytase and combined iteratively to identify key positions. The "best" combination (M6: T77K, Q154H, G187S, and K289Q) resulted in significantly improved thermal resistance; the residual activity improved from 35 % (wild type) to 89 % (M6) at 58 °C and 20-min incubation. Melting temperature increased by 3 °C in M6 without a loss of specific activity. Molecular dynamics simulation studies revealed reduced flexibility in the loops located next to helices (B, F, and K) which possess substitutions (Helix-B: T77K, Helix-F: G187S, and Helix-K: K289E/Q). Reduced flexibility in the loops might be caused by strengthened hydrogen bonding network (e.g., G187S and K289E/K289Q) and a salt bridge (T77K). Our results demonstrate a promising approach to design phytases in food research, and we hope that the KeySIDE might become an attractive approach for understanding of structure-function relationships of enzymes.

  18. VICKEY: Mining Conditional Keys on Knowledge Bases

    OpenAIRE

    Symeonidou , Danai; Galárraga , Luis; Pernelle , Nathalie; Saïs , Fatiha; Suchanek , Fabian

    2017-01-01

    International audience; A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47 percentage points.

  19. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...

  20. Destination image and key drivers of perceived destination attractiveness

    Directory of Open Access Journals (Sweden)

    Josip Mikulić

    2008-12-01

    Full Text Available In this exploratory study authors combine several approaches to explore the images of two highly attractive tourist destinations: Hawai’i and Croatia. Two convenience samples were used: the image of Hawai’i was measured among Croatian undergraduate business students, and the image of Croatia was measured among Hawaiian tourism students. Functional and psychological image components were assessed at both a holistic and the attribute level. In addition, an importance-perception analysis was performed to assess the degree to which the destination image at the attribute level coincides with the students’ perception of an optimal destination. Finally, the authors conduct an importance grid analysis to explore the key drivers of the overall perceived destination attractiveness. The results provide a detailed insight into the images of Croatia and Hawaii, and reveal several interesting differences between the two student samples.

  1. Identification of Key Residues for Enzymatic Carboxylate Reduction

    Directory of Open Access Journals (Sweden)

    Holly Stolterfoht

    2018-02-01

    Full Text Available Carboxylate reductases (CARs, E.C. 1.2.1.30 generate aldehydes from their corresponding carboxylic acid with high selectivity. Little is known about the structure of CARs and their catalytically important amino acid residues. The identification of key residues for carboxylate reduction provides a starting point to gain deeper understanding of enzymatic carboxylate reduction. A multiple sequence alignment of CARs with confirmed activity recently identified in our lab and from the literature revealed a fingerprint of conserved amino acids. We studied the function of conserved residues by multiple sequence alignments and mutational replacements of these residues. In this study, single-site alanine variants of Neurospora crassa CAR were investigated to determine the contribution of conserved residues to the function, expressability or stability of the enzyme. The effect of amino acid replacements was investigated by analyzing enzymatic activity of the variants in vivo and in vitro. Supported by molecular modeling, we interpreted that five of these residues are essential for catalytic activity, or substrate and co-substrate binding. We identified amino acid residues having significant impact on CAR activity. Replacement of His 237, Glu 433, Ser 595, Tyr 844, and Lys 848 by Ala abolish CAR activity, indicating their key role in acid reduction. These results may assist in the functional annotation of CAR coding genes in genomic databases. While some other conserved residues decreased activity or had no significant impact, four residues increased the specific activity of NcCAR variants when replaced by alanine. Finally, we showed that NcCAR wild-type and mutants efficiently reduce aliphatic acids.

  2. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2008-01-01

    Full Text Available Abstract Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  3. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Cheng-Ta Li

    2008-09-01

    Full Text Available Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting m keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  4. Social patterns revealed through random matrix theory

    Science.gov (United States)

    Sarkar, Camellia; Jalan, Sarika

    2014-11-01

    Despite the tremendous advancements in the field of network theory, very few studies have taken weights in the interactions into consideration that emerge naturally in all real-world systems. Using random matrix analysis of a weighted social network, we demonstrate the profound impact of weights in interactions on emerging structural properties. The analysis reveals that randomness existing in particular time frame affects the decisions of individuals rendering them more freedom of choice in situations of financial security. While the structural organization of networks remains the same throughout all datasets, random matrix theory provides insight into the interaction pattern of individuals of the society in situations of crisis. It has also been contemplated that individual accountability in terms of weighted interactions remains as a key to success unless segregation of tasks comes into play.

  5. Quantitative proteomic study of Aspergillus Fumigatus secretome revealed deamidation of secretory enzymes.

    Science.gov (United States)

    Adav, Sunil S; Ravindran, Anita; Sze, Siu Kwan

    2015-04-24

    Aspergillus sp. plays an essential role in lignocellulosic biomass recycling and is also exploited as cell factories for the production of industrial enzymes. This study profiled the secretome of Aspergillus fumigatus when grown with cellulose, xylan and starch by high throughput quantitative proteomics using isobaric tags for relative and absolute quantification (iTRAQ). Post translational modifications (PTMs) of proteins play a critical role in protein functions. However, our understanding of the PTMs in secretory proteins is limited. Here, we present the identification of PTMs such as deamidation of secreted proteins of A. fumigatus. This study quantified diverse groups of extracellular secreted enzymes and their functional classification revealed cellulases and glycoside hydrolases (32.9%), amylases (0.9%), hemicellulases (16.2%), lignin degrading enzymes (8.1%), peptidases and proteases (11.7%), chitinases, lipases and phosphatases (7.6%), and proteins with unknown function (22.5%). The comparison of quantitative iTRAQ results revealed that cellulose and xylan stimulates expression of specific cellulases and hemicellulases, and their abundance level as a function of substrate. In-depth data analysis revealed deamidation as a major PTM of key cellulose hydrolyzing enzymes like endoglucanases, cellobiohydrolases and glucosidases. Hemicellulose degrading endo-1,4-beta-xylanase, monosidases, xylosidases, lignin degrading laccase, isoamyl alcohol oxidase and oxidoreductases were also found to be deamidated. The filamentous fungi play an essential role in lignocellulosic biomass recycling and fungal strains belonging to Aspergillus were also exploited as cell factories for the production of organic acids, pharmaceuticals, and industrially important enzymes. In this study, extracellular proteins secreted by thermophilic A. fumigatus when grown with cellulose, xylan and starch were profiled using isobaric tags for relative and absolute quantification (iTRAQ) by

  6. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  7. Augmented Input Reveals Word Deafness in a Man with Frontotemporal Dementia

    Directory of Open Access Journals (Sweden)

    Chris Gibbons

    2012-01-01

    Full Text Available We describe a 57 year old, right handed, English speaking man initially diagnosed with progressive aphasia. Language assessment revealed inconsistent performance in key areas. Expressive language was reduced to a few short, perseverative phrases. Speech was severely apraxic. Primary modes of communication included gesture, pointing, gaze, physical touch and leading. Responses were 100% accurate when he was provided with written words, with random or inaccurate responses for strictly auditory/verbal input. When instructions to subsequent neuropsychological tests were written instead of spoken, performance improved markedly. A comprehensive audiology assessment revealed no hearing impairment. Neuroimaging was unremarkable. Neurobehavioral evaluation utilizing written input led to diagnoses of word deafness and frontotemporal dementia, resulting in very different management. We highlight the need for alternative modes of language input for assessment and treatment of patients with language comprehension symptoms.

  8. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  9. Revealing the Differences Between Free and Complexed Enzyme Mechanisms and Factors Contributing to Cell Wall Recalcitrance

    Energy Technology Data Exchange (ETDEWEB)

    Resch, Michael G.; Donohoe, Byron; Ciesielski, Peter; Nill, Jennifer; McKinney, Kellene; Mittal, Ashutosh; Katahira, Rui; Himmel, Michael; Biddy, Mary; Beckham, Gregg; Decker, Steve

    2014-09-08

    Enzymatic depolymerization of polysaccharides is a key step in the production of fuels and chemicals from lignocellulosic biomass, and discovery of synergistic biomass-degrading enzyme paradigms will enable improved conversion processes. Historically, revealing insights into enzymatic saccharification mechanisms on plant cell walls has been hindered by uncharacterized substrates and low resolution.

  10. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  11. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  12. Derivation of ozone flux-yield relationships for lettuce: A key horticultural crop

    International Nuclear Information System (INIS)

    Goumenaki, Eleni; Fernandez, Ignacio Gonzalez; Papanikolaou, Antigoni; Papadopoulou, Despoina; Askianakis, Christos; Kouvarakis, George; Barnes, Jeremy

    2007-01-01

    Ozone flux-response relationships were derived for lettuce, employing a multiplicative approach to model the manner in which stomatal conductance is influenced by key environmental variables, using a dataset collected during field experimentation in Crete and yield-response relationships derived from parallel open-top chamber experiments. Regional agronomic practices were adopted throughout. Computed versus measured data revealed that the derived model explained 51% (P -2 s -1 . Regressions employing very low or zero flux thresholds resulted in the strongest yield-flux relationships (explaining ∼80% (P < 0.05) of the variation in the dataset). - Establishment of ozone flux-yield relationships for a commercially-important horticultural crop grown widely in the Mediterranean

  13. Diffie-Hellman Key Exchange through Steganographied Images

    Directory of Open Access Journals (Sweden)

    Amine Khaldi

    2018-05-01

    Full Text Available Purpose – In a private key system, the major problem is the exchange of the key between the two parties. Diffie and Hellman have set up a way to share the key. However, this technique is not protected against a man-in-the-middle attack as the settings are not authenticated. The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. So, we will not need a digital signature or creating a secure channel to do our key exchange since only the two concerned parts are aware of this exchange. Findings – We generate a symmetric 128-bit key between two users without use of digital signature or secure channel. However, it works only on bitmap images, heavy images and sensitive to compression.

  14. Membrane Protein Properties Revealed through Data-Rich Electrostatics Calculations.

    Science.gov (United States)

    Marcoline, Frank V; Bethel, Neville; Guerriero, Christopher J; Brodsky, Jeffrey L; Grabe, Michael

    2015-08-04

    The electrostatic properties of membrane proteins often reveal many of their key biophysical characteristics, such as ion channel selectivity and the stability of charged membrane-spanning segments. The Poisson-Boltzmann (PB) equation is the gold standard for calculating protein electrostatics, and the software APBSmem enables the solution of the PB equation in the presence of a membrane. Here, we describe significant advances to APBSmem, including full automation of system setup, per-residue energy decomposition, incorporation of PDB2PQR, calculation of membrane-induced pKa shifts, calculation of non-polar energies, and command-line scripting for large-scale calculations. We highlight these new features with calculations carried out on a number of membrane proteins, including the recently solved structure of the ion channel TRPV1 and a large survey of 1,614 membrane proteins of known structure. This survey provides a comprehensive list of residues with large electrostatic penalties for being embedded in the membrane, potentially revealing interesting functional information. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. A Novel Key Distribution Solution for Combined Public/Secret Key ...

    African Journals Online (AJOL)

    Moreover, an implementation over the new IPv6 Internet protocol is presented such that the system can be ported to both wired and wireless networking environments. Keywords: cryptography, key distribution, security server. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors ...

  16. Nuclear trafficking of the HIV-1 pre-integration complex depends on the ADAM10 intracellular domain

    International Nuclear Information System (INIS)

    Endsley, Mark A.; Somasunderam, Anoma D.; Li, Guangyu; Oezguen, Numan; Thiviyanathan, Varatharasa; Murray, James L.; Rubin, Donald H.; Hodge, Thomas W.

    2014-01-01

    Previously, we showed that ADAM10 is necessary for HIV-1 replication in primary human macrophages and immortalized cell lines. Silencing ADAM10 expression interrupted the HIV-1 life cycle prior to nuclear translocation of viral cDNA. Furthermore, our data indicated that HIV-1 replication depends on the expression of ADAM15 and γ-secretase, which proteolytically processes ADAM10. Silencing ADAM15 or γ-secretase expression inhibits HIV-1 replication between reverse transcription and nuclear entry. Here, we show that ADAM10 expression also supports replication in CD4 + T lymphocytes. The intracellular domain (ICD) of ADAM10 associates with the HIV-1 pre-integration complex (PIC) in the cytoplasm and immunoprecipitates and co-localizes with HIV-1 integrase, a key component of PIC. Taken together, our data support a model whereby ADAM15/γ-secretase processing of ADAM10 releases the ICD, which then incorporates into HIV-1 PIC to facilitate nuclear trafficking. Thus, these studies suggest ADAM10 as a novel therapeutic target for inhibiting HIV-1 prior to nuclear entry. - Highlights: • Nuclear trafficking of the HIV-1 pre-integration complex depends on ADAM10. • ADAM10 associates with HIV-1 integrase in the pre-integration complex. • HIV-1 replication depends on the expression of ADAM15 and γ-secretase. • Silencing ADAM15 or γ-secretase expression inhibits nuclear import of viral cDNA. • ADAM10 is important for HIV-1 replication in human macrophages and CD4 + T lymphocytes

  17. Nuclear trafficking of the HIV-1 pre-integration complex depends on the ADAM10 intracellular domain

    Energy Technology Data Exchange (ETDEWEB)

    Endsley, Mark A., E-mail: maendsle@utmb.edu [Department Internal Medicine, Division of Infectious Diseases, University of Texas Medical Branch, 301 University Blvd, Galveston, TX 77555 (United States); Somasunderam, Anoma D., E-mail: asomasun@utmb.edu [Department Internal Medicine, Division of Infectious Diseases, University of Texas Medical Branch, 301 University Blvd, Galveston, TX 77555 (United States); Li, Guangyu, E-mail: LIG001@mail.etsu.edu [Department of Internal Medicine, Quillen College of Medicine, East Tennessee State University, Johnson City, TN 37614 (United States); Oezguen, Numan, E-mail: numan.oezguen@bcm.edu [Department of Pathology and Immunology, Microbiome Center, Texas Children' s Hospital, Houston, TX 77030 (United States); Thiviyanathan, Varatharasa, E-mail: Varatharasa.Thiviyanathan@uth.tmc.edu [Institute of Molecular Medicine, University of Texas Health Science Center, Houston, TX 77030 (United States); Murray, James L., E-mail: jmurray100@yahoo.com [GeneTAG Technology, Inc., 3155 Northwoods Place, Norcross, GA 30071 (United States); Rubin, Donald H., E-mail: don.h.rubin@vanderbilt.edu [Research Medicine, VA Tennessee Valley Healthcare System, 1310 24th Ave. South, Nashville, TN 37212 (United States); Departments of Medicine, Pathology, Microbiology and Immunology, Vanderbilt University School of Medicine, 1161 21st Ave South, Nashville, TN 37232 (United States); Hodge, Thomas W., E-mail: twhodge3@gmail.com [Pre-clinical and Antiviral Research, Tamir Biotechnology, Inc., 12625 High Bluff Dr., Suite 113, San Diego, CA 92130 (United States); and others

    2014-04-15

    Previously, we showed that ADAM10 is necessary for HIV-1 replication in primary human macrophages and immortalized cell lines. Silencing ADAM10 expression interrupted the HIV-1 life cycle prior to nuclear translocation of viral cDNA. Furthermore, our data indicated that HIV-1 replication depends on the expression of ADAM15 and γ-secretase, which proteolytically processes ADAM10. Silencing ADAM15 or γ-secretase expression inhibits HIV-1 replication between reverse transcription and nuclear entry. Here, we show that ADAM10 expression also supports replication in CD4{sup +} T lymphocytes. The intracellular domain (ICD) of ADAM10 associates with the HIV-1 pre-integration complex (PIC) in the cytoplasm and immunoprecipitates and co-localizes with HIV-1 integrase, a key component of PIC. Taken together, our data support a model whereby ADAM15/γ-secretase processing of ADAM10 releases the ICD, which then incorporates into HIV-1 PIC to facilitate nuclear trafficking. Thus, these studies suggest ADAM10 as a novel therapeutic target for inhibiting HIV-1 prior to nuclear entry. - Highlights: • Nuclear trafficking of the HIV-1 pre-integration complex depends on ADAM10. • ADAM10 associates with HIV-1 integrase in the pre-integration complex. • HIV-1 replication depends on the expression of ADAM15 and γ-secretase. • Silencing ADAM15 or γ-secretase expression inhibits nuclear import of viral cDNA. • ADAM10 is important for HIV-1 replication in human macrophages and CD4{sup +} T lymphocytes.

