WorldWideScience

Sample records for protein engineering security

  1. A Research Agenda for Security Engineering

    Directory of Open Access Journals (Sweden)

    Rich Goyette

    2013-08-01

    Full Text Available Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As cyberadversaries have become more mature, sophisticated, and disciplined in their tradecraft, the science of security engineering has not kept pace. The evidence of the erosion of our digital security – upon which society is increasingly dependent – appears in the news almost daily. In this article, we outline a research agenda designed to begin addressing this deficit and to move information system security engineering toward a mature engineering discipline. Our experience suggests that there are two key areas in which this movement should begin. First, a threat model that is actionable from the perspectives of risk management and security engineering should be developed. Second, a practical and relevant security-measurement framework should be developed to adequately inform security-engineering and risk-management processes. Advances in these areas will particularly benefit business/government risk assessors as well as security engineers performing security design work, leading to more accurate, meaningful, and quantitative risk analyses and more consistent and coherent security design decisions. Threat modelling and security measurement are challenging activities to get right – especially when they need to be applied in a general context. However, these are decisive starting points because they constitute the foundation of a scientific security-engineering practice. Addressing these challenges will require stronger and more coherent integration between the sub-disciplines of risk assessment and security engineering, including new tools to facilitate that integration. More generally, changes will be required in the way security engineering is both taught and practiced to take into account the holistic approach necessary from a mature, scientific

  2. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  3. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  4. Security Research on Engineering Database System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, ...

  5. Security Requirements Management in Software Product Line Engineering

    Science.gov (United States)

    Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.

  6. Security requirements engineering : the SI* modeling language and the Secure Tropos methodology

    NARCIS (Netherlands)

    Massacci, F.; Mylopoulos, J.; Zannone, N.; Ras, Z.W.; Tsay, L.-S.

    2010-01-01

    Security Requirements Engineering is an emerging field which lies at the crossroads of Security and Software Engineering. Much research has focused on this field in recent years, spurred by the realization that security must be dealt with in the earliest phases of the software development process as

  7. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-08-01

    The Southwest Surety Institute was formed in June 1996 by Arizona State University (ASU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL) to provide educational programs in Security Engineering, and to conduct research and development in security technologies. This is the first science-based program of its kind in the US, focused on educating Security Engineers to help government and industry address their security needs. Each member brings a unique educational capability to the Institute. NM Tech has a formidable explosives testing and evaluation facility. ASU is developing a Masters program in Security Engineering at their School of Technology located on a new campus in Mesa, Arizona. NMSU provides a Security Technology minor, merging programs in Criminal Justice and Engineering Technology. The Sandia National Laboratories security system design and evaluation process forms the basis for the Security Engineering curricula. In an effort to leverage the special capabilities of each university, distance education will be used to share courses among Institute members and eventually with other sites across the country.

  8. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  9. Security and computer forensics in web engineering education

    OpenAIRE

    Glisson, W.; Welland, R.; Glisson, L.M.

    2010-01-01

    The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web Engineering processes right from the beginning to create secure solutions and therefore security shou...

  10. Security and trust requirements engineering

    NARCIS (Netherlands)

    Giorgini, P.; Massacci, F.; Zannone, N.; Aldini, A.; Gorrieri, R.; Martinelli, F.

    2005-01-01

    Integrating security concerns throughout the whole software development process is one of today’s challenges in software and requirements engineering research. A challenge that so far has proved difficult to meet. The major difficulty is that providing security does not only require to solve

  11. Probing Enzyme-Surface Interactions via Protein Engineering and Single-Molecule Techniques

    Science.gov (United States)

    2017-06-26

    SECURITY CLASSIFICATION OF: The overall objective of this research was to exploit protein engineering and fluorescence single-molecule methods to...enhance our understanding of the interaction of proteins and surfaces. Given this objective, the specific aims of this research were to: 1) exploit the...incorporation of unnatural amino acids in proteins to introduce single-molecule probes (i.e., fluorophores for fluorescence resonance energy transfer

  12. Systems Security Engineering Capability Maturity Model SSE-CMM Model Description Document

    National Research Council Canada - National Science Library

    1999-01-01

    The Systems Security Engineering Capability Maturity Model (SSE-CMM) describes the essential characteristics of an organization's security engineering process that must exist to ensure good security engineering...

  13. Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

    National Research Council Canada - National Science Library

    Stoneburner, Gary

    2001-01-01

    The purpose of the Engineering Principles for Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system...

  14. Goal-Equivalent Secure Business Process Re-engineering

    DEFF Research Database (Denmark)

    Acosta, Hugo Andrés Lópes; Massacci, Fabio; Zannone, Nicola

    2008-01-01

    that they are somehow “equivalent”. In this paper we propose a method for passing from SI*, a modeling language for capturing and modeling functional, security, and trust organizational and system requirements, to business process specifications and vice versa. In particular, starting from an old secure business......The introduction of information technologies in health care systems often requires to re-engineer the business processes used to deliver care. Obviously, the new and re-engineered processes are observationally different and thus we cannot use existing model-based techniques to argue...... process, we reconstruct the functional and security requirements at organizational level that such a business process was supposed to meet (including the trust relations that existed among the members of the organization). To ensure that the re-engineered business process meets the elicited requirements...

  15. Model-based security engineering for the internet of things

    OpenAIRE

    NEISSE RICARDO; STERI GARY; NAI FOVINO Igor; BALDINI Gianmarco; VAN HOESEL Lodewijk

    2015-01-01

    We propose in this chapter a Model-based Security Toolkit (SecKit) and methodology to address the control and protection of user data in the deployment of the Internet of Things (IoT). This toolkit takes a more general approach for security engineering including risk analysis, establishment of aspect-specific trust relationships, and enforceable security policies. We describe the integrated metamodels used in the toolkit and the accompanying security engineering methodology for IoT systems...

  16. Spent fuel reprocessing system security engineering capability maturity model

    International Nuclear Information System (INIS)

    Liu Yachun; Zou Shuliang; Yang Xiaohua; Ouyang Zigen; Dai Jianyong

    2011-01-01

    In the field of nuclear safety, traditional work places extra emphasis on risk assessment related to technical skills, production operations, accident consequences through deterministic or probabilistic analysis, and on the basis of which risk management and control are implemented. However, high quality of product does not necessarily mean good safety quality, which implies a predictable degree of uniformity and dependability suited to the specific security needs. In this paper, we make use of the system security engineering - capability maturity model (SSE-CMM) in the field of spent fuel reprocessing, establish a spent fuel reprocessing systems security engineering capability maturity model (SFR-SSE-CMM). The base practices in the model are collected from the materials of the practice of the nuclear safety engineering, which represent the best security implementation activities, reflect the regular and basic work of the implementation of the security engineering in the spent fuel reprocessing plant, the general practices reveal the management, measurement and institutional characteristics of all process activities. The basic principles that should be followed in the course of implementation of safety engineering activities are indicated from 'what' and 'how' aspects. The model provides a standardized framework and evaluation system for the safety engineering of the spent fuel reprocessing system. As a supplement to traditional methods, this new assessment technique with property of repeatability and predictability with respect to cost, procedure and quality control, can make or improve the activities of security engineering to become a serial of mature, measurable and standard activities. (author)

  17. Security Engineering FY17 Systems Aware Cybersecurity

    Science.gov (United States)

    2017-12-07

    Security Engineering – FY17 Systems Aware Cybersecurity Technical Report SERC-2017-TR-114 December 7 2017 Principal Investigator: Dr...December 7, 2017 Copyright © 2017 Stevens Institute of Technology, Systems Engineering Research Center The Systems Engineering Research Center (SERC...supported, in whole or in part, by the U.S. Department of Defense through the Office of the Assistant Secretary of Defense for Research and Engineering (ASD

  18. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-06-01

    The Southwest Surety Institute was formed in 1996 to create unique, science-based educational programs in security engineering. The programs will integrate business, technology, and criminal justice elements to educate a new generation of security professionals. Graduates of the programs will better understand basic security system design and evaluation and contribute to strengthening of the body of knowledge in the area of security. A systematic approach incorporating people, procedures, and equipment will be taught that will emphasize basic security principles and establish the science of security engineering. The use of performance measures in the analysis of designed systems will enable effective decisions by an enterprise and provide the rationale for investment in security systems. Along with educational programs, Institute members will conduct original research and development built on existing relationships with sponsors from government and industry in areas such as counterterroism, microelectronics, banking, aviation, and sensor development. Additional information and updates on the Southwest Surety Institute are available via the Institute home page at www.emrtc.nmt.edu/ssi.

  19. Engineering Information Security The Application of Systems Engineering Concepts to Achieve Information Assurance

    CERN Document Server

    Jacobs, Stuart

    2011-01-01

    Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal,

  20. Protein engineering for metabolic engineering: current and next-generation tools

    Science.gov (United States)

    Marcheschi, Ryan J.; Gronenberg, Luisa S.; Liao, James C.

    2014-01-01

    Protein engineering in the context of metabolic engineering is increasingly important to the field of industrial biotechnology. As the demand for biologically-produced food, fuels, chemicals, food additives, and pharmaceuticals continues to grow, the ability to design and modify proteins to accomplish new functions will be required to meet the high productivity demands for the metabolism of engineered organisms. This article reviews advances of selecting, modeling, and engineering proteins to improve or alter their activity. Some of the methods have only recently been developed for general use and are just beginning to find greater application in the metabolic engineering community. We also discuss methods of generating random and targeted diversity in proteins to generate mutant libraries for analysis. Recent uses of these techniques to alter cofactor use, produce non-natural amino acids, alcohols, and carboxylic acids, and alter organism phenotypes are presented and discussed as examples of the successful engineering of proteins for metabolic engineering purposes. PMID:23589443

  1. Artificially Engineered Protein Polymers.

    Science.gov (United States)

    Yang, Yun Jung; Holmberg, Angela L; Olsen, Bradley D

    2017-06-07

    Modern polymer science increasingly requires precise control over macromolecular structure and properties for engineering advanced materials and biomedical systems. The application of biological processes to design and synthesize artificial protein polymers offers a means for furthering macromolecular tunability, enabling polymers with dispersities of ∼1.0 and monomer-level sequence control. Taking inspiration from materials evolved in nature, scientists have created modular building blocks with simplified monomer sequences that replicate the function of natural systems. The corresponding protein engineering toolbox has enabled the systematic development of complex functional polymeric materials across areas as diverse as adhesives, responsive polymers, and medical materials. This review discusses the natural proteins that have inspired the development of key building blocks for protein polymer engineering and the function of these elements in material design. The prospects and progress for scalable commercialization of protein polymers are reviewed, discussing both technology needs and opportunities.

  2. Protein engineering techniques gateways to synthetic protein universe

    CERN Document Server

    Poluri, Krishna Mohan

    2017-01-01

    This brief provides a broad overview of protein-engineering research, offering a glimpse of the most common experimental methods. It also presents various computational programs with applications that are widely used in directed evolution, computational and de novo protein design. Further, it sheds light on the advantages and pitfalls of existing methodologies and future perspectives of protein engineering techniques.

  3. Protein Engineering: Case Studies of Commercialized Engineered Products

    Science.gov (United States)

    Walsh, Gary

    2007-01-01

    Programs in biochemistry invariably encompass the principles of protein engineering. Students often display increased understanding and enthusiasm when theoretical concepts are underpinned by practical example. Herein are presented five case studies, each focusing upon a commercial protein product engineered to enhance its application-relevant…

  4. Protein design for pathway engineering.

    Science.gov (United States)

    Eriksen, Dawn T; Lian, Jiazhang; Zhao, Huimin

    2014-02-01

    Design and construction of biochemical pathways has increased the complexity of biosynthetically-produced compounds when compared to single enzyme biocatalysis. However, the coordination of multiple enzymes can introduce a complicated set of obstacles to overcome in order to achieve a high titer and yield of the desired compound. Metabolic engineering has made great strides in developing tools to optimize the flux through a target pathway, but the inherent characteristics of a particular enzyme within the pathway can still limit the productivity. Thus, judicious protein design is critical for metabolic and pathway engineering. This review will describe various strategies and examples of applying protein design to pathway engineering to optimize the flux through the pathway. The proteins can be engineered for altered substrate specificity/selectivity, increased catalytic activity, reduced mass transfer limitations through specific protein localization, and reduced substrate/product inhibition. Protein engineering can also be expanded to design biosensors to enable high through-put screening and to customize cell signaling networks. These strategies have successfully engineered pathways for significantly increased productivity of the desired product or in the production of novel compounds. Copyright © 2013 Elsevier Inc. All rights reserved.

  5. How to Compare the Security Quality Requirements Engineering (SQUARE) Method with Other Methods

    National Research Council Canada - National Science Library

    Mead, Nancy R

    2007-01-01

    The Security Quality Requirements Engineering (SQUARE) method, developed at the Carnegie Mellon Software Engineering Institute, provides a systematic way to identify security requirements in a software development project...

  6. EVALUATION OF ECONOMIC SECURITY NOVOSIBIRSK REGION (FOR EXAMPLE, A REGIONAL ENGINEERING

    Directory of Open Access Journals (Sweden)

    Lugacheva L. I.

    2014-12-01

    Full Text Available The article shows the importance of regional engineering for the Russian economy, it clarifies the factors of economic security of the Novosibirsk region (NSO. Analyzed the characteristics prevailing in the engineering industry, its competitive advantages. The research results of the export orientation of the regional engineering VAT: its direction and priorities; discusses the trends that influence the growth during the recovery has formed a new profile of its foreign economic relations. Threats identified in the development of engineering and to propose measures to overcome them to ensure the economic security of the region. The article deals with the problem-tional institutes provide for the sustainable development of regional engineering, discusses the possibility of using pub-lic-private partnerships. Sharing of risks and responsibilities between the subject of the Russian Federation, municipalities and entrepreneurs - one of the priorities in the creation of the necessary conditions for the economic security of the NSO.

  7. An ontology-based search engine for protein-protein interactions.

    Science.gov (United States)

    Park, Byungkyu; Han, Kyungsook

    2010-01-18

    Keyword matching or ID matching is the most common searching method in a large database of protein-protein interactions. They are purely syntactic methods, and retrieve the records in the database that contain a keyword or ID specified in a query. Such syntactic search methods often retrieve too few search results or no results despite many potential matches present in the database. We have developed a new method for representing protein-protein interactions and the Gene Ontology (GO) using modified Gödel numbers. This representation is hidden from users but enables a search engine using the representation to efficiently search protein-protein interactions in a biologically meaningful way. Given a query protein with optional search conditions expressed in one or more GO terms, the search engine finds all the interaction partners of the query protein by unique prime factorization of the modified Gödel numbers representing the query protein and the search conditions. Representing the biological relations of proteins and their GO annotations by modified Gödel numbers makes a search engine efficiently find all protein-protein interactions by prime factorization of the numbers. Keyword matching or ID matching search methods often miss the interactions involving a protein that has no explicit annotations matching the search condition, but our search engine retrieves such interactions as well if they satisfy the search condition with a more specific term in the ontology.

  8. Protein engineering approaches to chemical biotechnology.

    Science.gov (United States)

    Chen, Zhen; Zeng, An-Ping

    2016-12-01

    Protein engineering for the improvement of properties of biocatalysts and for the generation of novel metabolic pathways plays more and more important roles in chemical biotechnology aiming at the production of chemicals from biomass. Although widely used in single-enzyme catalysis process, protein engineering is only being increasingly explored in recent years to achieve more complex in vitro and in vivo biocatalytic processes. This review focuses on major contributions of protein engineering to chemical biotechnology in the field of multi-enzymatic cascade catalysis and metabolic engineering. Especially, we discuss and highlight recent strategies for combining pathway design and protein engineering for the production of novel products. Copyright © 2016. Published by Elsevier Ltd.

  9. Security, Privacy, and Applied Cryptography Engineering

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized...... and applications, high-performance computing in cryptology and cryptography in ubiquitous devices....

  10. Protein engineering and its applications in food industry.

    Science.gov (United States)

    Kapoor, Swati; Rafiq, Aasima; Sharma, Savita

    2017-07-24

    Protein engineering is a young discipline that has been branched out from the field of genetic engineering. Protein engineering is based on the available knowledge about the proteins structure/function(s), tools/instruments, software, bioinformatics database, available cloned gene, knowledge about available protein, vectors, recombinant strains and other materials that could lead to change in the protein backbone. Protein produced properly from genetic engineering process means a protein that is able to fold correctly and to do particular function(s) efficiently even after being subjected to engineering practices. Protein is modified through its gene or chemically. However, modification of protein through gene is easier. There is no specific limitation of Protein Engineering tools; any technique that can lead to change the protein constituent of amino acid and result in the modification of protein structure/function is in the frame of Protein Engineering. Meanwhile, there are some common tools used to reach a specific target. More active industrial and pharmaceutical based proteins have been invented by the field of Protein Engineering to introduce new function as well as to change its interaction with surrounding environment. A variety of protein engineering applications have been reported in the literature. These applications range from biocatalysis for food and industry to environmental, medical and nanobiotechnology applications. Successful combinations of various protein engineering methods had led to successful results in food industries and have created a scope to maintain the quality of finished product after processing.

  11. 40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?

    Science.gov (United States)

    2010-07-01

    ... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment ENVIRONMENTAL...) Manufacturers may request a national security exemption for engines/equipment not meeting the conditions of... applicable): (i) “THIS ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” (ii) “THIS...

  12. Financial engineering on the corporate debt securities market of Ukraine

    OpenAIRE

    Bui, T.

    2009-01-01

    The approaches to the definition of financial engineering and its methods are highlighted, advisability of application of the new securities types created on the basis of financial engineering in Ukrainian corporate financing is grounded.

  13. Unmasking the social engineer the human element of security

    CERN Document Server

    Hadnagy, Christopher

    2014-01-01

    Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the c

  14. Master planning for successful safeguard/security systems engineering

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1987-01-01

    The development and phased implementation of an overall master plan for weapons systems and facilities engaged in the complexities of high technology provides a logical road map for system accomplishment. An essential factor in such a comprehensive plan is development of an integrated systems security engineering plan. Some DOD programs use new military regulations and policy directives to mandate consideration of the safeguard/security disciplines be considered for weapons systems and facilities during the entire life cycle of the program. The emphasis is to make certain the weapon system and applicable facilities have complementary security features. Together they must meet the needs of the operational mission and, at the same time, provide the security forces practical solutions to their requirements. This paper discusses the process of meshing the safe- guards/security requirements with an overall the master plan and the challenges attendant to this activity

  15. The study on network security based on software engineering

    Science.gov (United States)

    Jia, Shande; Ao, Qian

    2012-04-01

    Developing a SP is a sensitive task because the SP itself can lead to security weaknesses if it is not conform to the security properties. Hence, appropriate techniques are necessary to overcome such problems. These techniques must accompany the policy throughout its deployment phases. The main contribution of this paper is then, the proposition of three of these activities: validation, test and multi-SP conflict management. Our techniques are inspired by the well established techniques of the software engineering for which we have found some similarities with the security domain.