  18. The Conjugative Relaxase TrwC Promotes Integration of Foreign DNA in the Human Genome.

    Science.gov (United States)

    González-Prieto, Coral; Gabriel, Richard; Dehio, Christoph; Schmidt, Manfred; Llosa, Matxalen

    2017-06-15

    Bacterial conjugation is a mechanism of horizontal DNA transfer. The relaxase TrwC of the conjugative plasmid R388 cleaves one strand of the transferred DNA at the oriT gene, covalently attaches to it, and leads the single-stranded DNA (ssDNA) into the recipient cell. In addition, TrwC catalyzes site-specific integration of the transferred DNA into its target sequence present in the genome of the recipient bacterium. Here, we report the analysis of the efficiency and specificity of the integrase activity of TrwC in human cells, using the type IV secretion system of the human pathogen Bartonella henselae to introduce relaxase-DNA complexes. Compared to Mob relaxase from plasmid pBGR1, we found that TrwC mediated a 10-fold increase in the rate of plasmid DNA transfer to human cells and a 100-fold increase in the rate of chromosomal integration of the transferred DNA. We used linear amplification-mediated PCR and plasmid rescue to characterize the integration pattern in the human genome. DNA sequence analysis revealed mostly reconstituted oriT sequences, indicating that TrwC is active and recircularizes transferred DNA in human cells. One TrwC-mediated site-specific integration event was detected, proving that TrwC is capable of mediating site-specific integration in the human genome, albeit with very low efficiency compared to the rate of random integration. Our results suggest that TrwC may stabilize the plasmid DNA molecules in the nucleus of the human cell, probably by recircularization of the transferred DNA strand. This stabilization would increase the opportunities for integration of the DNA by the host machinery. IMPORTANCE Different biotechnological applications, including gene therapy strategies, require permanent modification of target cells. Long-term expression is achieved either by extrachromosomal persistence or by integration of the introduced DNA. Here, we studied the utility of conjugative relaxase TrwC, a bacterial protein with site

  19. Sonic Hedgehog (SHH) pathway in the adult brain: key signaling for astrocyte reactivation and brain repair

    OpenAIRE

    Bermúdez-Muñoz, Olga M

    2016-01-01

    While neurons play a key role in neurotransmission in the nervous central system (CNS) of animals, glial cells are crucial for neuron support and brain maintenance. Recent studies reveal that glial cells regulate the release and reuptake of neurotransmitters, pyruvate and glutathione metabolism, ion buffering, the organization of blood brain barrier and ensures the production of myelin and cerebrospinal fluid. The activity of glial cells is coordinated by the communication between neurons and...

  20. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  1. Fully device-independent conference key agreement

    Science.gov (United States)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  2. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  3. Evaluating the use of key performance indicators to evidence the patient experience.

    Science.gov (United States)

    McCance, Tanya; Hastings, Jack; Dowler, Hilda

    2015-11-01

    To test eight person-centred key performance indicators and the feasibility of an appropriate measurement framework as an approach to evidencing the patient experience. The value of measuring the quality of patient care is undisputed in the international literature, however, the type of measures that can be used to generate data that is meaningful for practice continues to be debated. This paper offers a different perspective to the 'measurement' of the nursing and midwifery contribution to the patient experience. Fourth generation evaluation was the methodological approach used to evaluate the implementation of the key performance indicators and measurement framework across three participating organisations involving nine practice settings. Data were collected by repeated use of claims, concerns and issues with staff working across nine participating sites (n = 18) and the senior executives from the three partner organisations (n = 12). Data were collected during the facilitated sessions with stakeholders and analysed in conjunction with the data generated from the measurement framework. The data reveal the inherent value placed on the evidence generated from the implementation of the key performance indicators as reflected in the following themes: measuring what matters; evidencing the patient experience; engaging staff; a focus for improving practice; and articulating and demonstrating the positive contribution of nursing and midwifery. The implementation of the key performance indicators and the measurement framework has been effective in generating evidence that demonstrates the patient experience. The nature of the data generated not only privileges the patient voice but also offers feedback to nurses and midwives that can inform the development of person-centred cultures. The use of these indicators will produce evidence of patient experience that can be used by nurse and midwives to celebrate and further inform person-centred practice. © 2015 John

  4. Thermodynamics of complexes formation by ITC in methanol/water = 9/1 (v/v) solution: A case study

    Energy Technology Data Exchange (ETDEWEB)

    Fisicaro, Emilia, E-mail: emilia.fisicaro@unipr.it [University of Parma, Department of Pharmacy, Parco Area delle Scienze, 27/A, 43124 Parma (Italy); Compari, Carlotta; Bacciottini, Franco; Contardi, Laura [University of Parma, Department of Pharmacy, Parco Area delle Scienze, 27/A, 43124 Parma (Italy); Carcelli, Mauro; Rispoli, Gabriele; Rogolino, Dominga [University of Parma, Department of Chemistry, Parco Area delle Scienze, 17/A, 43124 Parma (Italy)

    2014-06-01

    Graphical abstract: Integrase strand transfert inhibitors chelate the metal ions in the active site of HIV integrase. - Highlights: • Development of inhibitors acting against those viral enzymes operating via a cooperative two-metal ion mechanism, such as HIV integrase (IN), requires optimizing the binding affinity to the target. • We have defined an experimental procedure for obtaining reliable thermodynamic data by ITC in methanol/water = 9/1 (v/v) as solvent. • Formation heats in mixed solvent of the complexes formed by a ligand, model of Raltegravir, with Mg(II), Mn(II), Co(II) and Zn(II) are here reported. - Abstract: Most enzymes that participate in the biochemistry of nucleic acids require divalent metal ion cofactors to promote activity. Development of potent inhibitors, acting against those viral enzymes operating via a cooperative two-metal ion mechanism, such as HIV integrase (IN) and RNase H, hepatitis C virus polymerase and influenza endonuclease, requires optimizing the binding affinity to the target, which is dictated by the binding free energy composed of both enthalpic and entropic contributions. They can be obtained by using isothermal titration microcalorimetry. We have defined an experimental procedure for obtaining reliable thermodynamic data in methanol/water = 9/1 0.1 M KCl as solvent, used to overcome solubility problems. In this way we have measured the heats of formation of the complexes formed by N-(4-fluorobenzyl)-5-hydroxy-2-isopropyl-1-methyl-6-oxo-1, 6-dihydroxypyrimidine-4-carboxylate (HL, a model of Raltegravir, the antiretroviral drug produced by Merck and Co.), and a series of divalent metal ions of biological interest (Mg(II), Mn(II), Co(II) and Zn(II)), whose speciation was previously determined by potentiometry.

  5. [Mechanisms of action, pharmacology and interactions of dolutegravir].

    Science.gov (United States)

    Ribera, Esteban; Podzamczer, Daniel

    2015-03-01

    Dolutegravir is a second-generation integrase strand transfer inhibitor (INSTI), whose potential and binding half-life in the integrase are far superior to those of raltegravir and elvitegravir, conferring it with unique characteristics in terms of its genetic barrier to resistance and activity against viruses with one or more mutations in the integrase. The pharmacokinetic properties of dolutegravir allow once-daily dosing (50 mg), with or without food, maintaining concentrations far above those effective against wild-type viruses. If integrase resistance mutations are present, the recommended dosing regimen is 50 mg/12 h. The distribution of dolutegravir in cerebrospinal fluid is good and effective concentrations are also reached in the male and female genital tracts. Dolutegravir is metabolized by UGT1A1 and, to a lesser extent, by CYP3A4, without being an inducer or inhibitor of the usual metabolic systems. It has a very low potential for drug interactions and can be administered in routine doses with most drugs. Dose adjustment is not required, even in patients with renal insufficiency or mild or moderate liver failure. Increasing the dose of dolutegravir (50 mg/12 h) is only recommended when administered with efavirenz, nevirapine, fosamprenavir/r, tipranavir/r, rifampicin, carbamazepine, phenytoin and phenobarbital. Coadministration of dolutegravir with etravirine is not recommended without a protease inhibitor or with Hypericum perforatum. Dolutegravir should be administered 2 h before or 6 h after antacids or products with polyvalent cations. Dolutegravir can reduce renal tubule secretion of substances excreted via OCT2, with a slight initial increase in creatinine, with no risk of renal toxicity. The drug can also increase metformin concentrations and consequently monitoring is recommended in case dose adjustment is required. In summary, dolutegravir has excellent pharmacokinetic and drug interaction profiles. Copyright © 2015 Elsevier España, S

  6. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  7. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  8. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  9. Privacy for Key-Trees with Adaptive Adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2011-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen

  10. Anonymity for key-trees with adaptive adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2012-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen

  11. Secure image retrieval with multiple keys

    Science.gov (United States)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  12. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  13. An SSH key management system: easing the pain of managing key/user/account associations

    Science.gov (United States)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  14. An SSH key management system: easing the pain of managing key/user/account associations

    International Nuclear Information System (INIS)

    Arkhipkin, D; Shiryaev, A; Betts, W; Lauret, J

    2008-01-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins

  15. New and investigational antiretroviral drugs for HIV infection: mechanisms of action and early research findings.

    Science.gov (United States)

    Saag, Michael S

    2012-12-01

    Numerous investigational antiretroviral agents are in clinical development. Among them are festinavir (BMS986001), a thymidine analogue similar to stavudine with reduced potential for toxicity; GS-7340, a prodrug of tenofovir that achieves greater intracellular concentrations; MK-1439, a nonnucleoside analogue reverse transcriptase inhibitor (NNRTI) that retains activity against common NNRTI-associated resistance mutations; and albuvirtide, a long-acting parenteral fusion inhibitor. Investigational integrase strand transfer inhibitors (InSTIs) include elvitegravir, recently approved by the US Food and Drug Administration (FDA) as part of a once-daily, single-tablet formulation with cobicistat/tenofovir/emtricitabine; dolutegravir, which maintains some activity against raltegravir- and elvitegravir-resistant mutants; and S/GSK1265744, which also maintains some activity against resistance mutations in the integrase gene and is being developed as a long-lasting parenteral agent. Novel 2-(quinolin-3-yl)acetic acid derivatives (LEDGINs), agents that were originally thought to inhibit the interaction of integrase with its cofactor lens epithelium-derived growth factor p75 (LEDGF/p75), be active against InSTI-resistant mutants and to have additive activity when combined with InSTIs. This article summarizes a presentation by Michael S. Saag, MD, at the IAS-USA live Improving the Management of HCV Disease continuing medical education program held in New York in October 2012.

  16. Nickel exposure from keys: alternatives for protection and prevention.

    Science.gov (United States)

    Hamann, Dathan; Scheman, Andrew J; Jacob, Sharon E

    2013-01-01

    Keys are an important exposure source of metal allergens to consumers and confer a significant problem for nickel-allergic individuals because of repeated daily use. The aims of this study were to investigate the frequency of nickel and cobalt release in keys and to consider the effectiveness of coatings for preventing metallic allergen release from common metal allergen-releasing keys. Keys from a variety of common stores were nickel and cobalt spot tested. Nickel-releasing keys were coated with enamel sprays, subjected to a use test, and retested to assess for metal allergen release. Of 55 tested keys, 80% showed a strong positive result to the nickel spot test. None of the tested keys exhibited cobalt release. No keys initially released nickel after enamel coatings. Key coatings chipped at the portion inserted into a lock after 30 insertions, and keys were found to release nickel. The handle of the key was not found to release nickel after 60 insertions. Nickel release from keys is very common; nickel-allergic consumers should consider purchasing keys that do not release nickel (eg, brass, anodized). Enamel coating may be useful in protecting nickel-sensitive individuals from their keys but cannot consistently prevent nickel-release from portions used frequently.

  17. Comparative transcriptome analysis reveals key genes potentially related to soluble sugar and organic acid accumulation in watermelon

    Science.gov (United States)

    Gao, Lei; Zhao, Shengjie; Lu, Xuqiang; He, Nan; Zhu, Hongju; Dou, Junling

    2018-01-01

    Soluble sugars and organic acids are important components of fruit flavor and have a strong impact on the overall organoleptic quality of watermelon (Citrullus lanatus) fruit. Several studies have analyzed the expression levels of the genes related to soluble sugar accumulation and the dynamic changes in their content during watermelon fruit development and ripening. Nevertheless, to date, there have been no reports on the organic acid content in watermelon or the genes regulating their synthesis. In this study, the soluble sugars and organic acids in watermelon were measured and a comparative transcriptome analysis was performed to identify the key genes involved in the accumulation of these substances during fruit development and ripening. The watermelon cultivar ‘203Z’ and its near-isogenic line (NIL) ‘SW’ (in the ‘203Z’ background) were used as experimental materials. The results suggested that soluble sugar consist of fructose, glucose and sucrose while malic-, citric-, and oxalic acids are the primary organic acids in watermelon fruit. Several differentially expressed genes (DEGs) related to soluble sugar- and organic acid accumulation and metabolism were identified. These include the DEGs encoding raffinose synthase, sucrose synthase (SuSy), sucrose-phosphate synthase (SPSs), insoluble acid invertases (IAI), NAD-dependent malate dehydrogenase (NAD-cyt MDH), aluminum-activated malate transporter (ALMT), and citrate synthase (CS). This is the first report addressing comparative transcriptome analysis via NILs materials in watermelon fruit. These findings provide an important basis for understanding the molecular mechanism that leads to soluble sugar and organic acid accumulation and metabolism during watermelon fruit development and ripening. PMID:29324867

  18. Comparative transcriptome analysis reveals key genes potentially related to soluble sugar and organic acid accumulation in watermelon.