  16. Introduction to current and future protein therapeutics: a protein engineering perspective.

    Science.gov (United States)

    Carter, Paul J

    2011-05-15

    Protein therapeutics and its enabling sister discipline, protein engineering, have emerged since the early 1980s. The first protein therapeutics were recombinant versions of natural proteins. Proteins purposefully modified to increase their clinical potential soon followed with enhancements derived from protein or glycoengineering, Fc fusion or conjugation to polyethylene glycol. Antibody-based drugs subsequently arose as the largest and fastest growing class of protein therapeutics. The rationale for developing better protein therapeutics with enhanced efficacy, greater safety, reduced immunogenicity or improved delivery comes from the convergence of clinical, scientific, technological and commercial drivers that have identified unmet needs and provided strategies to address them. Future protein drugs seem likely to be more extensively engineered to improve their performance, e.g., antibodies and Fc fusion proteins with enhanced effector functions or extended half-life. Two old concepts for improving antibodies, namely antibody-drug conjugates and bispecific antibodies, have advanced to the cusp of clinical success. As for newer protein therapeutic platform technologies, several engineered protein scaffolds are in early clinical development and offer differences and some potential advantages over antibodies. Copyright © 2011 Elsevier Inc. All rights reserved.

  17. Engineered Proteins: Redox Properties and Their Applications

    Science.gov (United States)

    Prabhulkar, Shradha; Tian, Hui; Wang, Xiaotang; Zhu, Jun-Jie

    2012-01-01

    Abstract Oxidoreductases and metalloproteins, representing more than one third of all known proteins, serve as significant catalysts for numerous biological processes that involve electron transfers such as photosynthesis, respiration, metabolism, and molecular signaling. The functional properties of the oxidoreductases/metalloproteins are determined by the nature of their redox centers. Protein engineering is a powerful approach that is used to incorporate biological and abiological redox cofactors as well as novel enzymes and redox proteins with predictable structures and desirable functions for important biological and chemical applications. The methods of protein engineering, mainly rational design, directed evolution, protein surface modifications, and domain shuffling, have allowed the creation and study of a number of redox proteins. This review presents a selection of engineered redox proteins achieved through these methods, resulting in a manipulation in redox potentials, an increase in electron-transfer efficiency, and an expansion of native proteins by de novo design. Such engineered/modified redox proteins with desired properties have led to a broad spectrum of practical applications, ranging from biosensors, biofuel cells, to pharmaceuticals and hybrid catalysis. Glucose biosensors are one of the most successful products in enzyme electrochemistry, with reconstituted glucose oxidase achieving effective electrical communication with the sensor electrode; direct electron-transfer-type biofuel cells are developed to avoid thermodynamic loss and mediator leakage; and fusion proteins of P450s and redox partners make the biocatalytic generation of drug metabolites possible. In summary, this review includes the properties and applications of the engineered redox proteins as well as their significance and great potential in the exploration of bioelectrochemical sensing devices. Antioxid. Redox Signal. 17, 1796–1822. PMID:22435347

  18. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  19. Integrating security issues in nuclear engineering curriculum in Indonesia. Classical vs policy approaches

    International Nuclear Information System (INIS)

    Putero, Susetyo Hario; Rosita, Widya; Sihana, Fnu; Ferdiansjah; Santosa, Haryono Budi; Muharini, Anung

    2015-01-01

    Recently, risk management for nuclear facilities becomes more complex due to security issue addressed by IAEA. The harmonization between safety, safeguards and security is still questionable. It also challenges to nuclear engineering curriculum in the world how to appropriately lecture the new issue. This paper would like to describe how to integrate this issue in developing nuclear engineering curriculum in Indonesia. Indonesia has still no nuclear power plant, but there are 3 research reactors laid in Indonesia. As addition, there are several hospitals and industries utilizing radioisotopes in their activities. The knowledge about nuclear security of their staffs is also not enough for handling radioactive material furthermore the security officers. Universitas Gadjah Mada (UGM) is the only university in Indonesia offering nuclear engineering program, as consequently the university should actively play the role in overcoming this issue not only in Indonesia, but also in Southeast Asia. In the other hand, students has to have proper knowledge in order to complete in the global nuclear industry. After visited several universities in USA and participated in INSEN meeting, we found that most of universities in the world anticipate this issue by giving the student courses related to policy (non-technical) study based on IAEA NSS 12. In the other hand, the rest just make nuclear security as a case study on their class. Furthermore, almost all of programs are graduate level. UGM decided to enhance several present related undergraduate courses with security topics as first step to develop the awareness of student to nuclear security. The next (curriculum 2016) is to integrate security topics into the entire of curriculum including designing a nuclear security elective course for undergraduate level. The first trial has successfully improved the student knowledge and awareness on nuclear security. (author)

  20. Agent of opportunity risk mitigation: people, engineering, and security efficacy.

    Science.gov (United States)

    Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R

    2010-12-01

    Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access

  1. Recombinant protein scaffolds for tissue engineering

    International Nuclear Information System (INIS)

    Werkmeister, Jerome A; Ramshaw, John A M

    2012-01-01

    New biological materials for tissue engineering are now being developed using common genetic engineering capabilities to clone and express a variety of genetic elements that allow cost-effective purification and scaffold fabrication from these recombinant proteins, peptides or from chimeric combinations of these. The field is limitless as long as the gene sequences are known. The utility is dependent on the ease, product yield and adaptability of these protein products to the biomedical field. The development of recombinant proteins as scaffolds, while still an emerging technology with respect to commercial products, is scientifically superior to current use of natural materials or synthetic polymer scaffolds, in terms of designing specific structures with desired degrees of biological complexities and motifs. In the field of tissue engineering, next generation scaffolds will be the key to directing appropriate tissue regeneration. The initial period of biodegradable synthetic scaffolds that provided shape and mechanical integrity, but no biological information, is phasing out. The era of protein scaffolds offers distinct advantages, particularly with the combination of powerful tools of molecular biology. These include, for example, the production of human proteins of uniform quality that are free of infectious agents and the ability to make suitable quantities of proteins that are found in low quantity or are hard to isolate from tissue. For the particular needs of tissue engineering scaffolds, fibrous proteins like collagens, elastin, silks and combinations of these offer further advantages of natural well-defined structural scaffolds as well as endless possibilities of controlling functionality by genetic manipulation. (topical review)

  2. Engineering Protein Hydrogels Using SpyCatcher-SpyTag Chemistry.

    Science.gov (United States)

    Gao, Xiaoye; Fang, Jie; Xue, Bin; Fu, Linglan; Li, Hongbin

    2016-09-12

    Constructing hydrogels from engineered proteins has attracted significant attention within the material sciences, owing to their myriad potential applications in biomedical engineering. Developing efficient methods to cross-link tailored protein building blocks into hydrogels with desirable mechanical, physical, and functional properties is of paramount importance. By making use of the recently developed SpyCatcher-SpyTag chemistry, we successfully engineered protein hydrogels on the basis of engineered tandem modular elastomeric proteins. Our resultant protein hydrogels are soft but stable, and show excellent biocompatibility. As the first step, we tested the use of these hydrogels as a drug carrier, as well as in encapsulating human lung fibroblast cells. Our results demonstrate the robustness of the SpyCatcher-SpyTag chemistry, even when the SpyTag (or SpyCatcher) is flanked by folded globular domains. These results demonstrate that SpyCatcher-SpyTag chemistry can be used to engineer protein hydrogels from tandem modular elastomeric proteins that can find applications in tissue engineering, in fundamental mechano-biological studies, and as a controlled drug release vehicle.

  3. Development of undergraduate nuclear security curriculum at College of Engineering, Universiti Tenaga Nasional

    Science.gov (United States)

    Hamid, Nasri A.; Mujaini, Madihah; Mohamed, Abdul Aziz

    2017-01-01

    The Center for Nuclear Energy (CNE), College of Engineering, Universiti Tenaga Nasional (UNITEN) has a great responsibility to undertake educational activities that promote developing human capital in the area of nuclear engineering and technology. Developing human capital in nuclear through education programs is necessary to support the implementation of nuclear power projects in Malaysia in the near future. In addition, the educational program must also meet the nuclear power industry needs and requirements. In developing a certain curriculum, the contents must comply with the university's Outcomes Based Education (OBE) philosophy. One of the important courses in the nuclear curriculum is in the area of nuclear security. Basically the nuclear security course covers the current issues of law, politics, military strategy, and technology with regard to weapons of mass destruction and related topics in international security, and review legal regulations and political relationship that determine the state of nuclear security at the moment. In addition, the course looks into all aspects of the nuclear safeguards, builds basic knowledge and understanding of nuclear non-proliferation, nuclear forensics and nuclear safeguards in general. The course also discusses tools used to combat nuclear proliferation such as treaties, institutions, multilateral arrangements and technology controls. In this paper, we elaborate the development of undergraduate nuclear security course at the College of Engineering, Universiti Tenaga Nasional. Since the course is categorized as mechanical engineering subject, it must be developed in tandem with the program educational objectives (PEO) of the Bachelor of Mechanical Engineering program. The course outcomes (CO) and transferrable skills are also identified. Furthermore, in aligning the CO with program outcomes (PO), the PO elements need to be emphasized through the CO-PO mapping. As such, all assessments and distribution of Bloom Taxonomy

  4. Protein engineering and the use of molecular modeling and simulation: the case of heterodimeric Fc engineering.

    Science.gov (United States)

    Spreter Von Kreudenstein, Thomas; Lario, Paula I; Dixit, Surjit B

    2014-01-01

    Computational and structure guided methods can make significant contributions to the development of solutions for difficult protein engineering problems, including the optimization of next generation of engineered antibodies. In this paper, we describe a contemporary industrial antibody engineering program, based on hypothesis-driven in silico protein optimization method. The foundational concepts and methods of computational protein engineering are discussed, and an example of a computational modeling and structure-guided protein engineering workflow is provided for the design of best-in-class heterodimeric Fc with high purity and favorable biophysical properties. We present the engineering rationale as well as structural and functional characterization data on these engineered designs. Copyright © 2013 Elsevier Inc. All rights reserved.

  5. Helping the Hacker? Library Information, Security, and Social Engineering

    Directory of Open Access Journals (Sweden)

    Samuel T. C. Thompson

    2006-12-01

    Full Text Available Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.

  6. Deep sequencing methods for protein engineering and design.

    Science.gov (United States)

    Wrenbeck, Emily E; Faber, Matthew S; Whitehead, Timothy A

    2017-08-01

    The advent of next-generation sequencing (NGS) has revolutionized protein science, and the development of complementary methods enabling NGS-driven protein engineering have followed. In general, these experiments address the functional consequences of thousands of protein variants in a massively parallel manner using genotype-phenotype linked high-throughput functional screens followed by DNA counting via deep sequencing. We highlight the use of information rich datasets to engineer protein molecular recognition. Examples include the creation of multiple dual-affinity Fabs targeting structurally dissimilar epitopes and engineering of a broad germline-targeted anti-HIV-1 immunogen. Additionally, we highlight the generation of enzyme fitness landscapes for conducting fundamental studies of protein behavior and evolution. We conclude with discussion of technological advances. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Security Engineering and Educational Initiatives for Critical Information Infrastructures

    Science.gov (United States)

    2013-06-01

    content. The curriculum development efforts are accompanied by exercises that expose students to practical tools and resources for security engineering...with relatively simple analytical features, but high pedagogical value. Information Assurance Courses Curriculum development has occurred for...tool chain and accompanying methodology confronts serious challenges posed by large heterogeneous networks (e.g., SCADA and corporate systems) from

  8. Analysis of appraisal tool of system security engineering capability maturity based on component

    International Nuclear Information System (INIS)

    Liu Zhenghai; Yang Xiaohua; Zou Shuliang; Liu Yachun; Xiao Jiantian; Liu Zhiming

    2012-01-01

    Spent Fuel Reprocessing is a part of nuclear fuel cycle and is the inevitably choice of nuclear power sustainable development. Reprocessing needs to face with radiological, criticality, chemical hazards. Besides using the tradition appraisal methods based on the security goals, it is a beneficial supplement that using the appraisal method of system security engineering capability maturity model based on the process. Experts should check and approve large numbers of documents during the appraisal based on system security engineering capability maturity model, so it is necessary that developing a tool to assist the expert to complete the appraisal. The method of developing software based on component is highly effective, nimble and reliable. Component technology is analyzed, the methods of extraction model domain components and general components is introduced, and the appraisal system is developed based on component technology. (authors)

  9. Protein engineering for biofuel production: Recent development

    Directory of Open Access Journals (Sweden)

    Nisha Singh

    2016-09-01

    Full Text Available The unstable and unsure handiness of crude oil sources moreover the rising price of fuels have shifted international efforts to utilize renewable resources for the assembly of greener energy and a replacement which might additionally meet the high energy demand of the globe. Biofuels represent a sustainable, renewable, and also the solely predictable energy supply to fossil fuels. During the green production of Biofuels, several in vivo processes place confidence in the conversion of biomass to sugars by engineered enzymes, and the subsequent conversion of sugars to chemicals via designed proteins in microbial production hosts. Enzymes are indispensable within the effort to provide fuels in an ecologically friendly manner. They have the potential to catalyze reactions with high specificity and potency while not using dangerous chemicals. Nature provides an in depth assortment of enzymes, however usually these should be altered to perform desired functions in needed conditions. Presently available enzymes like cellulose are subject to tight induction and regulation systems and additionally suffer inhibition from numerous end products. Therefore, more impregnable and economical catalyst preparations ought to be developed for the enzymatic method to be more economical. Approaches like protein engineering, reconstitution of protein mixtures and bio prospecting for superior enzymes are gaining importance. Advances in enzyme engineering allow the planning and/or directed evolution of enzymes specifically tailored for such industrial applications. Recent years have seen the production of improved enzymes to help with the conversion of biomass into fuels. The assembly of the many of those fuels is feasible due to advances in protein engineering. This review discusses the distinctive challenges that protein engineering faces in the method of changing lignocellulose to biofuels and the way they're addressed by recent advances in this field.

  10. Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks

    OpenAIRE

    Collantes, Maria I. Mera; Massad, Mohamed El; Garg, Siddharth

    2016-01-01

    With current tools and technology, someone who has physical access to a chip can extract the detailed layout of the integrated circuit (IC). By using advanced visual imaging techniques, reverse engineering can reveal details that are meant to be kept secret, such as a secure protocol or novel implementation that offers a competitive advantage. A promising solution to defend against reverse engineering attacks is IC camouflaging. In this work, we propose a new camouflaging technique based on t...

  11. Systems Security Engineering Capability Maturity Model (SSECMM), Model Description, Version 1.1

    National Research Council Canada - National Science Library

    1997-01-01

    This document is designed to acquaint the reader with the SSE-CMM Project as a whole and present the project's major work product - the Systems Security Engineering Capability Maturity Model (SSE- CMM...

  12. An Engineered Split Intein for Photoactivated Protein Trans-Splicing.

    Directory of Open Access Journals (Sweden)

    Stanley Wong

    Full Text Available Protein splicing is mediated by inteins that auto-catalytically join two separated protein fragments with a peptide bond. Here we engineered a genetically encoded synthetic photoactivatable intein (named LOVInC, by using the light-sensitive LOV2 domain from Avena sativa as a switch to modulate the splicing activity of the split DnaE intein from Nostoc punctiforme. Periodic blue light illumination of LOVInC induced protein splicing activity in mammalian cells. To demonstrate the broad applicability of LOVInC, synthetic protein systems were engineered for the light-induced reassembly of several target proteins such as fluorescent protein markers, a dominant positive mutant of RhoA, caspase-7, and the genetically encoded Ca2+ indicator GCaMP2. Spatial precision of LOVInC was demonstrated by targeting activity to specific mammalian cells. Thus, LOVInC can serve as a general platform for engineering light-based control for modulating the activity of many different proteins.

  13. Systems Security Engineering

    Science.gov (United States)

    2010-08-22

    environment that contains network- borne cybersecurity threats, an argument may be made that the firewall increases overall system functionality by reserving...the number of administered devices. This approach to security analysis is at once old and new. In the early days of eCommerce , security

  14. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  15. Engineering proteins for environmental applications

    NARCIS (Netherlands)

    Janssen, Dick B.; Schanstra, Joost P.

    1994-01-01

    Recently, significant new insight has been obtained into the structure and catalytic mechanism of enzymes that convert environmental pollutants. Recent advances in protein engineering make it possible to use this information for improving the catalytic performance of such enzymes to achieve

  16. Results in Developing an Engineering Degree Program in Safeguards and Security of Nuclear Materials at Moscow Engineering Physics Institute

    International Nuclear Information System (INIS)

    Kryuchkov, Eduard F.; Geraskin, Nikolay I.; Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.; Duncan, Cristen L.

    2007-01-01

    The world's first master's degree program in nuclear safeguards and security, established at Moscow Engineering Physics Institute (MEPhI), has now graduated nine classes of students. Most of the graduates have gone on to work at government agencies, research organizations, or obtain their PhD. In order to meet the demand for safeguards and security specialists at nuclear facilities, MEPhI established a 5-1/2 year engineering degree program that provides more hands-on training desired by facilities. In February 2004, the first students began their studies in the new discipline Nuclear Material Safeguards and Nonproliferation. This class, as well as other subsequent classes, included students who started the program in their third year of studies, as the first 2-1/2 years consists of general engineering curriculum. Fourteen students made up the first graduating class, receiving their engineering degrees in February 2007. The topics addressed in this paper include specific features of the program caused by peculiarities of Russian education legislation and government quality control of academic education. This paper summarizes the main joint actions undertaken by MEPhI and the US National Laboratories in conjunction with the U.S. Department of Energy, to develop the engineering degree program. Also discussed are the program's specific training requirements, student internships, and job placement. The paper concludes with recommendations from a recent international seminar on nonproliferation education and training

  17. Adaptive engineering management tools of enterprise economic security

    Directory of Open Access Journals (Sweden)

    G.E. Krokhicheva

    2018-06-01

    Full Text Available This paper discusses the organizational and methodological foundations and methods exploited to forecast, analyze and scale down threats and risks in the sphere of economic security, to solve the adaptation problems, to implement and to evaluate of the potency of protective measures. The object of the conducted research is associated with various economic activities of the commercial enterprises affiliated in Rostov region. A suggested model of the formation and functioning of adaptive engineering tools for managing economic security in the form of derivative balance of the enterprise resources and the sources of their formation will allow the proprietors, executive board and mana-gerial staff to obtain necessary information within the requested context regarding the enterprise vital economic interests. In addition, the paper pays attention to the methodological aspects of accounting description and estimation of the iterative achievements to meet the desired adaptation results, implemented within the framework of the described iterative algorithm aimed at ensuring strategic prediction.

  18. Security systems engineering overview

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  19. Protein consensus-based surface engineering (ProCoS): a computer-assisted method for directed protein evolution.