    Directory of Open Access Journals (Sweden)

    Lei Gao

    Full Text Available Soluble sugars and organic acids are important components of fruit flavor and have a strong impact on the overall organoleptic quality of watermelon (Citrullus lanatus fruit. Several studies have analyzed the expression levels of the genes related to soluble sugar accumulation and the dynamic changes in their content during watermelon fruit development and ripening. Nevertheless, to date, there have been no reports on the organic acid content in watermelon or the genes regulating their synthesis. In this study, the soluble sugars and organic acids in watermelon were measured and a comparative transcriptome analysis was performed to identify the key genes involved in the accumulation of these substances during fruit development and ripening. The watermelon cultivar '203Z' and its near-isogenic line (NIL 'SW' (in the '203Z' background were used as experimental materials. The results suggested that soluble sugar consist of fructose, glucose and sucrose while malic-, citric-, and oxalic acids are the primary organic acids in watermelon fruit. Several differentially expressed genes (DEGs related to soluble sugar- and organic acid accumulation and metabolism were identified. These include the DEGs encoding raffinose synthase, sucrose synthase (SuSy, sucrose-phosphate synthase (SPSs, insoluble acid invertases (IAI, NAD-dependent malate dehydrogenase (NAD-cyt MDH, aluminum-activated malate transporter (ALMT, and citrate synthase (CS. This is the first report addressing comparative transcriptome analysis via NILs materials in watermelon fruit. These findings provide an important basis for understanding the molecular mechanism that leads to soluble sugar and organic acid accumulation and metabolism during watermelon fruit development and ripening.

  19. Comparative transcriptome analysis reveals key genes potentially related to soluble sugar and organic acid accumulation in watermelon.

    Science.gov (United States)

    Gao, Lei; Zhao, Shengjie; Lu, Xuqiang; He, Nan; Zhu, Hongju; Dou, Junling; Liu, Wenge

    2018-01-01

    Soluble sugars and organic acids are important components of fruit flavor and have a strong impact on the overall organoleptic quality of watermelon (Citrullus lanatus) fruit. Several studies have analyzed the expression levels of the genes related to soluble sugar accumulation and the dynamic changes in their content during watermelon fruit development and ripening. Nevertheless, to date, there have been no reports on the organic acid content in watermelon or the genes regulating their synthesis. In this study, the soluble sugars and organic acids in watermelon were measured and a comparative transcriptome analysis was performed to identify the key genes involved in the accumulation of these substances during fruit development and ripening. The watermelon cultivar '203Z' and its near-isogenic line (NIL) 'SW' (in the '203Z' background) were used as experimental materials. The results suggested that soluble sugar consist of fructose, glucose and sucrose while malic-, citric-, and oxalic acids are the primary organic acids in watermelon fruit. Several differentially expressed genes (DEGs) related to soluble sugar- and organic acid accumulation and metabolism were identified. These include the DEGs encoding raffinose synthase, sucrose synthase (SuSy), sucrose-phosphate synthase (SPSs), insoluble acid invertases (IAI), NAD-dependent malate dehydrogenase (NAD-cyt MDH), aluminum-activated malate transporter (ALMT), and citrate synthase (CS). This is the first report addressing comparative transcriptome analysis via NILs materials in watermelon fruit. These findings provide an important basis for understanding the molecular mechanism that leads to soluble sugar and organic acid accumulation and metabolism during watermelon fruit development and ripening.

  20. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  1. Formal Analysis of Key Integrity in PKCS#11

    Science.gov (United States)

    Falcone, Andrea; Focardi, Riccardo

    PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and usb crypto-tokens. Though widely adopted, this API has been shown to be prone to attacks in which a malicious user gains access to the sensitive keys stored in the devices. In 2008, Delaune, Kremer and Steel proposed a model to formally reason on this kind of attacks. We extend this model to also describe flaws that are based on integrity violations of the stored keys. In particular, we consider scenarios in which a malicious overwriting of keys might fool honest users into using attacker's own keys, while performing sensitive operations. We further enrich the model with a trusted key mechanism ensuring that only controlled, non-tampered keys are used in cryptographic operations, and we show how this modified API prevents the above mentioned key-replacement attacks.

  2. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  3. The social context of motorcycle riding and the key determinants influencing rider behavior: a qualitative investigation.

    Science.gov (United States)

    Tunnicliff, Deborah; Watson, Barry; White, Katherine M; Lewis, Ioni; Wishart, Darren

    2011-08-01

    Given the increasing popularity of motorcycle riding and heightened risk of injury or death associated with being a rider, this study explored rider behavior as a determinant of rider safety and, in particular, key beliefs and motivations that influence such behavior. To enhance the effectiveness of future education and training interventions, it is important to understand riders' own views about what influences how they ride. Specifically, this study sought to identify key determinants of riders' behaviors in relation to the social context of riding, including social and identity-related influences relating to the group (group norms and group identity) as well as the self (moral/personal norm and self-identity). Qualitative research was undertaken via group discussions with motorcycle riders (n = 41). The findings revealed that those in the group with which one rides represent an important source of social influence. Also, the motorcyclist (group) identity was associated with a range of beliefs, expectations, and behaviors considered to be normative. Exploration of the construct of personal norm revealed that riders were most cognizant of the "wrong things to do" when riding; among those issues raised was the importance of protective clothing (albeit for the protection of others and, in particular, pillion passengers). Finally, self-identity as a motorcyclist appeared to be important to a rider's self-concept and was likely to influence on-road behavior. Overall, the insight provided by the current study may facilitate the development of interventions including rider training as well as public education and mass media messages. The findings suggest that these interventions should incorporate factors associated with the social nature of riding in order to best align it with some of the key beliefs and motivations underpinning riders' on-road behaviors.

  4. Nickel exposure from keys: a Brazilian issue.

    Science.gov (United States)

    Suzuki, Nathalie Mie; Duarte, Ida Alzira Gomes; Hafner, Mariana de Figueiredo Silva; Lazzarini, Rosana

    2017-01-01

    Keys are a significant source of exposure to metal allergens and can be a relevant problem for nickel-allergic individuals. This study aimed to perform nickel and cobalt spot testing among the 5 most common Brazilian brands of keys. Among the tested keys, 100% showed positive result to nickel spot test, 83,3% presented strong positive reaction. 50% exhibited cobalt release as well. Nickel release from keys is very common in our country and may cause a negative impact on sensitized individual's quality of life. Study's results highlight the importance of establishing directives to regulate nickel release in Brazil.

  5. Enhanced diffie-hellman algorithm for reliable key exchange

    Science.gov (United States)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  6. Optimizing Key Updates in Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Sensor networks offer the advantages of simple and low–resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which...

  7. Subcarrier multiplexing optical quantum key distribution

    International Nuclear Information System (INIS)

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  8. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  9. Fate of key odorants in Sauternes wines through aging.

    Science.gov (United States)

    Bailly, Sabine; Jerkovic, Vesna; Meurée, Ariane; Timmermans, Aurore; Collin, Sonia

    2009-09-23

    Recent work has revealed the importance of polyfunctional thiols in young Sauternes wines, but very little is yet known about the fate of such compounds during aging in the bottle. In this study, two Sauternes wines were investigated by gas chromatography-olfactometry (GC-O) aroma extract dilution analysis (AEDA), gas chromatography-mass spectrometry (GC-MS), and gas chromatography-pulsed flame photometric detector (GC-PFPD) after XAD 2 and thiol-specific extractions. Most polyfunctional thiols (3-sulfanylpropyl acetate, 2-sulfanylethyl acetate, 3-methyl-3-sulfanylbutanal, etc.) proved to be completely degraded after 2 years of bottle aging in a cellar. Only 3-sulfanylhexan-1-ol was still found in aged samples at concentrations above its threshold value. Most other key odorants found in the young noble rot wine were still detected 5-6 years after harvest: varietal aroma (alpha-terpineol), sotolon, fermentation alcohols (3-methylbutan-1-ol and 2-phenylethanol) and esters (ethyl butyrate, isobutyrate, hexanoate, and isovalerate), and oak maturation-related compounds (guaiacol, vanillin, eugenol, beta-damascenone, trans-non-2-enal, beta-methyl-gamma-octalactone, gamma-nonalactone, and furaneol), as well as three newly identified aromas exhibiting interesting cake, honey-like, and dried apricot odors: homofuraneol, theaspirane, and gamma-decalactone. Interestingly, abhexon, never mentioned in sweet wines before, was found to be synthesized during bottle aging. An optimized extraction method allowed us to quantify this honey/spicy compound at levels close to its threshold value (up to 7 microg/L after 5-6 years), thus suggesting a key role of this strong odorant in old Sauternes wines.

  10. The LOFAR Transients Key Science Project

    NARCIS (Netherlands)

    Stappers, B.; Fender, R.; Wijers, R.

    2009-01-01

    The Transients Key Science Project (TKP) is one of six Key Science Projects of the next generation radio telescope LOFAR. Its aim is the study of transient and variable low-frequency radio sources with an extremely broad science case ranging from relativistic jet sources to pulsars, exoplanets,

  11. Coherent one-way quantum key distribution

    Science.gov (United States)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  12. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  13. Multicomponent reactions provide key molecules for secret communication.

    Science.gov (United States)

    Boukis, Andreas C; Reiter, Kevin; Frölich, Maximiliane; Hofheinz, Dennis; Meier, Michael A R

    2018-04-12

    A convenient and inherently more secure communication channel for encoding messages via specifically designed molecular keys is introduced by combining advanced encryption standard cryptography with molecular steganography. The necessary molecular keys require large structural diversity, thus suggesting the application of multicomponent reactions. Herein, the Ugi four-component reaction of perfluorinated acids is utilized to establish an exemplary database consisting of 130 commercially available components. Considering all permutations, this combinatorial approach can unambiguously provide 500,000 molecular keys in only one synthetic procedure per key. The molecular keys are transferred nondigitally and concealed by either adsorption onto paper, coffee, tea or sugar as well as by dissolution in a perfume or in blood. Re-isolation and purification from these disguises is simplified by the perfluorinated sidechains of the molecular keys. High resolution tandem mass spectrometry can unequivocally determine the molecular structure and thus the identity of the key for a subsequent decryption of an encoded message.

  14. Partitioned key-value store with atomic memory operations

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2017-02-07

    A partitioned key-value store is provided that supports atomic memory operations. A server performs a memory operation in a partitioned key-value store by receiving a request from an application for at least one atomic memory operation, the atomic memory operation comprising a memory address identifier; and, in response to the atomic memory operation, performing one or more of (i) reading a client-side memory location identified by the memory address identifier and storing one or more key-value pairs from the client-side memory location in a local key-value store of the server; and (ii) obtaining one or more key-value pairs from the local key-value store of the server and writing the obtained one or more key-value pairs into the client-side memory location identified by the memory address identifier. The server can perform functions obtained from a client-side memory location and return a result to the client using one or more of the atomic memory operations.

  15. Secret key distillation from shielded two-qubit states

    International Nuclear Information System (INIS)

    Bae, Joonwoo

    2010-01-01

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  16. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  17. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  18. Complex of Key Instruments of Management of Operation Activity of a Small Business Trade Enterprise

    Directory of Open Access Journals (Sweden)

    Serdyuk Vira M.

    2013-11-01

    Full Text Available The article offers a complex of key instruments of management of operation activity of a small business trade enterprise, including: 1 budgeting of operation activity; 2 its accounting by norms and deviations from them; 3 monitoring of operational activity of an enterprise, which envisages analysis of revealed deviations. The article shows the most efficient way of realisation and practical use of the presented concept – application of the “standard-cost” scheme within the framework of which the following tasks are solved: 1 budgeting of income from operational activity; 2 establishment of standards of costs; 3 accumulation of data on factual income and expenditures; 4 analysis of deviations and reporting; and 5 introduction of necessary amendments. The article also offers an imitation model of analysis of dynamics of trade processes, which allows detection of key spheres of management of operation activity of a small trade enterprise and principles of carrying out an efficient and well thought over financial policy.

  19. Postsecondary Students With Psychiatric Disabilities Identify Core Services and Key Ingredients to Supporting Education Goals.

    Science.gov (United States)

    Biebel, Kathleen; Mizrahi, Raphael; Ringeisen, Heather

    2017-10-26

    Accessing and successfully completing postsecondary educational opportunities may be challenging for those living with psychiatric disabilities. This exploratory study highlights the experiences of individuals with psychiatric disabilities participating in postsecondary educational support initiatives. Investigators conducted case studies with 3 education support initiatives across the United States. Focus groups revealed what concrete supported education services were helpful and key ingredients in delivering education supports. Access to specialists, mindfulness techniques, help with time management and procrastination, and facilitating classroom accommodations were identified as critical. Developing authentic relationships with supported education staff, flexibility in service delivery and access to student peers living with psychiatric disabilities were noted as key ingredients in service delivery. Incorporating the voice of students with psychiatric disabilities into supported education services can increase access, involvement, and retention, therein providing more supports to students with psychiatric disabilities achieving their postsecondary education goals. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  20. Key Working for Families with Young Disabled Children

    Directory of Open Access Journals (Sweden)

    Bernie Carter

    2011-01-01

    Full Text Available For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop. Data were collected from 43 participants (parents, key workers, and other stakeholders. All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals

  1. Secondary structure of the rRNA ITS2 region reveals key evolutionary patterns in acroporid corals.

    Science.gov (United States)

    Coleman, Annette W; van Oppen, Madeleine J H

    2008-10-01

    This study investigates the ribosomal RNA transcript secondary structure in corals as confirmed by compensatory base changes in Isopora/Acropora species. These species are unique versus all other corals in the absence of a eukaryote-wide conserved structural component, the helix III in internal transcriber spacer (ITS) 2, and their variability in the 5.8S-LSU helix basal to ITS2, a helix with pairings identical among all other scleractinian corals. Furthermore, Isopora/Acropora individuals display at least two, and as many as three, ITS sequence isotypes in their genome which appear to be capable of function. From consideration of the conserved elements in ITS2 and flanking regions, it appears that there are three major groups within the IsoporaAcropora lineage: the Isopora + Acropora "longi" group, the large group including Caribbean Acropora + the Acropora "carib" types plus the bulk of the Indo-Pacific Acropora species, and the remaining enigmatic "pseudo" group found in the Pacific. Interbreeding is possible among Caribbean A. palmata and A. cervicornis and among some species of Indo-Pacific Acropora. Recombinant ITS sequences are obvious among these latter, such that morphology (as represented by species name) does not correlate with common ITS sequence. The combination of characters revealed by RNA secondary structure analyses suggests a recent past/current history of interbreeding among the Indo-Pacific Acropora species and a shared ancestry of some of these with the Caribbean Acropora. The unusual absence of helix III of ITS2 of Isopora/Acropora species may have some causative role in the equally unusual instability in the 5.8S-LSU helix basal to ITS2 of this species complex.

  2. Dynamic Proteomic Characteristics and Network Integration Revealing Key Proteins for Two Kernel Tissue Developments in Popcorn.

    Directory of Open Access Journals (Sweden)

    Yongbin Dong

    Full Text Available The formation and development of maize kernel is a complex dynamic physiological and biochemical process that involves the temporal and spatial expression of many proteins and the regulation of metabolic pathways. In this study, the protein profiles of the endosperm and pericarp at three important developmental stages were analyzed by isobaric tags for relative and absolute quantification (iTRAQ labeling coupled with LC-MS/MS in popcorn inbred N04. Comparative quantitative proteomic analyses among developmental stages and between tissues were performed, and the protein networks were integrated. A total of 6,876 proteins were identified, of which 1,396 were nonredundant. Specific proteins and different expression patterns were observed across developmental stages and tissues. The functional annotation of the identified proteins revealed the importance of metabolic and cellular processes, and binding and catalytic activities for the development of the tissues. The whole, endosperm-specific and pericarp-specific protein networks integrated 125, 9 and 77 proteins, respectively, which were involved in 54 KEGG pathways and reflected their complex metabolic interactions. Confirmation for the iTRAQ endosperm proteins by two-dimensional gel electrophoresis showed that 44.44% proteins were commonly found. However, the concordance between mRNA level and the protein abundance varied across different proteins, stages, tissues and inbred lines, according to the gene cloning and expression analyses of four relevant proteins with important functions and different expression levels. But the result by western blot showed their same expression tendency for the four proteins as by iTRAQ. These results could provide new insights into the developmental mechanisms of endosperm and pericarp, and grain formation in maize.

  3. Hydra meiosis reveals unexpected conservation of structural synaptonemal complex proteins across metazoans.

    Science.gov (United States)

    Fraune, Johanna; Alsheimer, Manfred; Volff, Jean-Nicolas; Busch, Karoline; Fraune, Sebastian; Bosch, Thomas C G; Benavente, Ricardo

    2012-10-09

    The synaptonemal complex (SC) is a key structure of meiosis, mediating the stable pairing (synapsis) of homologous chromosomes during prophase I. Its remarkable tripartite structure is evolutionarily well conserved and can be found in almost all sexually reproducing organisms. However, comparison of the different SC protein components in the common meiosis model organisms Saccharomyces cerevisiae, Arabidopsis thaliana, Caenorhabditis elegans, Drosophila melanogaster, and Mus musculus revealed no sequence homology. This discrepancy challenged the hypothesis that the SC arose only once in evolution. To pursue this matter we focused on the evolution of SYCP1 and SYCP3, the two major structural SC proteins of mammals. Remarkably, our comparative bioinformatic and expression studies revealed that SYCP1 and SYCP3 are also components of the SC in the basal metazoan Hydra. In contrast to previous assumptions, we therefore conclude that SYCP1 and SYCP3 form monophyletic groups of orthologous proteins across metazoans.

  4. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  5. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  6. Checklist and key identification of Chironomidae Larvae (Insecta: Diptera in Marbor River (Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Azam Karami

    2014-12-01

    Full Text Available Chironomidae (Diptera which are distributed worldwide, are the most abundant and diverse insects in many freshwater ecosystems, as well as inland waters of Iran. However, very few researches were done for identification of this group in Iran, and there is a poor knowledge of their faunal diversity distribution in this country. To investigate chironomid larvae in Marbor river, Isfahan Province, seasonal samplings were done (2003-2004 in five selected sites along the river course, using Dredge sampler 3 times for every site. After collecting, the samples were preserved in formaldehyde at the site. Samples were sorted out in laboratory and the Chironomidae larvae were identified down to the generic level using the identification keys, and light and phase-contrast microscopes. Results revealed 39 genera from four subfamilies in Marbor River: Chironominae (15 genera, Diamesinae (2 genera, Orthocladiinae (17 genera and Tanypodinae (5 genera. From these, 13 genera were reported for the first time in Iran. An identification key for the taxon in Marbor river was provided.

  7. Changes in coral reef communities among the Florida Keys, 1996-2003

    Science.gov (United States)

    Somerfield, P. J.; Jaap, W. C.; Clarke, K. R.; Callahan, M.; Hackett, K.; Porter, J.; Lybolt, M.; Tsokos, C.; Yanev, G.

    2008-12-01

    Hard coral (Scleractinia and Milleporina) cover data were examined from 37 sites surveyed annually from 1996 to 2003 in the Florida reef tract, USA. Analyses of species numbers and total cover showed that site-to-site differences were generally very much greater than differences among times within sites. There were no significant differences among different geographical areas within the reef tract (Upper, Middle and Lower Keys). Large-scale changes documented included a reduction in species numbers and total cover on both deep and shallow offshore reefs between 1997 and 1999 followed by no recovery in cover, and only scant evidence of any recovery in species numbers by 2003. These changes coincided with bleaching events in 1997 and 1998, and the passage of Hurricane Georges through the Lower Keys in 1998. The lack of recovery among offshore reefs suggests that they were no longer resilient. Multivariate analyses revealed that some sites showed relatively little temporal variation in community composition, essentially random in direction, while others showed relatively large year-on-year changes. There was little evidence of any major region-wide changes affecting assemblage composition, or of any events that had impacted all of the sampling sites in any single year. Instead, different sites exhibited differing patterns of temporal variation, with certain sites displaying greater variation than others. Changes in community composition at some sites are interpreted in the light of knowledge of events at those sites and the relative sensitivities of species to various stressors, such as changes in cover of Acropora palmata and Millepora complanata at Sand Key following the bleaching events and hurricane in 1998, and declines in Montastraea annularis at Smith Shoal following a harmful algal bloom in 2002. For most sites, however, it is impossible to determine the causes of observed variation.

  8. Towards understanding the known-key security of block ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart

    2014-01-01

    ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indifferentiability to capture the security of such block ciphers under a known key. To show its...... meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indifferentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher...... with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indifferentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks....

  9. Establishing Key Performance Indicators : Case company X

    OpenAIRE

    Singh, Jatinder

    2015-01-01

    The key performance indicators serve as the navigational tools for a business organization to monitor its performance. They enable the management team to take real time decisions to keep organization’s resources aligned to its business strategy to accomplish its strategic objec-tives. This research was conducted to analyse the process of establishing successful key per-formance indicators for a business organization. The research was conducted to recommend key performance indicators developme...

  10. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  11. Amplifying genetic logic gates.

    Science.gov (United States)

    Bonnet, Jerome; Yin, Peter; Ortiz, Monica E; Subsoontorn, Pakpoom; Endy, Drew

    2013-05-03

    Organisms must process information encoded via developmental and environmental signals to survive and reproduce. Researchers have also engineered synthetic genetic logic to realize simpler, independent control of biological processes. We developed a three-terminal device architecture, termed the transcriptor, that uses bacteriophage serine integrases to control the flow of RNA polymerase along DNA. Integrase-mediated inversion or deletion of DNA encoding transcription terminators or a promoter modulates transcription rates. We realized permanent amplifying AND, NAND, OR, XOR, NOR, and XNOR gates actuated across common control signal ranges and sequential logic supporting autonomous cell-cell communication of DNA encoding distinct logic-gate states. The single-layer digital logic architecture developed here enables engineering of amplifying logic gates to control transcription rates within and across diverse organisms.

  12. Electronic Nicotine Delivery Systems Key Facts Infographic

    Data.gov (United States)

    U.S. Department of Health & Human Services — Explore the Electronic Nicotine Delivery Systems Key Facts Infographic which outlines key facts related to electronic nicotine delivery systems (ENDS), including...

  13. 75 FR 20364 - Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property

    Science.gov (United States)

    2010-04-19

    ... GENERAL SERVICES ADMINISTRATION [Wildlife Order 187; 4-D-FL-1218] Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property Pursuant to section 2 of Public Law 537, 80th Congress, approved May 19, 1948 (16 U.S.C. 667c), notice is hereby given that: 1. The General...

  14. Communicating with individuals receiving home mechanical ventilation: the experiences of key communication partners.

    Science.gov (United States)

    Laakso, Katja; Markström, Agneta; Havstam, Christina; Idvall, Markus; Hartelius, Lena

    2014-01-01

    The aim of the study was to explore the communication experiences of key communications partners (CPs) of individuals receiving home mechanical ventilation (HMV), with particular emphasis on the possibilities, difficulties and limitations CPs experienced in communication, possible support given to facilitate communication and exploring what made a skilled communicator. A qualitative research design using interviews was used. The participants included 19 key CPs of individuals receiving HMV. The analysis resulted in five themes: Encountering communication limitations, Functional communication strategies, Being a communication facilitator, Role insecurity and Emotional reactions and coping. The findings revealed that CPs needed to develop partly new reference frames for communication. In particular, participants emphasised the need to understand and interpret subtle details in the communicative interaction. The findings are discussed in the light of previous research, in particular an earlier study exploring another perspective; the ventilator-supported individuals' experiences of communication. Issues relating to the educational needs of CPs of individuals receiving HMV are discussed. The results are intended to enhance understanding of the challenges that individuals receiving HMV and their CPs face with communication, which should be of relevance not only to speech therapists, but for all healthcare practitioners in the field of HMV.

  15. An enhanced chaotic key-based RC5 block cipher adapted to image encryption

    Science.gov (United States)

    Faragallah, Osama S.

    2012-07-01

    RC5 is a block cipher that has several salient features such as adaptability to process different word lengths with a variable block size, a variable number of rounds and a variable-length secret key. However, RC5 can be broken with various attacks such as correlation attack, timing attack, known plaintext correlation attack and differential attacks, revealing weak security. We aimed to enhance the RC5 block cipher to be more secure and efficient for real-time applications while preserving its advantages. For this purpose, this article introduces a new approach based on strengthening both the confusion and diffusion operations by combining chaos and cryptographic primitive operations to produce round keys with better pseudo-random sequences. Comparative security analysis and performance evaluation of the enhanced RC5 block cipher (ERC5) with RC5, RC6 and chaotic block cipher algorithm (CBCA) are addressed. Several test images are used for inspecting the validity of the encryption and decryption algorithms. The experimental results show the superiority of the suggested enhanced RC5 (ERC5) block cipher to image encryption algorithms such as RC5, RC6 and CBCA from the security analysis and performance evaluation points of view.

  16. Key Facts about Tularemia

    Science.gov (United States)

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  17. The Key Lake project

    International Nuclear Information System (INIS)

    Glattes, G.

    1985-01-01

    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de

  18. Unraveling Key Metabolomic Alterations in Wheat Embryos Derived from Freshly Harvested and Water-Imbibed Seeds of Two Wheat Cultivars with Contrasting Dormancy Status

    Directory of Open Access Journals (Sweden)

    Aayudh Das

    2017-07-01

    Full Text Available Untimely rains in wheat fields during harvest season can cause pre-harvest sprouting (PHS, which deteriorates the yield and quality of wheat crop. Metabolic homeostasis of the embryo plays a role in seed dormancy, determining the status of the maturing grains either as dormant (PHS-tolerant or non-dormant (PHS-susceptible. Very little is known for direct measurements of global metabolites in embryonic tissues of dormant and non-dormant wheat seeds. In this study, physiologically matured and freshly harvested wheat seeds of PHS-tolerant (cv. Sukang, dormant and PHS-susceptible (cv. Baegjoong, non-dormant cultivars were water-imbibed, and the isolated embryos were subjected to high-throughput, global non-targeted metabolomic profiling. A careful comparison of identified metabolites between Sukang and Baegjoong embryos at 0 and 48 h after imbibition revealed that several key metabolic pathways [such as: lipids, fatty acids, oxalate, hormones, the raffinose family of oligosaccharides (RFOs, and amino acids] and phytochemicals were differentially regulated between dormant and non-dormant varieties. Most of the membrane lipids were highly reduced in Baegjoong compared to Sukang, which indicates that the cell membrane instability in response to imbibition could also be a key factor in non-dormant wheat varieties for their untimely germination. This study revealed that several key marker metabolites (e.g., RFOs: glucose, fructose, maltose, and verbascose, were highly expressed in Baegjoong after imbibition. Furthermore, the data showed that the key secondary metabolites and phytochemicals (vitexin, chrysoeriol, ferulate, salidroside and gentisic acid, with known antioxidant properties, were comparatively low at basal levels in PHS-susceptible, non-dormant cultivar, Baegjoong. In conclusion, the results of this investigation revealed that after imbibition the metabolic homeostasis of dormant wheat is significantly less affected compared to non

  19. Synchronization in Quantum Key Distribution Systems

    Directory of Open Access Journals (Sweden)

    Anton Pljonkin

    2017-10-01

    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  20. Economic contribution of recreating visitors to the Florida Keys/Key West

    Science.gov (United States)

    Donald B.K. English; Warren Kriesel; Vernon R Leeworthy; Peter C. Wiley

    1996-01-01

    This report provides estimates of the economic impact that visitors to the Florida Keys have on both the Monroe County and larger South Florida regional economies. Estimates are made for output/sales, income, and employment and include both direct and secondary economic impacts. This report provides the basis for demonstrating the income-producing asset value of the...

  1. Turn key contracts

    International Nuclear Information System (INIS)

    Feretic, D.

    1975-01-01

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  2. Entangled quantum key distribution with a biased basis choice

    International Nuclear Information System (INIS)

    Erven, Chris; Ma Xiongfeng; Laflamme, Raymond; Weihs, Gregor

    2009-01-01

    We investigate a quantum key distribution (QKD) scheme that utilizes a biased basis choice in order to increase the efficiency of the scheme. The optimal bias between the two measurement bases, a more refined error analysis and finite key size effects are all studied in order to assure the security of the final key generated with the system. We then implement the scheme in a local entangled QKD system that uses polarization entangled photon pairs to securely distribute the key. A 50/50 non-polarizing beamsplitter (BS) with different optical attenuators is used to simulate a variable BS in order to allow us to study the operation of the system for different biases. Over 6 h of continuous operation with a total bias of 0.9837/0.0163 (Z/X), we were able to generate 0.4567 secure key bits per raw key bit as compared to 0.2550 secure key bits per raw key bit for the unbiased case. This represents an increase in the efficiency of the key generation rate by 79%.

  3. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  4. Revealing source signatures in ambient BTEX concentrations

    International Nuclear Information System (INIS)

    Zalel, Amir; Yuval; Broday, David M.

    2008-01-01

    Management of ambient concentrations of Volatile Organic Compounds (VOCs) is essential for maintaining low ozone levels in urban areas where its formation is under a VOC-limited regime. The significant decrease in traffic-induced VOC emissions in many developed countries resulted in relatively comparable shares of traffic and non-traffic VOC emissions in urban airsheds. A key step for urban air quality management is allocating ambient VOC concentrations to their pertinent sources. This study presents an approach that can aid in identifying sources that contribute to observed BTEX concentrations in areas characterized by low BTEX concentrations, where traditional source apportionment techniques are not useful. Analysis of seasonal and diurnal variations of ambient BTEX concentrations from two monitoring stations located in distinct areas reveal the possibility to identify source categories. Specifically, the varying oxidation rates of airborne BTEX compounds are used to allocate contributions of traffic emissions and evaporative sources to observed BTEX concentrations. - BTEX sources are identified from temporal variations of ambient concentration

  5. Key figures for the regional- and distribution grid

    International Nuclear Information System (INIS)

    Vikingstad, S.

    1996-02-01

    In Norway, improving the efficiency of the hydroelectric grid operation is a stated goal of the Energy Act. Several studies have identified potential profits of such improvement. This publication focuses on costs and improvement potentials. Publication of key figures may stimulate grid owners, boards and administrations to improve the operating efficiency of their grids. The publication shows key figures for the regional- and distribution grid and is based on accounting data for 1994. The key figures are divided into: (1) Cost structure: The key figures express the relative contributions of each cost component to the total income of the grid, (2) Costs and physical quantities: The key figures show the cost of delivering the transport services, (3) Physical quantities: The key figures describe the working conditions of the energy utility. It appears that the cost structure of the sector varies considerably. The same is true of the cost related to the delivery of grid services. 30 figs., 6 tabs

  6. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  7. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  8. Accelerating foreign-key joins using asymmetric memory channels

    NARCIS (Netherlands)

    Pirk, H.; Manegold, S.; Kersten, M.