    Science.gov (United States)

    Shivange, Amol V; Hoeffken, Hans Wolfgang; Haefner, Stefan; Schwaneberg, Ulrich

    2016-12-01

    Protein consensus-based surface engineering (ProCoS) is a simple and efficient method for directed protein evolution combining computational analysis and molecular biology tools to engineer protein surfaces. ProCoS is based on the hypothesis that conserved residues originated from a common ancestor and that these residues are crucial for the function of a protein, whereas highly variable regions (situated on the surface of a protein) can be targeted for surface engineering to maximize performance. ProCoS comprises four main steps: ( i ) identification of conserved and highly variable regions; ( ii ) protein sequence design by substituting residues in the highly variable regions, and gene synthesis; ( iii ) in vitro DNA recombination of synthetic genes; and ( iv ) screening for active variants. ProCoS is a simple method for surface mutagenesis in which multiple sequence alignment is used for selection of surface residues based on a structural model. To demonstrate the technique's utility for directed evolution, the surface of a phytase enzyme from Yersinia mollaretii (Ymphytase) was subjected to ProCoS. Screening just 1050 clones from ProCoS engineering-guided mutant libraries yielded an enzyme with 34 amino acid substitutions. The surface-engineered Ymphytase exhibited 3.8-fold higher pH stability (at pH 2.8 for 3 h) and retained 40% of the enzyme's specific activity (400 U/mg) compared with the wild-type Ymphytase. The pH stability might be attributed to a significantly increased (20 percentage points; from 9% to 29%) number of negatively charged amino acids on the surface of the engineered phytase.

  20. Combined protein construct and synthetic gene engineering for heterologous protein expression and crystallization using Gene Composer

    Directory of Open Access Journals (Sweden)

    Walchli John

    2009-04-01

    Full Text Available Abstract Background With the goal of improving yield and success rates of heterologous protein production for structural studies we have developed the database and algorithm software package Gene Composer. This freely available electronic tool facilitates the information-rich design of protein constructs and their engineered synthetic gene sequences, as detailed in the accompanying manuscript. Results In this report, we compare heterologous protein expression levels from native sequences to that of codon engineered synthetic gene constructs designed by Gene Composer. A test set of proteins including a human kinase (P38α, viral polymerase (HCV NS5B, and bacterial structural protein (FtsZ were expressed in both E. coli and a cell-free wheat germ translation system. We also compare the protein expression levels in E. coli for a set of 11 different proteins with greatly varied G:C content and codon bias. Conclusion The results consistently demonstrate that protein yields from codon engineered Gene Composer designs are as good as or better than those achieved from the synonymous native genes. Moreover, structure guided N- and C-terminal deletion constructs designed with the aid of Gene Composer can lead to greater success in gene to structure work as exemplified by the X-ray crystallographic structure determination of FtsZ from Bacillus subtilis. These results validate the Gene Composer algorithms, and suggest that using a combination of synthetic gene and protein construct engineering tools can improve the economics of gene to structure research.

  1. PIA: An Intuitive Protein Inference Engine with a Web-Based User Interface.

    Science.gov (United States)

    Uszkoreit, Julian; Maerkens, Alexandra; Perez-Riverol, Yasset; Meyer, Helmut E; Marcus, Katrin; Stephan, Christian; Kohlbacher, Oliver; Eisenacher, Martin

    2015-07-02

    Protein inference connects the peptide spectrum matches (PSMs) obtained from database search engines back to proteins, which are typically at the heart of most proteomics studies. Different search engines yield different PSMs and thus different protein lists. Analysis of results from one or multiple search engines is often hampered by different data exchange formats and lack of convenient and intuitive user interfaces. We present PIA, a flexible software suite for combining PSMs from different search engine runs and turning these into consistent results. PIA can be integrated into proteomics data analysis workflows in several ways. A user-friendly graphical user interface can be run either locally or (e.g., for larger core facilities) from a central server. For automated data processing, stand-alone tools are available. PIA implements several established protein inference algorithms and can combine results from different search engines seamlessly. On several benchmark data sets, we show that PIA can identify a larger number of proteins at the same protein FDR when compared to that using inference based on a single search engine. PIA supports the majority of established search engines and data in the mzIdentML standard format. It is implemented in Java and freely available at https://github.com/mpc-bioinformatics/pia.

  2. Security systems engineering overview

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.)

  3. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  4. Creation of security engineering programs by the Southwest Surety Institute

    Science.gov (United States)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  5. Fn3 proteins engineered to recognize tumor biomarker mesothelin internalize upon binding.

    Directory of Open Access Journals (Sweden)

    Allison R Sirois

    Full Text Available Mesothelin is a cell surface protein that is overexpressed in numerous cancers, including breast, ovarian, lung, liver, and pancreatic tumors. Aberrant expression of mesothelin has been shown to promote tumor progression and metastasis through interaction with established tumor biomarker CA125. Therefore, molecules that specifically bind to mesothelin have potential therapeutic and diagnostic applications. However, no mesothelin-targeting molecules are currently approved for routine clinical use. While antibodies that target mesothelin are in development, some clinical applications may require a targeting molecule with an alternative protein fold. For example, non-antibody proteins are more suitable for molecular imaging and may facilitate diverse chemical conjugation strategies to create drug delivery complexes. In this work, we engineered variants of the fibronectin type III domain (Fn3 non-antibody protein scaffold to bind to mesothelin with high affinity, using directed evolution and yeast surface display. Lead engineered Fn3 variants were solubly produced and purified from bacterial culture at high yield. Upon specific binding to mesothelin on human cancer cell lines, the engineered Fn3 proteins internalized and co-localized to early endosomes. To our knowledge, this is the first report of non-antibody proteins engineered to bind mesothelin. The results validate that non-antibody proteins can be engineered to bind to tumor biomarker mesothelin, and encourage the continued development of engineered variants for applications such as targeted diagnostics and therapeutics.

  6. Integrating protein engineering with process design for biocatalysis

    DEFF Research Database (Denmark)

    Woodley, John M.

    2017-01-01

    Biocatalysis uses enzymes for chemical synthesis and production, offering selective, safe and sustainable catalysis. While today the majority of applications are in the pharmaceutical sector, new opportunities are arising every day in other industry sectors, where production costs become a more...... important driver. In the early applications of the technology, it was necessary to design processes to match the properties of the biocatalyst. With the advent of protein engineering, organic chemists started to develop and improve enzymes to suit their needs. Likewise in industry, although not widespread......, a new paradigm was already implemented several years ago to engineer enzymes to suit process needs. Today, a new era is entered, where the effectiveness with which such integrated protein and process engineering is achieved becomes critical to implementation. In this paper, the development of a tool...

  7. Security engineering a guide to building dependable distributed systems

    CERN Document Server

    Anderson, Ross

    2008-01-01

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

  8. The development and application of engineered proteins for bioremediation

    Energy Technology Data Exchange (ETDEWEB)

    Trewhella, J. [ed.

    1995-09-26

    Clean up of the toxic legacy of the Cold War is projected to be the most expensive domestic project the nation has yet undertaken. Remediation of the Department of Energy and Department of Defense toxic waste sites alone are projected to cost {approximately}$1 trillion over a 20-30 year period. New, cost effective technologies are needed to attack this enormous problem. Los Alamos has put together a cross-divisional team of scientist to develop science based bioremediation technology to work toward this goal. In the team we have expertise in: (1) molecular, ecosystem and transport modeling; (2) genetic and protein engineering; (3) microbiology and microbial ecology; (4) structural biology; and (5) bioinorganic chemistry. This document summarizes talks at a workshop of different aspects of bioremediation technology including the following: Introducing novel function into a Heme enzyme: engineering by excavation; cytochrome P-450: ideal systems for bioremediation?; selection and development of bacterial strains for in situ remediation of cholorinated solvents; genetic analysis and preparation of toluene ortho-monooxygenase for field application in remediation of trichloroethylene; microbial ecology and diversity important to bioremediation; engineering haloalkane dehalogenase for bioremediation; enzymes for oxidative biodegradation; indigenous bacteria as hosts for engineered proteins; performance of indigenous bacterial, hosting engineered proteins in microbial communities.

  9. Process Security in Chemical Engineering Education

    Science.gov (United States)

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  10. Protein engineering in designing tailored enzymes and microorganisms for biofuels production

    Science.gov (United States)

    Wen, Fei; Nair, Nikhil U; Zhao, Huimin

    2009-01-01

    Summary Lignocellulosic biofuels represent a sustainable, renewable, and the only foreseeable alternative energy source to transportation fossil fuels. However, the recalcitrant nature of lignocellulose poses technical hurdles to an economically viable biorefinery. Low enzymatic hydrolysis efficiency and low productivity, yield, and titer of biofuels are among the top cost contributors. Protein engineering has been used to improve the performances of lignocellulose-degrading enzymes, as well as proteins involved in biofuel synthesis pathways. Unlike its great success seen in other industrial applications, protein engineering has achieved only modest results in improving the lignocellulose-to-biofuels efficiency. This review will discuss the unique challenges that protein engineering faces in the process of converting lignocellulose to biofuels and how they are addressed by recent advances in this field. PMID:19660930

  11. Genetic engineering of crops: a ray of hope for enhanced food security.

    Science.gov (United States)

    Gill, Sarvajeet Singh; Gill, Ritu; Tuteja, Renu; Tuteja, Narendra

    2014-01-01

    Crop improvement has been a basic and essential chase since organized cultivation of crops began thousands of years ago. Abiotic stresses as a whole are regarded as the crucial factors restricting the plant species to reach their full genetic potential to deliver desired productivity. The changing global climatic conditions are making them worse and pointing toward food insecurity. Agriculture biotechnology or genetic engineering has allowed us to look into and understand the complex nature of abiotic stresses and measures to improve the crop productivity under adverse conditions. Various candidate genes have been identified and transformed in model plants as well as agriculturally important crop plants to develop abiotic stress-tolerant plants for crop improvement. The views presented here are an attempt toward realizing the potential of genetic engineering for improving crops to better tolerate abiotic stresses in the era of climate change, which is now essential for global food security. There is great urgency in speeding up crop improvement programs that can use modern biotechnological tools in addition to current breeding practices for providing enhanced food security.

  12. Security engineering: systems engineering of security through the adaptation and application of risk management

    Science.gov (United States)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  13. Use of a protein engineering strategy to overcome limitations in the production of "Difficult to Express" recombinant proteins.