    2011-01-01

    Indexed Foreign-Key Joins expose a very asymmetric access pattern: the Foreign-Key Index is sequentially scanned whilst the Primary-Key table is target of many quasi-random lookups which is the dominant cost factor. To reduce the costs of the random lookups the fact-table can be (re-) partitioned at

  9. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  10. KeyPathwayMiner 4.0

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; Pauling, Josch; Batra, Richa

    2014-01-01

    release of KeyPathwayMiner (version 4.0) that is not limited to analyses of single omics data sets, e.g. gene expression, but is able to directly combine several different omics data types. Version 4.0 can further integrate existing knowledge by adding a search bias towards sub-networks that contain...... (avoid) genes provided in a positive (negative) list. Finally the new release now also provides a set of novel visualization features and has been implemented as an app for the standard bioinformatics network analysis tool: Cytoscape. CONCLUSION: With KeyPathwayMiner 4.0, we publish a Cytoscape app...

  11. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  12. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  13. Duty hour restrictions and surgical complications for head and neck key indicator procedures.

    Science.gov (United States)

    Smith, Aaron; Jain, Nikhita; Wan, Jim; Wang, Lei; Sebelik, Merry

    2017-08-01

    Graduate medical education has traditionally required long work hours, allowing trainees little time for adequate rest. Based on concerns over performance deterioration with sleep deprivation and its effect on patient outcomes, duty hour restrictions have been mandated. We sought to characterize complications from otolaryngology key indicator procedures performed before and after duty hour reform. Retrospective cross-sectional analysis of National Inpatient Sample (NIS). The NIS was queried for procedure codes associated with head and neck key indicator groupings for the years 2000-2002 (45,363 procedures) and 2006-2008 (51,144 procedures). Hospitals were divided into three groups: nonteaching hospitals (NTH), teaching hospitals without otolaryngology programs (TH), and teaching hospitals with otolaryngology programs (TH-OTO). Surgical complication rates, length of stay, and mortality rates were analyzed using logistic and linear regression. The number of procedures increased (12.7%), with TH-OTO contributing more in postrestriction years (21% to 30%). Overall complication rates between the two periods revealed no difference, regardless of hospital setting. Subset analysis showed some variation within each complication within each grouping. Length of stay increased at TH-OTO (2.75 to 2.78 days) and decreased at NTH (2.28 to 2.24 days) and TH (2.39 to 2.36 days). Mortality did not increase among the three hospital types (NTH, P key indicator procedures. Moreover, concerns about reduced surgical case numbers appear unfounded, especially for otolaryngology programs. 2c Laryngoscope, 127:1797-1803, 2017. © 2016 The American Laryngological, Rhinological and Otological Society, Inc.

  14. Surface N-glycoproteome patterns reveal key proteins of neuronal differentiation

    Czech Academy of Sciences Publication Activity Database

    Tylečková, Jiřina; Valeková, Ivona; Žižková, Martina; Rákocyová, Michaela; Maršala, S.; Maršala, M.; Gadher, S. J.; Kovářová, Hana

    2016-01-01

    Roč. 132, č. 1 (2016), s. 13-20 ISSN 1874-3919 R&D Projects: GA MŠk ED2.1.00/03.0124; GA TA ČR(CZ) TA01011466 Institutional support: RVO:67985904 Keywords : cell adhesion proteins * cell surface capture * neuronal differentiation Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 3.914, year: 2016

  15. Key roles for freshwater Actinobacteria revealed by deep metagenomic sequencing.

    Science.gov (United States)

    Ghai, Rohit; Mizuno, Carolina Megumi; Picazo, Antonio; Camacho, Antonio; Rodriguez-Valera, Francisco

    2014-12-01

    Freshwater ecosystems are critical but fragile environments directly affecting society and its welfare. However, our understanding of genuinely freshwater microbial communities, constrained by our capacity to manipulate its prokaryotic participants in axenic cultures, remains very rudimentary. Even the most abundant components, freshwater Actinobacteria, remain largely unknown. Here, applying deep metagenomic sequencing to the microbial community of a freshwater reservoir, we were able to circumvent this traditional bottleneck and reconstruct de novo seven distinct streamlined actinobacterial genomes. These genomes represent three new groups of photoheterotrophic, planktonic Actinobacteria. We describe for the first time genomes of two novel clades, acMicro (Micrococcineae, related to Luna2,) and acAMD (Actinomycetales, related to acTH1). Besides, an aggregate of contigs belonged to a new branch of the Acidimicrobiales. All are estimated to have small genomes (approximately 1.2 Mb), and their GC content varied from 40 to 61%. One of the Micrococcineae genomes encodes a proteorhodopsin, a rhodopsin type reported for the first time in Actinobacteria. The remarkable potential capacity of some of these genomes to transform recalcitrant plant detrital material, particularly lignin-derived compounds, suggests close linkages between the terrestrial and aquatic realms. Moreover, abundances of Actinobacteria correlate inversely to those of Cyanobacteria that are responsible for prolonged and frequently irretrievable damage to freshwater ecosystems. This suggests that they might serve as sentinels of impending ecological catastrophes. © 2014 John Wiley & Sons Ltd.

  16. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana.

    Science.gov (United States)

    Engel, Julien; Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original multi-access electronic key for the identification of 389 tree genera occurring in French Guiana terra-firme forests, based on a set of 79 morphological characters related to vegetative, floral and fruit characters. Its purpose is to help Amazonian tree identification and to support the dissemination of botanical knowledge to non-specialists, including forest workers, students and researchers from other scientific disciplines. The electronic key is accessible with the free access software Xper ², and the database is publicly available on figshare: https://figshare.com/s/75d890b7d707e0ffc9bf (doi: 10.6084/m9.figshare.2682550).

  17. Modulation of the functional association between the HIV-1 intasome and the nucleosome by histone amino-terminal tails.

    Science.gov (United States)

    Benleulmi, Mohamed S; Matysiak, Julien; Robert, Xavier; Miskey, Csaba; Mauro, Eric; Lapaillerie, Delphine; Lesbats, Paul; Chaignepain, Stéphane; Henriquez, Daniel R; Calmels, Christina; Oladosu, Oyindamola; Thierry, Eloïse; Leon, Oscar; Lavigne, Marc; Andreola, Marie-Line; Delelis, Olivier; Ivics, Zoltán; Ruff, Marc; Gouet, Patrice; Parissi, Vincent

    2017-11-28

    Stable insertion of the retroviral DNA genome into host chromatin requires the functional association between the intasome (integrase·viral DNA complex) and the nucleosome. The data from the literature suggest that direct protein-protein contacts between integrase and histones may be involved in anchoring the intasome to the nucleosome. Since histone tails are candidates for interactions with the incoming intasomes we have investigated whether they could participate in modulating the nucleosomal integration process. We show here that histone tails are required for an optimal association between HIV-1 integrase (IN) and the nucleosome for efficient integration. We also demonstrate direct interactions between IN and the amino-terminal tail of human histone H4 in vitro. Structure/function studies enabled us to identify amino acids in the carboxy-terminal domain of IN that are important for this interaction. Analysis of the nucleosome-binding properties of catalytically active mutated INs confirmed that their ability to engage the nucleosome for integration in vitro was affected. Pseudovirus particles bearing mutations that affect the IN/H4 association also showed impaired replication capacity due to altered integration and re-targeting of their insertion sites toward dynamic regions of the chromatin with lower nucleosome occupancy. Collectively, our data support a functional association between HIV-1 IN and histone tails that promotes anchoring of the intasome to nucleosomes and optimal integration into chromatin.

  18. Assessment of Integration-defective HIV-1 and EIAV Vectors In Vitro and In Vivo

    Directory of Open Access Journals (Sweden)

    Scott Ellis

    2012-01-01

    Full Text Available The interest in integrase-defective lentiviral vectors (IDLVs stems from their potential advantage of large cloning capacity and broad cell tropism while avoiding the possibility of insertional mutagenesis. Here, we directly compared the transducing potential of IDLVs based on the equine infectious anemia virus (EIAV to the more commonly described HIV-1 IDLVs. IDLVs were constructed by introducing equivalent single/triple mutations into the integrase catalytic triad. We show that both the single and the triple mutant HIV-1 IDLVs transduce the PC12 cells, but not the C2C12 cells, with similar efficiency to their parental HIV-1 vector. In contrast, the single and triple EIAV IDLVs did not efficiently transduce either differentiated cell line. Moreover, this HIV-1 IDLV-mediated expression was independent of any residual integration activity because reporter expression was lost when cell cycling was restored. Four weeks following stereotactic administration into adult rat brains, only the single HIV-1 IDLV mutant displayed a comparable transduction profile to the parental HIV-1 vector. In contrast, neither EIAV IDLV mutants showed significant reporter gene expression. This work indicates that the transducing potential of IDLVs appears to depend not only on the choice of integrase mutation and type of target cell, but also on the nature of the lentiviral vector.

  19. Basic study on the rectangular numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1997-06-01

    The present study was conducted to examine the optimum inter-key spacing of numeric rectangular keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) participated in the experiment. Each subject performed the data entry task using rectangular keys of touch devices. These keys were arranged in both horizontal and vertical layouts. The sizes of the rectangular keys in both layouts were 12 x 21 mm and 15 x 39 mm, and each of the inter-key spacing of each key was 0, 3, 6, 12 and 21 mm. The response time with inter-key spacing of 3 mm was significantly faster than with the inter-key spacing of 0, 12 and 21 mm (p < 0.05). Keys of vertical position produced faster response time than that of horizontal position. The subjective ratings showed that the inter-key spacing of 6 mm was significantly better than the inter-key spacing of 0, 3, 12 and 21 mm (p < 0.05).

  20. Secret-key rates and privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.

    2009-01-01

    In this thesis both the generation of secret keys from biometric data and the binding of secret keys to biometric data are investigated. These secret keys can be used to regulate access to sensitive data, services, and environments. In a biometric secrecy system a secret key is generated or chosen

  1. Il governo della performance dei processi di business : dai Key Performance Indicators ai Key Risk Indicators

    OpenAIRE

    Sergio Beretta; Saverio Bozzolan

    2013-01-01

    The recent paper issued by COSO ["Developing Key Risk Indicators to Strengthen Enterprise Risk Management" (Coso, 2010)] is the starting point of this article whose aim is to discuss the relevance of the business process dimension in the design and implementation of Key Risk Indicators. The Authors analyze the reasons of the systematic underestimation of the business process dimension in the COSO papers and debate the implications that the explicit consideration of the business process dimens...

  2. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  3. Key Frame Extraction in the Summary Space.

    Science.gov (United States)

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  4. Novel secret key generation techniques using memristor devices

    Science.gov (United States)

    Abunahla, Heba; Shehada, Dina; Yeun, Chan Yeob; Mohammad, Baker; Jaoude, Maguy Abi

    2016-02-01

    This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC) memristor based security.

  5. Secure key distribution by swapping quantum entanglement

    International Nuclear Information System (INIS)

    Song, Daegene

    2004-01-01

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes

  6. Calculation of key reduction for B92 QKD protocol

    Science.gov (United States)

    Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav

    2015-05-01

    It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.

  7. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  8. Circuit-wide Transcriptional Profiling Reveals Brain Region-Specific Gene Networks Regulating Depression Susceptibility.

    Science.gov (United States)

    Bagot, Rosemary C; Cates, Hannah M; Purushothaman, Immanuel; Lorsch, Zachary S; Walker, Deena M; Wang, Junshi; Huang, Xiaojie; Schlüter, Oliver M; Maze, Ian; Peña, Catherine J; Heller, Elizabeth A; Issler, Orna; Wang, Minghui; Song, Won-Min; Stein, Jason L; Liu, Xiaochuan; Doyle, Marie A; Scobie, Kimberly N; Sun, Hao Sheng; Neve, Rachael L; Geschwind, Daniel; Dong, Yan; Shen, Li; Zhang, Bin; Nestler, Eric J

    2016-06-01

    Depression is a complex, heterogeneous disorder and a leading contributor to the global burden of disease. Most previous research has focused on individual brain regions and genes contributing to depression. However, emerging evidence in humans and animal models suggests that dysregulated circuit function and gene expression across multiple brain regions drive depressive phenotypes. Here, we performed RNA sequencing on four brain regions from control animals and those susceptible or resilient to chronic social defeat stress at multiple time points. We employed an integrative network biology approach to identify transcriptional networks and key driver genes that regulate susceptibility to depressive-like symptoms. Further, we validated in vivo several key drivers and their associated transcriptional networks that regulate depression susceptibility and confirmed their functional significance at the levels of gene transcription, synaptic regulation, and behavior. Our study reveals novel transcriptional networks that control stress susceptibility and offers fundamentally new leads for antidepressant drug discovery. Copyright © 2016 Elsevier Inc. All rights reserved.

  9. Extensible router for a quantum key distribution network

    International Nuclear Information System (INIS)

    Zhang Tao; Mo Xiaofan; Han Zhengfu; Guo Guangcan

    2008-01-01

    Building a quantum key distribution network is crucial for practical quantum cryptography. We present a scheme to build a star topology quantum key distribution network based on wavelength division multiplexing which, with current technology, can connect at least a hundred users. With the scheme, a 4-user demonstration network was built up and key exchanges were performed

  10. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  11. Key-space analysis of double random phase encryption technique

    Science.gov (United States)

    Monaghan, David S.; Gopinathan, Unnikrishnan; Naughton, Thomas J.; Sheridan, John T.

    2007-09-01

    We perform a numerical analysis on the double random phase encryption/decryption technique. The key-space of an encryption technique is the set of possible keys that can be used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstrate only how a small number of arbitrary keys cannot decrypt a chosen encrypted image in their system. However, this type of demonstration does not discuss the properties of the key-space nor refute the feasibility of an efficient brute-force attack. To clarify these issues we present a key-space analysis of the technique. For a range of problem instances we plot the distribution of decryption errors in the key-space indicating the lack of feasibility of a simple brute-force attack.

  12. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  13. Increase in physical activities in kindergarten children with cerebral palsy by employing MaKey-MaKey-based task systems.

    Science.gov (United States)

    Lin, Chien-Yu; Chang, Yu-Ming

    2014-09-01

    In this study, we employed Flash- and Scratch-based multimedia by using a MaKey-MaKey-based task system to increase the motivation level of children with cerebral palsy to perform physical activities. MaKey MaKey is a circuit board that converts physical touch to a digital signal, which is interpreted by a computer as a keyboard message. In this study, we used conductive materials to control this interaction. This study followed single-case design using ABAB models in which A indicated the baseline and B indicated the intervention. The experiment period comprised 1 month and a half. The experimental results demonstrated that in the case of two kindergarten children with cerebral palsy, their scores were considerably increased during the intervention phrases. The developmental applications of the results are also discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.

  14. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  15. Small private key MQPKS on an embedded microprocessor.

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  16. Small Private Key PKS on an Embedded Microprocessor

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  17. Key-lock colloids in a nematic liquid crystal.

    Science.gov (United States)

    Silvestre, Nuno M; Tasinkevych, M

    2017-01-01

    The Landau-de Gennes free energy is used to study theoretically the effective interaction of spherical "key" and anisotropic "lock" colloidal particles. We assume identical anchoring properties of the surfaces of the key and of the lock particles, and we consider planar degenerate and perpendicular anchoring conditions separately. The lock particle is modeled as a spherical particle with a spherical dimple. When such a particle is introduced into a nematic liquid crystal, it orients its dimple at an oblique angle θ_{eq} with respect to the far field director n_{∞}. This angle depends on the depth of the dimple. Minimization results show that the free energy of a pair of key and lock particles exhibits a global minimum for the configuration when the key particle is facing the dimple of the lock colloidal particle. The preferred orientation ϕ_{eq} of the key-lock composite doublet relative to n_{∞} is robust against thermal fluctuations. The preferred orientation θ_{eq}^{(2)} of the dimple particle in the doublet is different from the isolated situation. This is related to the "direct" interaction of defects accompanying the key particle with the edge of the dimple. We propose that this nematic-amplified key-lock interaction can play an important role in self-organization and clustering of mixtures of colloidal particles with dimple colloids present.

  18. Long noncoding RNAs: Undeciphered cellular codes encrypting keys of colorectal cancer pathogenesis

    Science.gov (United States)

    Kim, Taewan; Croce, Carlo M.

    2018-01-01

    Long noncoding RNAs are non-protein coding transcripts longer than 200 nucleotides in length. By the advance in genetic and bioinformatic technologies, the new genomic landscape including noncoding transcripts has been revealed. Despite their non-capacity to be translated into proteins, lncRNAs have a versatile functions through various mechanisms interacting with other cellular molecules including DNA, protein, and RNA. Recent research interest and endeavor have identified the functional role of lncRNAs in various diseases including cancer. Colorectal cancer (CRC) is not only one of the most frequent cancer but also one of the cancer types with remarkable achievements in lncRNA research. Of the numerous notable lncRNAs identified and characterized in CRC, we will focus on key lncRNAs with the high potential as CRC-specific biomarkers in this review. PMID:29306015

  19. Genomic comparison of invasive and rare non-invasive strains reveals Porphyromonas gingivalis genetic polymorphisms

    Directory of Open Access Journals (Sweden)

    Svetlana Dolgilevich

    2011-03-01

    Full Text Available Porphyromonas gingivalis strains are shown to invade human cells in vitro with different invasion efficiencies, varying by up to three orders of magnitude.We tested the hypothesis that invasion-associated interstrain genomic polymorphisms are present in P. gingivalis and that putative invasion-associated genes can contribute to P. gingivalis invasion.Using an invasive (W83 and the only available non-invasive P. gingivalis strain (AJW4 and whole genome microarrays followed by two separate software tools, we carried out comparative genomic hybridization (CGH analysis.We identified 68 annotated and 51 hypothetical open reading frames (ORFs that are polymorphic between these strains. Among these are surface proteins, lipoproteins, capsular polysaccharide biosynthesis enzymes, regulatory and immunoreactive proteins, integrases, and transposases often with abnormal GC content and clustered on the chromosome. Amplification of selected ORFs was used to validate the approach and the selection. Eleven clinical strains were investigated for the presence of selected ORFs. The putative invasion-associated ORFs were present in 10 of the isolates. The invasion ability of three isogenic mutants, carrying deletions in PG0185, PG0186, and PG0982 was tested. The PG0185 (ragA and PG0186 (ragB mutants had 5.1×103-fold and 3.6×103-fold decreased in vitro invasion ability, respectively.The annotation of divergent ORFs suggests deficiency in multiple genes as a basis for P. gingivalis non-invasive phenotype. Access the supplementary material to this article: Supplement, table (see Supplementary files under Reading Tools online.

  20. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  1. Renyi information gain on quantum key

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  2. Authenticated group Diffie-Hellman key exchange: theory and practice

    Energy Technology Data Exchange (ETDEWEB)

    Chevassut, Olivier [Catholic Univ. of Louvain, Louvain-la-Neuve (Belgium)

    2002-10-01

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  3. Retrotransposons. An RNA polymerase III subunit determines sites of retrotransposon integration.

    Science.gov (United States)

    Bridier-Nahmias, Antoine; Tchalikian-Cosson, Aurélie; Baller, Joshua A; Menouni, Rachid; Fayol, Hélène; Flores, Amando; Saïb, Ali; Werner, Michel; Voytas, Daniel F; Lesage, Pascale

    2015-05-01

    Mobile genetic elements are ubiquitous. Their integration site influences genome stability and gene expression. The Ty1 retrotransposon of the yeast Saccharomyces cerevisiae integrates upstream of RNA polymerase III (Pol III)-transcribed genes, yet the primary determinant of target specificity has remained elusive. Here we describe an interaction between Ty1 integrase and the AC40 subunit of Pol III and demonstrate that AC40 is the predominant determinant targeting Ty1 integration upstream of Pol III-transcribed genes. Lack of an integrase-AC40 interaction dramatically alters target site choice, leading to a redistribution of Ty1 insertions in the genome, mainly to chromosome ends. The mechanism of target specificity allows Ty1 to proliferate and yet minimizes genetic damage to its host. Copyright © 2015, American Association for the Advancement of Science.

  4. Novel secret key generation techniques using memristor devices

    Directory of Open Access Journals (Sweden)

    Heba Abunahla

    2016-02-01

    Full Text Available This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES and Advanced Encryption Standard (AES in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC memristor based security.

  5. Mystery Montage: A Holistic, Visual, and Kinesthetic Process for Expanding Horizons and Revealing the Core of a Teaching Philosophy

    Science.gov (United States)

    Ennis, Kim; Priebe, Carly; Sharipova, Mayya; West, Kim

    2012-01-01

    Revealing the core of a teaching philosophy is the key to a concise and meaningful philosophy statement, but it can be an elusive goal. This paper offers a visual, kinesthetic, and holistic process for expanding the horizons of self-reflection, self-analysis, and self-knowledge. Mystery montage, a variation of visual mapping, storyboarding, and…

  6. Practical quantum key distribution with polarization-entangled photons

    International Nuclear Information System (INIS)

    Poppe, A.; Fedrizzi, A.; Boehm, H.; Ursin, R.; Loruenser, T.; Peev, M.; Maurhardt, O.; Suda, M.; Kurtsiefer, C.; Weinfurter, H.; Jennewein, T.; Zeilinger, A.

    2005-01-01

    Full text: We present an entangled-state quantum cryptography system that operated for the first time in a real-world application scenario. The full key generation protocol was performed in real-time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. A source for polarization-entangled photons delivered about 8200 entangled photon pairs per second. After transmission to the distant receivers, a mean value of 468 pairs per second remained for the generation of a raw key, which showed an average qubit error rate of 6.4 %. The raw key was sifted and subsequently processed by a classical protocol which included error correction and privacy amplification. The final secure key bit rate was about 76 bits per second. The generated quantum key was then handed over and used by a secure communication application. (author)

  7. Optimal grazing management strategies: evaluating key concepts ...

    African Journals Online (AJOL)

    Finally, overstocking will override key management initiatives, such as effective recovery periods, leading to rangeland degradation. Thus, in variable climates, stocking rate should be set conservatively to allow easier adaptation of animal numbers to rainfall variability from year to year. We suggest several key concepts that ...

  8. Key Update Assistant for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    developed a push-button solution - powered by stochastic model checking - that network designers can easily benefit from, and it paves the way for consumers to set up key update related security parameters. Key Update Assistant, as we named it, runs necessary model checking operations and determines...

  9. Using USB Keys to Promote Mobile Learning

    Directory of Open Access Journals (Sweden)

    Marilyne Rosselle

    2009-07-01

    Full Text Available M-learning (i.e. mobile learning is a field of e-learning that provides learners learning environments using mobile technology. In this context, learning can take place anywhere and anytime, in open and distance learning. Depending on the type of technology it may be done through software called nomadic (i.e. prepared to mobility. Among these technologies, there are those composed of digital interfaces and with autonomy of treatment: Smartphone, PDA, calculator and even mp3 key. In this article we propose to take into account storage devices as mobile technologies. Our focus was on the USB key. We present a procedure to test whether a learning environment embarked on a USB key can be described as nomadic or not. This procedure has been tested on a sample of three ILE (Interactive Learning Environment. This approach has allowed us to define criteria of nomadism, criteria which were then included in the design of a synchronous Weblog on USB key.

  10. Single Turnover at Molecular Polymerization Catalysts Reveals Spatiotemporally Resolved Reactions.

    Science.gov (United States)

    Easter, Quinn T; Blum, Suzanne A

    2017-10-23

    Multiple active individual molecular ruthenium catalysts have been pinpointed within growing polynorbornene, thereby revealing information on the reaction dynamics and location that is unavailable through traditional ensemble experiments. This is the first single-turnover imaging of a molecular catalyst by fluorescence microscopy and allows detection of individual monomer reactions at an industrially important molecular ruthenium ring-opening metathesis polymerization (ROMP) catalyst under synthetically relevant conditions (e.g. unmodified industrial catalyst, ambient pressure, condensed phase, ca. 0.03 m monomer). These results further establish the key fundamentals of this imaging technique for characterizing the reactivity and location of active molecular catalysts even when they are the minor components. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Password-based authenticated key exchange scheme using smart card

    Science.gov (United States)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  12. Secured Session-key Distribution using control Vector Encryption / Decryption Process

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim; Khaleqdad Khan, ANM; Lutfar Rahman, M.

    2006-01-01

    Frequent key changes are very much desirable for the secret communications and are thus in high demand. A session-key distribution technique has been designed and implemented using the programming language C on which the communication between the end-users is encrypted is used for the duration of a logical connection. Each session-key is obtained from the key distribution center (KDC) over the same networking facilities used for end-user communication. The control vector is cryptographically coupled with the session-key at the time of key generation in the KDC. For this, the generated hash function, master key and the session-key are used for producing the encrypted session-key, which has to be transferred. All the operations have been performed using the C programming language. This process can be widely applicable to all sorts of electronic transactions online or offline; commercially and academically.(authors)

  13. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  14. Small Private Key MQPKS on an Embedded Microprocessor

    Directory of Open Access Journals (Sweden)

    Hwajeong Seo

    2014-03-01

    Full Text Available Multivariate quadratic (MQ cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011, a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  15. WRKY transcription factors: key components in abscisic acid signalling.

    Science.gov (United States)

    Rushton, Deena L; Tripathi, Prateek; Rabara, Roel C; Lin, Jun; Ringler, Patricia; Boken, Ashley K; Langum, Tanner J; Smidt, Lucas; Boomsma, Darius D; Emme, Nicholas J; Chen, Xianfeng; Finer, John J; Shen, Qingxi J; Rushton, Paul J

    2012-01-01

    WRKY transcription factors (TFs) are key regulators of many plant processes, including the responses to biotic and abiotic stresses, senescence, seed dormancy and seed germination. For over 15 years, limited evidence has been available suggesting that WRKY TFs may play roles in regulating plant responses to the phytohormone abscisic acid (ABA), notably some WRKY TFs are ABA-inducible repressors of seed germination. However, the roles of WRKY TFs in other aspects of ABA signalling, and the mechanisms involved, have remained unclear. Recent significant progress in ABA research has now placed specific WRKY TFs firmly in ABA-responsive signalling pathways, where they act at multiple levels. In Arabidopsis, WRKY TFs appear to act downstream of at least two ABA receptors: the cytoplasmic PYR/PYL/RCAR-protein phosphatase 2C-ABA complex and the chloroplast envelope-located ABAR-ABA complex. In vivo and in vitro promoter-binding studies show that the target genes for WRKY TFs that are involved in ABA signalling include well-known ABA-responsive genes such as ABF2, ABF4, ABI4, ABI5, MYB2, DREB1a, DREB2a and RAB18. Additional well-characterized stress-inducible genes such as RD29A and COR47 are also found in signalling pathways downstream of WRKY TFs. These new insights also reveal that some WRKY TFs are positive regulators of ABA-mediated stomatal closure and hence drought responses. Conversely, many WRKY TFs are negative regulators of seed germination, and controlling seed germination appears a common function of a subset of WRKY TFs in flowering plants. Taken together, these new data demonstrate that WRKY TFs are key nodes in ABA-responsive signalling networks. © 2011 The Authors. Plant Biotechnology Journal © 2011 Society for Experimental Biology, Association of Applied Biologists and Blackwell Publishing Ltd.

  16. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  17. Gender disparities in high-quality research revealed by Nature Index journals.

    Science.gov (United States)

    Bendels, Michael H K; Müller, Ruth; Brueggmann, Doerthe; Groneberg, David A

    2018-01-01

    The present study aims to elucidate the state of gender equality in high-quality research by analyzing the representation of female authorships in the last decade (from 2008 to 2016). Based on the Gendermetrics platform, 293,557 research articles from 54 journals listed in the Nature Index were considered covering the categories Life Science, Multidisciplinary, Earth & Environmental and Chemistry. The core method was the combined analysis of the proportion of female authorships and the female-to-male odds ratio for first, co- and last authorships. The distribution of prestigious authorships was measured by the Prestige Index. 29.8% of all authorships and 33.1% of the first, 31.8% of the co- and 18.1% of the last authorships were held by women. The corresponding female-to-male odds ratio is 1.19 (CI: 1.18-1.20) for first, 1.35 (CI: 1.34-1.36) for co- and 0.47 (CI: 0.46-0.48) for last authorships. Women are underrepresented at prestigious authorships compared to men (Prestige Index = -0.42). The underrepresentation accentuates in highly competitive articles attracting the highest citation rates, namely, articles with many authors and articles that were published in highest-impact journals. More specifically, a large negative correlation between the 5-Year-Impact-Factor of a journal and the female representation at prestigious authorships was revealed (r(52) = -.63, P authorships) and are underrepresented at productivity levels of more than 2 articles per author. Articles with female key authors are less frequently cited than articles with male key authors. The gender-specific differences in citation rates increase the more authors contribute to an article. Distinct differences at the journal, journal category, continent and country level were revealed. The prognosis for the next decades forecast a very slow harmonization of authorships odds between the two genders.

  18. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  19. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  20. Quantum key distribution using three basis states

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 54; Issue 5. Quantum key distribution using three ... This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum ...

  1. Mitigation of Control Channel Jamming via Combinatorial Key Distribution

    Science.gov (United States)

    Falahati, Abolfazl; Azarafrooz, Mahdi

    The problem of countering control channel jamming against internal adversaries in wireless ad hoc networks is addressed. Using combinatorial key distribution, a new method to secure the control channel access is introduced. This method, utilizes the established keys in the key establishment phase to hide the location of control channels without the need for a secure BS. This is in obtained by combination of a collision free one-way function and a combinatorial key establishment method. The proposed scheme can be considered as a special case of the ALOHA random access schemes which uses the common established keys as its seeds to generate the pattern of transmission.