    Science.gov (United States)

    Hussain, Hirra; Fisher, David I; Abbott, W Mark; Roth, Robert G; Dickson, Alan J

    2017-10-01

    Certain recombinant proteins are deemed "difficult to express" in mammalian expression systems requiring significant cell and/or process engineering to abrogate expression bottlenecks. With increasing demand for the production of recombinant proteins in mammalian cells, low protein yields can have significant consequences for industrial processes. To investigate the molecular mechanisms that restrict expression of recombinant proteins, naturally secreted model proteins were analyzed from the tissue inhibitors of metalloproteinase (TIMP) protein family. In particular, TIMP-2 and TIMP-3 were subjected to detailed study. TIMP proteins share significant sequence homology (∼50% identity and ∼70% similarity in amino acid sequence). However, they show marked differences in secretion in mammalian expression systems despite this extensive sequence homology. Using these two proteins as models, this study characterized the molecular mechanisms responsible for poor recombinant protein production. Our results reveal that both TIMP-2 and TIMP-3 are detectable at mRNA and protein level within the cell but only TIMP-2 is secreted effectively into the extracellular medium. Analysis of protein localization and the nature of intracellular protein suggest TIMP-3 is severely limited in its post-translational processing. To overcome this challenge, modification of the TIMP-3 sequence to include a furin protease-cleavable pro-sequence resulted in secretion of the modified TIMP-3 protein, however, incomplete processing was observed. Based on the TIMP-3 data, the protein engineering approach was optimized and successfully applied in combination with cell engineering, the overexpression of furin, to another member of the TIMP protein family (the poorly expressed TIMP-4). Use of the described protein engineering strategy resulted in successful secretion of poorly (TIMP-4) and non-secreted (TIMP-3) targets, and presents a novel strategy to enhance the production of "difficult" recombinant

  14. Protein design in systems metabolic engineering for industrial strain development.

    Science.gov (United States)

    Chen, Zhen; Zeng, An-Ping

    2013-05-01

    Accelerating the process of industrial bacterial host strain development, aimed at increasing productivity, generating new bio-products or utilizing alternative feedstocks, requires the integration of complementary approaches to manipulate cellular metabolism and regulatory networks. Systems metabolic engineering extends the concept of classical metabolic engineering to the systems level by incorporating the techniques used in systems biology and synthetic biology, and offers a framework for the development of the next generation of industrial strains. As one of the most useful tools of systems metabolic engineering, protein design allows us to design and optimize cellular metabolism at a molecular level. Here, we review the current strategies of protein design for engineering cellular synthetic pathways, metabolic control systems and signaling pathways, and highlight the challenges of this subfield within the context of systems metabolic engineering. Copyright © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. A real-time all-atom structural search engine for proteins.

    Science.gov (United States)

    Gonzalez, Gabriel; Hannigan, Brett; DeGrado, William F

    2014-07-01

    Protein designers use a wide variety of software tools for de novo design, yet their repertoire still lacks a fast and interactive all-atom search engine. To solve this, we have built the Suns program: a real-time, atomic search engine integrated into the PyMOL molecular visualization system. Users build atomic-level structural search queries within PyMOL and receive a stream of search results aligned to their query within a few seconds. This instant feedback cycle enables a new "designability"-inspired approach to protein design where the designer searches for and interactively incorporates native-like fragments from proven protein structures. We demonstrate the use of Suns to interactively build protein motifs, tertiary interactions, and to identify scaffolds compatible with hot-spot residues. The official web site and installer are located at http://www.degradolab.org/suns/ and the source code is hosted at https://github.com/godotgildor/Suns (PyMOL plugin, BSD license), https://github.com/Gabriel439/suns-cmd (command line client, BSD license), and https://github.com/Gabriel439/suns-search (search engine server, GPLv2 license).

  16. Trans-species Engineering of Glycosylated Therapeutic Proteins

    DEFF Research Database (Denmark)

    Yang, Zhang

    important to address. Whenever glycosylation has been found to be an important PTM for function or bioactivity, human therapeutics have generally been produced in mammalian Chinese hamster ovary (CHO) cell line. Oglycosylation is one of the most complex regulated PTMs of proteins but also one of the least...... understood. Currently, mammalian cells are required for human O-glycosylation. Increasing efforts have been devoted to engineering non-mammalian cells for production of recombinant proteins with “human-like” glycosylation. Substantial success has been achieved with designed N-glycosylation in both lower......Recombinant expression of therapeutic proteins is one of the major tasks in modern biomedicine. One of the most important factors with respect to therapeutic use in human is posttranslational modifications (PTMs) of the recombinant proteins, of which protein glycosylation is by far the most...

  17. Lentiviral Delivery of Proteins for Genome Engineering.

    Science.gov (United States)

    Cai, Yujia; Mikkelsen, Jacob Giehm

    2016-01-01

    Viruses have evolved to traverse cellular barriers and travel to the nucleus by mechanisms that involve active transport through the cytoplasm and viral quirks to resist cellular restriction factors and innate immune responses. Virus-derived vector systems exploit the capacity of viruses to ferry genetic information into cells, and now - more than three decades after the discovery of HIV - lentiviral vectors based on HIV-1 have become instrumental in biomedical research and gene therapies that require genomic insertion of transgenes. By now, the efficacy of lentiviral gene delivery to stem cells, cells of the immune system including T cells, hepatic cells, and many other therapeutically relevant cell types is well established. Along with nucleic acids, HIV-1 virions carry the enzymatic tools that are essential for early steps of infection. Such capacity to package enzymes, even proteins of nonviral origin, has unveiled new ways of exploiting cellular intrusion of HIV-1. Based on early findings demonstrating the packaging of heterologous proteins into virus particles as part of the Gag and GagPol polypeptides, we have established lentiviral protein transduction for delivery of DNA transposases and designer nucleases. This strategy for delivering genome-engineering proteins facilitates high enzymatic activity within a short time frame and may potentially improve the safety of genome editing. Exploiting the full potential of lentiviral vectors, incorporation of foreign protein can be combined with the delivery of DNA transposons or a donor sequence for homology-directed repair in so-called 'all-in-one' lentiviral vectors. Here, we briefly describe intracellular restrictions that may affect lentiviral gene and protein delivery and review the current status of lentiviral particles as carriers of tool kits for genome engineering.

  18. Production of biopharmaceutical proteins by yeast: Advances through metabolic engineering

    DEFF Research Database (Denmark)

    Nielsen, Jens

    2013-01-01

    Production of recombinant proteins for use as pharmaceuticals, so-called biopharmaceuticals, is a multi-billion dollar industry. Many different cell factories are used for the production of biopharmaceuticals, but the yeast Saccharomyces cerevisiae is an important cell factory as it is used for p...... production. The involvement of directed metabolic engineering through the integration of tools from genetic engineering, systems biology and mathematical modeling, is also discussed....... by yeast are human serum albumin, hepatitis vaccines and virus like particles used for vaccination against human papillomavirus. Here is given a brief overview of biopharmaceutical production by yeast and it is discussed how the secretory pathway can be engineered to ensure more efficient protein...

  19. Biotechnology Conference: Protein Engineering Held in Oxford, United Kingdom on 5-8 April 1987.

    Science.gov (United States)

    1987-07-27

    engineered by protein engineering was reported by J. new variants which are now being checked. Brange (Novo Research Institute, Bags- Studies of a cassette...to Brange . Therefore, multidomain protein consisting of five Brange and his group applied protein en- putative domains: the fribonectin finger

  20. Biomineralization of Engineered Spider Silk Protein-Based Composite Materials for Bone Tissue Engineering

    Directory of Open Access Journals (Sweden)

    John G. Hardy

    2016-07-01

    Full Text Available Materials based on biodegradable polyesters, such as poly(butylene terephthalate (PBT or poly(butylene terephthalate-co-poly(alkylene glycol terephthalate (PBTAT, have potential application as pro-regenerative scaffolds for bone tissue engineering. Herein, the preparation of films composed of PBT or PBTAT and an engineered spider silk protein, (eADF4(C16, that displays multiple carboxylic acid moieties capable of binding calcium ions and facilitating their biomineralization with calcium carbonate or calcium phosphate is reported. Human mesenchymal stem cells cultured on films mineralized with calcium phosphate show enhanced levels of alkaline phosphatase activity suggesting that such composites have potential use for bone tissue engineering.

  1. Engineering safe and secure cyber-physical systems the specification PEARL approach

    CERN Document Server

    Gumzej, Roman

    2016-01-01

    This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels.

  2. Securing Sensitive Flight and Engine Simulation Data Using Smart Card Technology

    Science.gov (United States)

    Blaser, Tammy M.

    2003-01-01

    NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.

  3. Integrating the protein and metabolic engineering toolkits for next-generation chemical biosynthesis.

    Science.gov (United States)

    Pirie, Christopher M; De Mey, Marjan; Jones Prather, Kristala L; Ajikumar, Parayil Kumaran

    2013-04-19

    Through microbial engineering, biosynthesis has the potential to produce thousands of chemicals used in everyday life. Metabolic engineering and synthetic biology are fields driven by the manipulation of genes, genetic regulatory systems, and enzymatic pathways for developing highly productive microbial strains. Fundamentally, it is the biochemical characteristics of the enzymes themselves that dictate flux through a biosynthetic pathway toward the product of interest. As metabolic engineers target sophisticated secondary metabolites, there has been little recognition of the reduced catalytic activity and increased substrate/product promiscuity of the corresponding enzymes compared to those of central metabolism. Thus, fine-tuning these enzymatic characteristics through protein engineering is paramount for developing high-productivity microbial strains for secondary metabolites. Here, we describe the importance of protein engineering for advancing metabolic engineering of secondary metabolism pathways. This pathway integrated enzyme optimization can enhance the collective toolkit of microbial engineering to shape the future of chemical manufacturing.

  4. Residue-specific incorporation of noncanonical amino acids for protein engineering

    NARCIS (Netherlands)

    van Eldijk, Mark B.; van Hest, Jan C.M.; Lemke, E.A.

    2018-01-01

    The incorporation of noncanonical amino acids has given protein chemists access to an expanded repertoire of amino acids. This methodology has significantly broadened the scope of protein engineering allowing introduction of amino acids with non-native functionalities, such as bioorthogonal reactive

  5. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  6. Protein Engineering for Nicotinamide Coenzyme Specificity in Oxidoreductases: Attempts and Challenges.

    Science.gov (United States)

    Chánique, Andrea M; Parra, Loreto P

    2018-01-01

    Oxidoreductases are ubiquitous enzymes that catalyze an extensive range of chemical reactions with great specificity, efficiency, and selectivity. Most oxidoreductases are nicotinamide cofactor-dependent enzymes with a strong preference for NADP or NAD. Because these coenzymes differ in stability, bioavailability and costs, the enzyme preference for a specific coenzyme is an important issue for practical applications. Different approaches for the manipulation of coenzyme specificity have been reported, with different degrees of success. Here we present various attempts for the switching of nicotinamide coenzyme preference in oxidoreductases by protein engineering. This review covers 103 enzyme engineering studies from 82 articles and evaluates the accomplishments in terms of coenzyme specificity and catalytic efficiency compared to wild type enzymes of different classes. We analyzed different protein engineering strategies and related them with the degree of success in inverting the cofactor specificity. In general, catalytic activity is compromised when coenzyme specificity is reversed, however when switching from NAD to NADP, better results are obtained. In most of the cases, rational strategies were used, predominantly with loop exchange generating the best results. In general, the tendency of removing acidic residues and incorporating basic residues is the strategy of choice when trying to change specificity from NAD to NADP, and vice versa . Computational strategies and algorithms are also covered as helpful tools to guide protein engineering strategies. This mini review aims to give a general introduction to the topic, giving an overview of tools and information to work in protein engineering for the reversal of coenzyme specificity.

  7. Functional Security Model: Managers Engineers Working Together

    Science.gov (United States)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  8. A rapid, ensemble and free energy based method for engineering protein stabilities.

    Science.gov (United States)

    Naganathan, Athi N

    2013-05-02

    Engineering the conformational stabilities of proteins through mutations has immense potential in biotechnological applications. It is, however, an inherently challenging problem given the weak noncovalent nature of the stabilizing interactions. In this regard, we present here a robust and fast strategy to engineer protein stabilities through mutations involving charged residues using a structure-based statistical mechanical model that accounts for the ensemble nature of folding. We validate the method by predicting the absolute changes in stability for 138 experimental mutations from 16 different proteins and enzymes with a correlation of 0.65 and importantly with a success rate of 81%. Multiple point mutants are predicted with a higher success rate (90%) that is validated further by comparing meosphile-thermophile protein pairs. In parallel, we devise a methodology to rapidly engineer mutations in silico which we benchmark against experimental mutations of ubiquitin (correlation of 0.95) and check for its feasibility on a larger therapeutic protein DNase I. We expect the method to be of importance as a first and rapid step to screen for protein mutants with specific stability in the biotechnology industry, in the construction of stability maps at the residue level (i.e., hot spots), and as a robust tool to probe for mutations that enhance the stability of protein-based drugs.

  9. Thermal green protein, an extremely stable, nonaggregating fluorescent protein created by structure-guided surface engineering.

    Science.gov (United States)

    Close, Devin W; Paul, Craig Don; Langan, Patricia S; Wilce, Matthew C J; Traore, Daouda A K; Halfmann, Randal; Rocha, Reginaldo C; Waldo, Geoffery S; Payne, Riley J; Rucker, Joseph B; Prescott, Mark; Bradbury, Andrew R M

    2015-07-01

    In this article, we describe the engineering and X-ray crystal structure of Thermal Green Protein (TGP), an extremely stable, highly soluble, non-aggregating green fluorescent protein. TGP is a soluble variant of the fluorescent protein eCGP123, which despite being highly stable, has proven to be aggregation-prone. The X-ray crystal structure of eCGP123, also determined within the context of this paper, was used to carry out rational surface engineering to improve its solubility, leading to TGP. The approach involved simultaneously eliminating crystal lattice contacts while increasing the overall negative charge of the protein. Despite intentional disruption of lattice contacts and introduction of high entropy glutamate side chains, TGP crystallized readily in a number of different conditions and the X-ray crystal structure of TGP was determined to 1.9 Å resolution. The structural reasons for the enhanced stability of TGP and eCGP123 are discussed. We demonstrate the utility of using TGP as a fusion partner in various assays and significantly, in amyloid assays in which the standard fluorescent protein, EGFP, is undesirable because of aberrant oligomerization. © 2014 Wiley Periodicals, Inc.

  10. Engineered Proteins Program Mammalian Cells to Target Inflammatory Disease Sites.

    Science.gov (United States)

    Qudrat, Anam; Mosabbir, Abdullah Al; Truong, Kevin

    2017-06-22

    Disease sites in atherosclerosis and cancer feature cell masses (e.g., plaques/tumors), a low pH extracellular microenvironment, and various pro-inflammatory cytokines such as tumor necrosis factor α (TNFα). The ability to engineer a cell to seek TNFα sources allows for targeted therapeutic delivery. To accomplish this, here we introduced a system of proteins: an engineered TNFα chimeric receptor (named TNFR1chi), a previously engineered Ca 2+ -activated RhoA (named CaRQ), vesicular stomatitis virus glycoprotein G (VSVG), and thymidine kinase. Upon binding TNFα, TNFR1chi generates a Ca 2+ signal that in turn activates CaRQ-mediated non-apoptotic blebs that allow migration toward the TNFα source. Next, the addition of VSVG, upon low pH induction, causes membrane fusion of the engineered and TNFα source cells. Finally, after ganciclovir treatment cells undergo death via the thymidine kinase suicide mechanism. Hence, we assembled a system of proteins that forms the basis of engineering a cell to target inflammatory disease sites characterized by TNFα secretion and a low-pH microenvironment. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Genome engineering for improved recombinant protein expression in Escherichia coli.

    Science.gov (United States)

    Mahalik, Shubhashree; Sharma, Ashish K; Mukherjee, Krishna J

    2014-12-19

    A metabolic engineering perspective which views recombinant protein expression as a multistep pathway allows us to move beyond vector design and identify the downstream rate limiting steps in expression. In E.coli these are typically at the translational level and the supply of precursors in the form of energy, amino acids and nucleotides. Further recombinant protein production triggers a global cellular stress response which feedback inhibits both growth and product formation. Countering this requires a system level analysis followed by a rational host cell engineering to sustain expression for longer time periods. Another strategy to increase protein yields could be to divert the metabolic flux away from biomass formation and towards recombinant protein production. This would require a growth stoppage mechanism which does not affect the metabolic activity of the cell or the transcriptional or translational efficiencies. Finally cells have to be designed for efficient export to prevent buildup of proteins inside the cytoplasm and also simplify downstream processing. The rational and the high throughput strategies that can be used for the construction of such improved host cell platforms for recombinant protein expression is the focus of this review.

  12. Engineered proteins with PUF scaffold to manipulate RNA metabolism

    Science.gov (United States)

    Wang, Yang; Wang, Zefeng; Tanaka Hall, Traci M.

    2013-01-01

    Pumilio/fem-3 mRNA binding factor (FBF) proteins are characterized by a sequence-specific RNA-binding domain. This unique single-stranded RNA recognition module, whose sequence specificity can be reprogrammed, has been fused with functional modules to engineer protein factors with various functions. Here we summarize the advancement in developing RNA regulatory tools and opportunities for the future. PMID:23731364

  13. MODEL-BASED SECURITY ENGINEERING OF SOA SYSTEM USING SECURITY INTENT DSL

    OpenAIRE

    Muhammad Qaiser Saleem; Jafreezal Jaafar; Mohd Fadzil Hassan

    2011-01-01

    Currently most of the enterprises are using SOA and web services technologies to build their web information system. They are using MDA principles for design and development of WIS and using UML as a modelling language for business process modelling. Along with the increased connectivity in SOA environment, security risks rise exponentially. Security is not defined during the early phases of development and left onto developer. Properly configuring security requirements in SOA applications is...

  14. An adaptive algorithm for performance assessment of construction project management with respect to resilience engineering and job security

    Directory of Open Access Journals (Sweden)

    P. Hashemi

    2018-01-01

    Full Text Available Construction sites are accident-prone locations and therefore safety management plays an im-portant role in these workplaces. This study presents an adaptive algorithm for performance as-sessment of project management with respect to resilience engineering and job security in a large construction site. The required data are collected using questionnaires in a large construction site. The presented algorithm is composed of radial basis function (RBF, artificial neural networks multi-layer perceptron (ANN-MLP, and statistical tests. The results indicate that preparedness, fault-tolerance, and flexibility are the most effective factors on overall efficiency. Moreover, job security and resilience engineering have similar statistical impacts on overall system efficiency. The results are verified and validated by the proposed algorithm.

  15. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation

    NARCIS (Netherlands)

    Massacci, F.; Prest, M.; Zannone, N.