  2. Experimental aspects of deterministic secure quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Walenta, Nino; Korn, Dietmar; Puhlmann, Dirk; Felbinger, Timo; Hoffmann, Holger; Ostermeyer, Martin [Universitaet Potsdam (Germany). Institut fuer Physik; Bostroem, Kim [Universitaet Muenster (Germany)

    2008-07-01

    Most common protocols for quantum key distribution (QKD) use non-deterministic algorithms to establish a shared key. But deterministic implementations can allow for higher net key transfer rates and eavesdropping detection rates. The Ping-Pong coding scheme by Bostroem and Felbinger[1] employs deterministic information encoding in entangled states with its characteristic quantum channel from Bob to Alice and back to Bob. Based on a table-top implementation of this protocol with polarization-entangled photons fundamental advantages as well as practical issues like transmission losses, photon storage and requirements for progress towards longer transmission distances are discussed and compared to non-deterministic protocols. Modifications of common protocols towards a deterministic quantum key distribution are addressed.

  3. Detector decoy quantum key distribution

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2009-01-01

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  4. High-throughput sequencing reveals key genes and immune homeostatic pathways activated in myeloid dendritic cells by Porphyromonas gingivalis 381 and its fimbrial mutants.

    Science.gov (United States)

    Arjunan, P; El-Awady, A; Dannebaum, R O; Kunde-Ramamoorthy, G; Cutler, C W

    2016-02-01

    The human microbiome consists of highly diverse microbial communities that colonize our skin and mucosal surfaces, aiding in maintenance of immune homeostasis. The keystone pathogen Porphyromonas gingivalis induces a dysbiosis and disrupts immune homeostasis through as yet unclear mechanisms. The fimbrial adhesins of P. gingivalis facilitate biofilm formation, invasion of and dissemination by blood dendritic cells; hence, fimbriae may be key factors in disruption of immune homeostasis. In this study we employed RNA-sequencing transcriptome profiling to identify differentially expressed genes (DEGs) in human monocyte-derived dendritic cells (MoDCs) in response to in vitro infection/exposure by Pg381 or its isogenic mutant strains that solely express minor-Mfa1 fimbriae (DPG3), major-FimA fimbriae (MFI) or are deficient in both fimbriae (MFB) relative to uninfected control. Our results yielded a total of 479 DEGs that were at least two-fold upregulated and downregulated in MoDCs significantly (P ≤ 0.05) by all four strains and certain DEGs that were strain-specific. Interestingly, the gene ontology biological and functional analysis shows that the upregulated genes in DPG3-induced MoDCs were more significant than other strains and associated with inflammation, immune response, anti-apoptosis, cell proliferation, and other homeostatic functions. Both transcriptome and quantitative polymerase chain reaction results show that DPG3, which solely expresses Mfa1, increased ZNF366, CD209, LOX1, IDO1, IL-10, CCL2, SOCS3, STAT3 and FOXO1 gene expression. In conclusion, we have identified key DC-mediated immune homeostatic pathways that could contribute to dysbiosis in periodontal infection with P. gingivalis. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  5. Secret Key Agreement: Fundamental Limits and Practical Challenges

    KAUST Repository

    Rezki, Zouheir

    2017-02-15

    Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.

  6. When four become one

    OpenAIRE

    Craigie, Robert

    2010-01-01

    Every machine is made of parts. But, as the new structure of the HIV integrase enzyme in complex with viral DNA shows, one could not have predicted from the individual parts just how this machine works.

  7. The Public-Key-Infrastructure of the Radiological Society of Germany

    International Nuclear Information System (INIS)

    Schuetze, B.; Kaemmerer, M.; Klos, G.; Mildenberger, P.

    2006-01-01

    Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fuer Informationstechnik, GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys correspond to the advanced signature according to the German Signature Law

  8. The Public-Key-Infrastructure of the Radiological Society of Germany

    Energy Technology Data Exchange (ETDEWEB)

    Schuetze, B. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany)]. E-mail: schuetze@medizin-informatik.org; Kaemmerer, M. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany); Klos, G. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany); Mildenberger, P. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany)

    2006-03-15

    Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fuer Informationstechnik, GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys correspond to the advanced signature according to the German Signature Law.

  9. Strategy Keys as Tools for Problem Solving

    Science.gov (United States)

    Herold-Blasius, Raja

    2017-01-01

    Problem solving is one of the main competences we seek to teach students at school for use in their future lives. However, when dealing with mathematical problems, teachers encounter a wide variety of difficulties. To foster students' problem-solving skills, the authors developed "strategy keys." Strategy keys can serve as material to…

  10. Small Private Key PKS on an Embedded Microprocessor

    OpenAIRE

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor...

  11. Ranunculaceae of the Western Ukraine. І. Identification key

    OpenAIRE

    Novikoff A.

    2013-01-01

    In these paper the identification key for Ranunculaceae of Lviv, Transcarpathian (Zakarpattia), Rivne, Volhynia, Ivano-Frankivsk, Chernivtsi, Ternopil and Khmelnitsk regions (oblasts) is introduced. The key includes 102 species. It is based on contemporary investigations on taxonomy of the family Ranunculaceae. The key is carried out up to the level of species but in some cases there are short remarks about subspecific structure of selected taxa. Also it is supported by short notes about ...

  12. The Genus Cerion (Gastropoda: Cerionidae in the Florida Keys.

    Directory of Open Access Journals (Sweden)

    Yesha Shrestha

    Full Text Available The systematic relationships and phylogeography of Cerion incanum, the only species of Cerion native to the Florida Keys, are reviewed based on partial sequences of the mitochondrial COI and 16S genes derived from 18 populations spanning the range of this species and including the type localities of all four described subspecies. Our samples included specimens of Cerion casablancae, a species introduced to Indian Key in 1912, and a population of C. incanum x C. casablancae hybrids descended from a population of C. casablancae introduced onto Bahia Honda Key in the same year. Molecular data did not support the partition of C. incanum into subspecies, nor could populations be apportioned reliably into subspecies based on morphological features used to define the subspecies. Phylogenetic analyses affirmed the derived relationship of C. incanum relative to other cerionids, and indicated a Bahamian origin for the Cerion fauna of southern Florida. Relationships among the populations throughout the Keys indicate that the northernmost populations, closest to the Tomeu paleoislands that had been inhabited by Cerion petuchi during the Calabrian Pleistocene, are the oldest. The range of Cerion incanum expanded as the archipelago that is the Florida Keys was formed since the lower Tarantian Pleistocene by extension from the northeast to the southwest, with new islands populated as they were formed. The faunas of the High Coral Keys in the northeast and the Oölite Keys in the southwest, both with large islands that host multiple discontinuous populations of Cerion, are each composed of well supported clades that are characterized by distinctive haplotypes. In contrast, the fauna of the intervening Low Coral Keys consist of a heterogeneous series of populations, some with haplotypes derived from the High Coral Keys, others from the Oölite Keys. Individuals from the C. incanum x C. casablancae hybrid population inhabiting the southeastern coast of Bahia

  13. Public key infrastructure building trusted applications and web services

    CERN Document Server

    Vacca, John R

    2004-01-01

    OVERVIEW OF PKI TECHNOLOGYPublic Key Infrastructures (PKIs): What Are They?Type of Certificate Authorities (CAS) ServicesPKI StandardsTypes of Vendor and Third-Party CA SystemsProtecting Private KeysCA System AttacksStolen Private Keys: What Can Be Done?Certificate Practice StatementsPKI ReadinessANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURESPKI Design IssuesCost Justification and ConsiderationPKI Standards Design IssuesPKI Architectural Design ConsiderationsIMPLEMENTING PKIRequirementsImplementation ScheduleImplementation CostsPKI PerformanceMANAGING PKIRequesting a CertificateObtaining a

  14. Locks & keys service moves to building 55

    CERN Multimedia

    2012-01-01

    Please note that as of July 12 Locks & keys service will be at building 55 second floor. The opening hours are as follows: 08:30 am to 12:30 pm - 1:30 pm to 5:30 pm. The procedures and rules relating to applications for key and cylinder have not changed. GI-IS Group

  15. Determinants of Key Account Management Effectiveness: The Case ...

    African Journals Online (AJOL)

    Dires Abebe Fenta

    maintaining enhanced relationships with strategic business customers named as. 'key accounts'. ... Key account management is one mechanism of treating strategic ..... Considering this report, correlation statistics was undergone to check the.

  16. Memory for melody and key in childhood.

    Science.gov (United States)

    Schellenberg, E Glenn; Poon, Jaimie; Weiss, Michael W

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  17. Comparative Transcriptome Analysis of Fetal Skin Reveals Key Genes Related to Hair Follicle Morphogenesis in Cashmere Goats.

    Directory of Open Access Journals (Sweden)

    Ye Gao

    Full Text Available Cashmere goat skin contains two types of hair follicles (HF: primary hair follicles (PHF and secondary hair follicles (SHF. Although multiple genetic determinants associated with HF formation have been identified, the molecules that determine the independent morphogenesis of HF in cashmere goats remain elusive. The growth and development of SHF directly influence the quantity and quality of cashmere production. Here, we report the transcriptome profiling analysis of nine skin samples from cashmere goats using 60- and 120-day-old embryos (E60 and E120, respectively, as well as newborns (NB, through RNA-sequencing (RNA-seq. HF morphological changes indicated that PHF were initiated at E60, with maturation from E120, while differentiation of SHF was identified at E120 until formation of cashmere occurred after birth (NB. The RNA-sequencing analysis generated over 20.6 million clean reads from each mRNA library. The number of differentially expressed genes (DEGs in E60 vs. E120, E120 vs. NB, and E60 vs. NB were 1,024, 0 and 1,801, respectively, indicating that no significant differences were found at transcriptomic levels between E120 and NB. Key genes including B4GALT4, TNC, a-integrin, and FGFR1, were up-regulated and expressed in HF initiation from E60 to E120, while regulatory genes such as GPRC5D, PAD3, HOXC13, PRR9, VSIG8, LRRC15, LHX2, MSX-2, and FOXN1 were up-regulated and expressed in HF keratinisation and hair shaft differentiation from E120 and NB to E60. Several genes belonging to the KRT and KRTAP gene families were detected throughout the three HF developmental stages. The transcriptional trajectory analyses of all DEGs indicated that immune privilege, glycosaminoglycan biosynthesis, extracellular matrix receptor interaction, and growth factor receptors all played dominant roles in the epithelial-mesenchymal interface and HF formation. We found that the Wnt, transforming growth factor-beta/bone morphogenetic protein, and Notch family

  18. Comparative Transcriptome Analysis of Fetal Skin Reveals Key Genes Related to Hair Follicle Morphogenesis in Cashmere Goats.

    Science.gov (United States)

    Gao, Ye; Wang, Xiaolong; Yan, Hailong; Zeng, Jie; Ma, Sen; Niu, Yiyuan; Zhou, Guangxian; Jiang, Yu; Chen, Yulin

    2016-01-01

    Cashmere goat skin contains two types of hair follicles (HF): primary hair follicles (PHF) and secondary hair follicles (SHF). Although multiple genetic determinants associated with HF formation have been identified, the molecules that determine the independent morphogenesis of HF in cashmere goats remain elusive. The growth and development of SHF directly influence the quantity and quality of cashmere production. Here, we report the transcriptome profiling analysis of nine skin samples from cashmere goats using 60- and 120-day-old embryos (E60 and E120, respectively), as well as newborns (NB), through RNA-sequencing (RNA-seq). HF morphological changes indicated that PHF were initiated at E60, with maturation from E120, while differentiation of SHF was identified at E120 until formation of cashmere occurred after birth (NB). The RNA-sequencing analysis generated over 20.6 million clean reads from each mRNA library. The number of differentially expressed genes (DEGs) in E60 vs. E120, E120 vs. NB, and E60 vs. NB were 1,024, 0 and 1,801, respectively, indicating that no significant differences were found at transcriptomic levels between E120 and NB. Key genes including B4GALT4, TNC, a-integrin, and FGFR1, were up-regulated and expressed in HF initiation from E60 to E120, while regulatory genes such as GPRC5D, PAD3, HOXC13, PRR9, VSIG8, LRRC15, LHX2, MSX-2, and FOXN1 were up-regulated and expressed in HF keratinisation and hair shaft differentiation from E120 and NB to E60. Several genes belonging to the KRT and KRTAP gene families were detected throughout the three HF developmental stages. The transcriptional trajectory analyses of all DEGs indicated that immune privilege, glycosaminoglycan biosynthesis, extracellular matrix receptor interaction, and growth factor receptors all played dominant roles in the epithelial-mesenchymal interface and HF formation. We found that the Wnt, transforming growth factor-beta/bone morphogenetic protein, and Notch family members

  19. Identifying key hospital service quality factors in online health communities.

    Science.gov (United States)

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain; Kim, Minki

    2015-04-07

    classification performance still has room for improvement, but the extraction results are applicable to more detailed analysis. Further analysis of the extracted information reveals that there are differences in the details of social media-based key quality factors for hospitals according to the regions in Korea, and the patterns of change seem to accurately reflect social events (eg, influenza epidemics). These findings could be used to provide timely information to caregivers, hospital officials, and medical officials for health care policies.

  20. A survey on exploring key performance indicators

    Directory of Open Access Journals (Sweden)

    Mohammed Badawy

    2016-12-01

    Full Text Available Key Performance Indicators (KPIs allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs.

  1. Single-quadrature continuous-variable quantum key distribution

    DEFF Research Database (Denmark)

    Gehring, Tobias; Jacobsen, Christian Scheffmann; Andersen, Ulrik Lund

    2016-01-01

    Most continuous-variable quantum key distribution schemes are based on the Gaussian modulation of coherent states followed by continuous quadrature detection using homodyne detectors. In all previous schemes, the Gaussian modulation has been carried out in conjugate quadratures thus requiring two...... commercialization of continuous-variable quantum key distribution, provided that the low noise requirement can be achieved....

  2. Long distance free-space quantum key distribution

    International Nuclear Information System (INIS)

    Schmitt-Manderbach, T.

    2007-01-01

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional ''decoy'' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250 bit

  3. Long distance free-space quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Schmitt-Manderbach, T.

    2007-10-16

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional 'decoy' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250

  4. Mars’ First Billion Years: Key Findings, Key Unsolved Paradoxes, and Future Exploration

    Science.gov (United States)

    Ehlmann, Bethany

    2017-10-01

    In the evolution of terrestrial planets, the first billion years are the period most shrouded in mystery: How vigorous is early atmospheric loss? How do planetary climates respond to a brightening sun? When and how are plate tectonic recycling processes initiated? How do voluminous volcanism and heavy impact bombardment influence the composition of the atmosphere? Under what conditions might life arise? Looking outward to terrestrial planets around other stars, the record from Venus, Earth and Mars in this solar system is crucial for developing models of physical can chemical processes. Of these three worlds, Mars provides the longest record of planetary evolution from the first billion years, comprising >50% of exposed geologic units, which are only lightly overprinted by later processes.Orbital observations of the last decade have revealed abundant evidence for surface waters in the form of lakes, valley networks, and evidence of chemically open-system near-surface weathering. Groundwaters at temperatures ranging from just above freezing to hydrothermal have also left a rich record of process in the mineralogical record. A rsuite of environments - similar in diversity to Earth’s - has been discovered on Mars with water pH, temperature, redox, and chemistries varying in space and time.Here, I will focus on the consequences of the aqueous alteration of the Martian crust on the composition of the atmosphere based on recent work studying aspects of the volatile budget (Usui et al., 2015; Edwards & Ehlmann, 2015; Hu et al., 2015; Jakosky et al., 2017, Wordsworth et al., 2017, and Ehlmann, in prep.). The solid crust and mantle of Mars act as volatile reservoirs and volatile sources through volcanism, mineral precipitation, and release of gases. We examine the extent to which the budget is understood or ill-understood for hydrogen and carbon, and associated phases H2O, CO2, and CH4. Additionally, I identify some key stratigraphies where a combination of focused in

  5. Partitioning of the net CO2 exchange using an automated chamber system reveals plant phenology as key control of production and respiration fluxes in a boreal peatland.

    Science.gov (United States)

    Järveoja, Järvi; Nilsson, Mats B; Gažovič, Michal; Crill, Patrick M; Peichl, Matthias

    2018-04-30

    The net ecosystem CO 2 exchange (NEE) drives the carbon (C) sink-source strength of northern peatlands. Since NEE represents a balance between various production and respiration fluxes, accurate predictions of its response to global changes require an in depth understanding of these underlying processes. Currently, however, detailed information of the temporal dynamics as well as the separate biotic and abiotic controls of the NEE component fluxes is lacking in peatland ecosystems. In this study, we address this knowledge gap by using an automated chamber system established across natural and trenching-/vegetation removal plots to partition NEE into its production (i.e. gross and net primary production; GPP and NPP) and respiration (i.e. ecosystem, heterotrophic and autotrophic respiration; ER, Rh and Ra) fluxes in a boreal peatland in northern Sweden. Our results showed that daily NEE patterns were driven by GPP while variations in ER were governed by Ra rather than Rh. Moreover, we observed pronounced seasonal shifts in the Ra/Rh and above-/belowground NPP ratios throughout the main phenological phases. Generalized linear model analysis revealed that the greenness index derived from digital images (as a proxy for plant phenology) was the strongest control of NEE, GPP and NPP while explaining considerable fractions also in the variations of ER and Ra. In addition, our data exposed greater temperature sensitivity of NPP compared to Rh resulting in enhanced C sequestration with increasing temperature. Overall, our study suggests that the temporal patterns in NEE and its component fluxes are tightly coupled to vegetation dynamics in boreal peatlands and thus challenges previous studies that commonly identify abiotic factors as key drivers. These findings further emphasize the need for integrating detailed information on plant phenology into process-based models to improve predictions of global change impacts on the peatland C cycle. This article is protected by

  6. The effect of touch-key size on the usability of In-Vehicle Information Systems and driving safety during simulated driving.

    Science.gov (United States)

    Kim, Heejin; Kwon, Sunghyuk; Heo, Jiyoon; Lee, Hojin; Chung, Min K

    2014-05-01

    Investigating the effect of touch-key size on usability of In-Vehicle Information Systems (IVISs) is one of the most important research issues since it is closely related to safety issues besides its usability. This study investigated the effects of the touch-key size of IVISs with respect to safety issues (the standard deviation of lane position, the speed variation, the total glance time, the mean glance time, the mean time between glances, and the mean number of glances) and the usability of IVISs (the task completion time, error rate, subjective preference, and NASA-TLX) through a driving simulation. A total of 30 drivers participated in the task of entering 5-digit numbers with various touch-key sizes while performing simulated driving. The size of the touch-key was 7.5 mm, 12.5 mm, 17.5 mm, 22.5 mm and 27.5 mm, and the speed of driving was set to 0 km/h (stationary state), 50 km/h and 100 km/h. As a result, both the driving safety and the usability of the IVISs increased as the touch-key size increased up to a certain size (17.5 mm in this study), at which they reached asymptotes. We performed Fitts' law analysis of our data, and this revealed that the data from the dual task experiment did not follow Fitts' law. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  7. A Review of RSA and Public-Key Cryptosystems | Rabah | Botswana ...

    African Journals Online (AJOL)

    ... study and analyze the RSA cryptosystems – a public-key cryptographic algorithm - a system that uses two sets of keys; one for encryption and the other for decryption. Key Words: Public-key cryptography, DH, RSA, Internet Security and attacks, Digital Signature, Message digest, Authentication, Secure Socket Layer (SSL)

  8. Key Lake human resources and northern business initiative

    International Nuclear Information System (INIS)

    Dudar, R.; McIntyre, J.; McInnes, B.P.

    1994-01-01

    The Key Lake Operation is committed to a policy of maximizing Saskatchewan, and particularly northern Saskatchewan, employment and business opportunities. The participation rate of northern people in the Key Lake operation's workforce has risen from 23.8% in 1983, to 42% today. Cameco's objective is to achieve 50% representation of residents of Saskatchewan's north in the Key Lake workforce by 1995. The company also extends this strategic objective to contractors. All contractors are required to maximize employment opportunities for residents of Saskatchewan's north, and report employment levels to the company as a condition of the contract. Today, contractors at the Key Lake site have achieved a northern participation rate of 47%. This paper highlights strategies for increasing northern/aboriginal participation and provides several examples of successes from these initiatives. (author)

  9. Probable secondary transmission of antimicrobial-resistant Escherichia coli between people living with and without pets.

    Science.gov (United States)

    Chung, Yeon Soo; Park, Young Kyung; Park, Yong Ho; Park, Kun Taek

    2017-03-18

    Companion animals are considered as one of the reservoirs of antimicrobial-resistant (AR) bacteria that can be cross-transmitted to humans. However, limited information is available on the possibility of AR bacteria originating from companion animals being transmitted secondarily from owners to non-owners sharing the same space. To address this issue, the present study investigated clonal relatedness among AR E. coli isolated from dog owners and non-owners in the same college classroom or household. Anal samples (n=48) were obtained from 14 owners and 34 non-owners; 31 E. coli isolates were collected (nine from owners and 22 from non-owners). Of 31 E. coli, 20 isolates (64.5%) were resistant to at least one antimicrobial, and 16 isolates (51.6%) were determined as multi-drug resistant E. coli. Six isolates (19.4%) harbored integrase genes (five harbored class I integrase gene and one harbored class 2 integrase gene, respectively). Pulsed-field gel electrophoretic analysis identified three different E. coli clonal sets among isolates, indicating that cross-transmission of AR E. coli can easily occur between owners and non-owners. The findings emphasize a potential risk of spread of AR bacteria originating from pets within human communities, once they are transferred to humans. Further studies are needed to evaluate the exact risk and identify the risk factors of secondarily transmission by investigating larger numbers of isolates from pets, their owners and non-owners in a community.

  10. HIV-1 resistance dynamics in patients failing dolutegravir maintenance monotherapy.

    Science.gov (United States)

    Wijting, Ingeborg E A; Lungu, Cynthia; Rijnders, Bart J A; van der Ende, Marchina E; Pham, Hanh T; Mesplede, Thibault; Pas, Suzan D; Voermans, Jolanda J C; Schuurman, Rob; van de Vijver, David A M C; Boers, Patrick H M; Gruters, Rob A; Boucher, Charles A B; van Kampen, Jeroen J A

    2018-03-29

    A high genetic resistance barrier to the integrase-strand-transfer-inhibitor (INSTI) dolutegravir has been reported in vitro and in vivo. We describe the dynamics of INSTI-resistance-associated-mutations (INSTI-RAMs) and mutations in the 3'-polypurine tract (3'-PPT) in relation to virological failure (VF) observed in the randomized dolutegravir maintenance monotherapy study (DOMONO, NCT02401828). From ten patients with VF plasma samples prior to start cART and during VF were used to generate Sanger sequences of integrase, the 5' terminal bases of the 3'- LTR, and the 3'-PPT. Median HIV-RNA (IQR) at VF was 3,490 (1,440-4,990) c/mL. INSTI-RAMs were detected in 4/10 patients (S230R, R263K, N155H, E92Q+N155H) and in 4/10 patients no INSTI-RAMs were detected (2/10 patients integrase sequencing was unsuccessful). The time-to-VF ranged from 4 weeks to 72 weeks. In one patient, mutations developed in the highly conserved 3'-PPT. No changes in the terminal bases of the 3'-LTR were observed. The genetic barrier to resistance is too low to justify dolutegravir maintenance monotherapy as single INSTI-RAMs are sufficient to cause VF. The large variation in time-to-VF suggests that stochastic reactivation of a pre-existing provirus containing a single INSTI-RAM is the mechanism for failure. Changes in the 3'-PPT point to a new dolutegravir resistance mechanism in vivo.

  11. Rheumatic diseases in HIV-infected patients in the post-antiretroviral therapy era: a tertiary care center experience.

    Science.gov (United States)

    Parperis, Konstantinos; Abdulqader, Yasir; Myers, Robert; Bhattarai, Bikash; Al-Ani, Muhsen

    2018-04-04

    The aim of the study was to calculate the proportion of rheumatic diseases in HIV patients who were receiving ART and to identify association of the HIV medications with the development of rheumatologic diseases. We conducted a retrospective chart review during the period of 2010 to 2016. We identified 2996 patients as having chronic HIV infection and on ART, and we collected data regarding patient's demographic characteristics, comorbidities, CD 4 count, HIV viral load, and ART. One hundred thirteen out of 2996 HIV patients (3.8%) were found to have a rheumatic condition (mean age of 48.6 years, 83% male). The most frequent musculoskeletal condition was avascular necrosis (AVN) in 39 (1.3%), and the most frequent autoimmune condition was psoriasis in 28 patients (1%). Compared with the 200 HIV patients without any diagnosis of rheumatic disease were the older patients with rheumatic conditions (mean age of 48.9 vs. 42.7 years; p rheumatic conditions were 1.7 times higher in males (relative to females). Those who received integrase inhibitors were more likely (63.3%) to develop rheumatologic manifestations relative to those who never received integrase inhibitors (21.6%; p rheumatic diseases in HIV patients appears to be comparable to the prevalence in the US population. Older age, longer duration of HIV infection, and the use of ART regimens containing integrase inhibitors, appear to increase the risk of developing a rheumatic condition.

  12. Water dynamics clue to key residues in protein folding

    International Nuclear Information System (INIS)

    Gao, Meng; Zhu, Huaiqiu; Yao, Xin-Qiu; She, Zhen-Su

    2010-01-01

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  13. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  14. Metropolitan Quantum Key Distribution with Silicon Photonics

    Science.gov (United States)

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; Cai, Hong; Long, Christopher M.; Boynton, Nicholas; Martinez, Nicholas; DeRose, Christopher; Chen, Changchen; Grein, Matthew; Trotter, Douglas; Starbuck, Andrew; Pomerene, Andrew; Hamilton, Scott; Wong, Franco N. C.; Camacho, Ryan; Davids, Paul; Urayama, Junji; Englund, Dirk

    2018-04-01

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  15. Midwifery at the crossroads in Estonia: attitudes of midwives and other key stakeholders

    DEFF Research Database (Denmark)

    Lazarus, Jeffrey V; Rasch, Vibeke; Liljestrand, Jerker

    2005-01-01

    were obtained by sending a 32-question questionnaire, based on an agenda developed through semistructured interviews, to all midwives in Estonia. A nominal group technique was employed with key stakeholders to determine the extent of their agreement with the questionnaire's major findings. RESULTS......: The response rate to the questionnaire was 75%. There was no significant association between work satisfaction and independent variables of age, ethnicity, work abroad, increased responsibility, and involvement in postpartum care and counseling. There was, however, a significant association between work...... satisfaction and salary. The group process revealed that although there is no agreement on the role of family doctors and midwives in antenatal care, there is a general agreement that midwives should be more involved in postpartum care and that their tasks need to be better defined. CONCLUSIONS: Almost half...

  16. Research of user key management mechanisms in the cloud

    Directory of Open Access Journals (Sweden)

    Іван Федорович Аулов

    2016-06-01

    Full Text Available The results of comparison and recommendations on the use of existing user key management mechanisms in the cloud environment are given. New generation and installing mechanism of a private key pair between the N-means of key management in the cloud by using a modified Diffie-Hellman protocol is proposed

  17. The origins of enhanced activity in factor VIIa analogs and the interplay between key allosteric sites revealed by hydrogen exchange mass spectrometry

    DEFF Research Database (Denmark)

    Rand, Kasper D; Andersen, Mette D; Olsen, Ole H

    2008-01-01

    Factor VIIa (FVIIa) circulates in the blood in a zymogen-like state. Only upon association with membrane-bound tissue factor (TF) at the site of vascular injury does FVIIa become active and able to initiate blood coagulation. Here we used hydrogen exchange monitored by mass spectrometry to invest......Factor VIIa (FVIIa) circulates in the blood in a zymogen-like state. Only upon association with membrane-bound tissue factor (TF) at the site of vascular injury does FVIIa become active and able to initiate blood coagulation. Here we used hydrogen exchange monitored by mass spectrometry...... to investigate the conformational effects of site-directed mutagenesis at key positions in FVIIa and the origins of enhanced intrinsic activity of FVIIa analogs. The differences in hydrogen exchange of two highly active variants, FVIIa(DVQ) and FVIIa(VEAY), imply that enhanced catalytic efficiency was attained...

  18. Ranunculaceae of the Western Ukraine. І. Identification key

    Directory of Open Access Journals (Sweden)

    Andrew V. Novikoff

    2013-04-01

    Full Text Available In these paper the identification key for Ranunculaceae of Lviv, Transcarpathian (Zakarpattia, Rivne, Volhynia, Ivano-Frankivsk, Chernivtsi, Ternopil and Khmelnitsk regions (oblasts is introduced. The key includes 102 species. It is based on contemporary investigations on taxonomy of the family Ranunculaceae. The key is carried out up to the level of species but in some cases there are short remarks about subspecific structure of selected taxa. Also it is supported by short notes about distribution, ornamental usage and protection of represented species.

  19. THE KEY ROLE OF SOLAR DYNAMICS IN THE CHROMOSPHERIC HANLE POLARIZATION

    Energy Technology Data Exchange (ETDEWEB)

    Carlin, E. S.; Bianda, M., E-mail: escarlin@irsol.ch [Istituto Ricerche Solari Locarno, 6600 Locarno (Switzerland)

    2016-11-01

    The quantum theory of polarized light allows one to model scattering in the solar atmosphere for inferring its properties. This powerful approach has revealed two key long-standing problems in solar physics: the puzzling dilemmas between theory and observations in several anomalously polarized spectral lines and the need for inferring the ubiquitous weak chromospheric magnetic fields, which requires discriminating the Hanle effect in dynamic optically thick plasmas. However, the ever-present dynamics, i.e., the temporal evolution of heatings and macroscopic motions, has been widely disregarded when modeling and interpreting the scattering polarization. This has hindered a consistent theoretical solution to the puzzle while falsifying the Hanle diagnosis. Here, we show that the dynamical evolution is a keystone for solving both problems because its systematic impact allows an explanation of the observations from “anomalous” instantaneous polarization signals. Evolution accounted for, we reproduce amplitudes and (spectral and spatial) shapes of the Ca i 4227 Å polarization at solar disk center, identifying a restrictive arrangement of magnetic fields, kinematics, heatings, and spatio-temporal resolution. We find that the joint action of dynamics, Hanle effect, and low temporal resolutions mimics Zeeman linear polarization profiles, the true weak-field Zeeman signals being negligible. Our results allow reinterpretation of many polarization signals of the solar spectra and support time-dependent scattering polarization as a powerful tool for deciphering the spatio-temporal distribution of chromospheric heatings and fields. This approach may be a key aid in developing the Hanle diagnosis for the solar atmosphere.

  20. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...