    2005-01-01

    Extending Requirements Engineering modelling and formal analysis methodologies to cope with Security Requirements has been a major effort in the past decade. Yet, only few works describe complex case studies that show the ability of the informal and formal approaches to cope with the level

  16. Engineering Synthetic Proteins to Generate Ca2+ Signals in Mammalian Cells.

    Science.gov (United States)

    Qudrat, Anam; Truong, Kevin

    2017-03-17

    The versatility of Ca 2+ signals allows it to regulate diverse cellular processes such as migration, apoptosis, motility and exocytosis. In some receptors (e.g., VEGFR2), Ca 2+ signals are generated upon binding their ligand(s) (e.g., VEGF-A). Here, we employed a design strategy to engineer proteins that generate a Ca 2+ signal upon binding various extracellular stimuli by creating fusions of protein domains that oligomerize to the transmembrane domain and the cytoplasmic tail of the VEGFR2. To test the strategy, we created chimeric proteins that generate Ca 2+ signals upon stimulation with various extracellular stimuli (e.g., rapamycin, EDTA or extracellular free Ca 2+ ). By coupling these chimeric proteins that generate Ca 2+ signals with proteins that respond to Ca 2+ signals, we rewired, for example, dynamic cellular blebbing to increases in extracellular free Ca 2+ . Thus, using this design strategy, it is possible to engineer proteins to generate a Ca 2+ signal to rewire a wide range of extracellular stimuli to a wide range of Ca 2+ -activated processes.

  17. ProtaBank: A repository for protein design and engineering data.

    Science.gov (United States)

    Wang, Connie Y; Chang, Paul M; Ary, Marie L; Allen, Benjamin D; Chica, Roberto A; Mayo, Stephen L; Olafson, Barry D

    2018-03-25

    We present ProtaBank, a repository for storing, querying, analyzing, and sharing protein design and engineering data in an actively maintained and updated database. ProtaBank provides a format to describe and compare all types of protein mutational data, spanning a wide range of properties and techniques. It features a user-friendly web interface and programming layer that streamlines data deposition and allows for batch input and queries. The database schema design incorporates a standard format for reporting protein sequences and experimental data that facilitates comparison of results across different data sets. A suite of analysis and visualization tools are provided to facilitate discovery, to guide future designs, and to benchmark and train new predictive tools and algorithms. ProtaBank will provide a valuable resource to the protein engineering community by storing and safeguarding newly generated data, allowing for fast searching and identification of relevant data from the existing literature, and exploring correlations between disparate data sets. ProtaBank invites researchers to contribute data to the database to make it accessible for search and analysis. ProtaBank is available at https://protabank.org. © 2018 The Authors Protein Science published by Wiley Periodicals, Inc. on behalf of The Protein Society.

  18. Coupling ligand recognition to protein folding in an engineered variant of rabbit ileal lipid binding protein.

    Science.gov (United States)

    Kouvatsos, Nikolaos; Meldrum, Jill K; Searle, Mark S; Thomas, Neil R

    2006-11-28

    We have engineered a variant of the beta-clam shell protein ILBP which lacks the alpha-helical motif that caps the central binding cavity; the mutant protein is sufficiently destabilised that it is unfolded under physiological conditions, however, it unexpectedly binds its natural bile acid substrates with high affinity forming a native-like beta-sheet rich structure and demonstrating strong thermodynamic coupling between ligand binding and protein folding.

  19. Novel blood protein based scaffolds for cardiovascular tissue engineering

    Directory of Open Access Journals (Sweden)

    Kuhn Antonia I.

    2016-09-01

    Full Text Available A major challenge in cardiovascular tissue engineering is the fabrication of scaffolds, which provide appropriate morphological and mechanical properties while avoiding undesirable immune reactions. In this study electrospinning was used to fabricate scaffolds out of blood proteins for cardiovascular tissue engineering. Lyophilised porcine plasma was dissolved in deionised water at a final concentration of 7.5% m/v and blended with 3.7% m/v PEO. Electrospinning resulted in homogeneous fibre morphologies with a mean fibre diameter of 151 nm, which could be adapted to create macroscopic shapes (mats, tubes. Cross-linking with glutaraldehyde vapour improved the long-term stability of protein based scaffolds in comparison to untreated scaffolds, resulting in a mass loss of 41% and 96% after 28 days of incubation in aqueous solution, respectively.

  20. Engineering self-assembled bioreactors from protein microcompartments

    Energy Technology Data Exchange (ETDEWEB)

    Savage, David [Univ. of California, Berkeley, CA (United States)

    2016-10-12

    The goals of this research are to understand how organisms such as bacteria segregate certain metabolic processes inside of specific structures, or “microcompartments,” in the cell and apply this knowledge to develop novel engineered microcompartments for use in nanotechnology and metabolic engineering. For example, in some bacteria, self-assembling protein microcompartments called carboxysomes encapsulate the enzymes involved in carbon fixation, enabling the cell to utilize carbon dioxide more effectively than if the enzymes were free in the cell. The proposed research will determine how structures such as carboxysomes assemble and function in bacteria and develop a means for creating novel, synthetic microcompartments for optimizing production of specific energy-rich compounds.

  1. Efficient expression of SRK intracellular domain by a modeling-based protein engineering.

    Science.gov (United States)

    Murase, Kohji; Hirano, Yoshinori; Takayama, Seiji; Hakoshima, Toshio

    2017-03-01

    S-locus protein kinase (SRK) is a receptor kinase that plays a critical role in self-recognition in the Brassicaceae self-incompatibility (SI) response. SRK is activated by binding of its ligand S-locus protein 11 (SP11) and subsequently induced phosphorylation of the intracellular kinase domain. However, a detailed activation mechanism of SRK is still largely unknown because of the difficulty in stably expressing SRK recombinant proteins. Here, we performed modeling-based protein engineering of the SRK kinase domain for stable expression in Escherichia coli. The engineered SRK intracellular domain was expressed about 54-fold higher production than wild type SRK, without loss of the kinase activity, suggesting it could be useful for further biochemical and structural studies. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  3. Engineering protein scaffolds for protein separation, biocatalysis and nanotechnology applications

    Science.gov (United States)

    Liu, Fang

    Globally, there is growing appreciation for developing a sustainable economy that uses eco-efficient bio-processes. Biotechnology provides an increasing range of tools for industry to help reduce cost and improve environmental performance. Inspired by the naturally evolved machineries of protein scaffolds and their binding ligands, synthetic protein scaffolds were engineered based on cohesin-dockerin interactions and metal chelating peptides to tackle the challenges and make improvements in three specific areas: (1) protein purification, (2) biofuel cells, and (3) nanomaterial synthesis. The first objective was to develop efficient and cost-effective non-chromatographic purification processes to purify recombinant proteins in an effort to meet the dramatically growing market of protein drugs. In our design, the target protein was genetically fused with a dockerin domain from Clostridium thermocellum and direct purification and recovery was achieved using thermo-responsive elastin-like polypeptide (ELP) scaffold containing the cohesin domain from the same species. By exploiting the highly specific interaction between the dockerin and cohesin domain and the reversible aggregation property of ELP, highly purified and active dockerin-tagged proteins, such as endoglucanase CelA, chloramphenicol acetyl transferase (CAT) and enhanced green fluorescence protein (EGFP), were recovered directly from crude cell extracts in a single purification step with yields achieving over 90%. Incorporation of a self-cleaving intein domain enabled rapid removal of the affinity tag from the target proteins by another cycle of thermal precipitation. The purification cost can be further reduced by regenerating and recycling the ELP-cohesin capturing scaffolds. However, due to the high binding affinity between cohesin and dockerin domains, the bound dockerin-intein tag cannot be completely disassociated from ELP-cohesin scaffold after binding. Therefore, a truncated dockerin with the calcium

  4. A Simple Combinatorial Codon Mutagenesis Method for Targeted Protein Engineering.

    Science.gov (United States)

    Belsare, Ketaki D; Andorfer, Mary C; Cardenas, Frida S; Chael, Julia R; Park, Hyun June; Lewis, Jared C

    2017-03-17

    Directed evolution is a powerful tool for optimizing enzymes, and mutagenesis methods that improve enzyme library quality can significantly expedite the evolution process. Here, we report a simple method for targeted combinatorial codon mutagenesis (CCM). To demonstrate the utility of this method for protein engineering, CCM libraries were constructed for cytochrome P450 BM3 , pfu prolyl oligopeptidase, and the flavin-dependent halogenase RebH; 10-26 sites were targeted for codon mutagenesis in each of these enzymes, and libraries with a tunable average of 1-7 codon mutations per gene were generated. Each of these libraries provided improved enzymes for their respective transformations, which highlights the generality, simplicity, and tunability of CCM for targeted protein engineering.

  5. Soy Protein Scaffold Biomaterials for Tissue Engineering and Regenerative Medicine

    Science.gov (United States)

    Chien, Karen B.

    Developing functional biomaterials using highly processable materials with tailorable physical and bioactive properties is an ongoing challenge in tissue engineering. Soy protein is an abundant, natural resource with potential use for regenerative medicine applications. Preliminary studies show that soy protein can be physically modified and fabricated into various biocompatible constructs. However, optimized soy protein structures for tissue regeneration (i.e. 3D porous scaffolds) have not yet been designed. Furthermore, little work has established the in vivo biocompatibility of implanted soy protein and the benefit of using soy over other proteins including FDA-approved bovine collagen. In this work, freeze-drying and 3D printing fabrication processes were developed using commercially available soy protein to create porous scaffolds that improve cell growth and infiltration compared to other soy biomaterials previously reported. Characterization of scaffold structure, porosity, and mechanical/degradation properties was performed. In addition, the behavior of human mesenchymal stem cells seeded on various designed soy scaffolds was analyzed. Biological characterization of the cell-seeded scaffolds was performed to assess feasibility for use in liver tissue regeneration. The acute and humoral response of soy scaffolds implanted in an in vivo mouse subcutaneous model was also investigated. All fabricated soy scaffolds were modified using thermal, chemical, and enzymatic crosslinking to change properties and cell growth behavior. 3D printing allowed for control of scaffold pore size and geometry. Scaffold structure, porosity, and degradation rate significantly altered the in vivo response. Freeze-dried soy scaffolds had similar biocompatibility as freeze-dried collagen scaffolds of the same protein content. However, the soy scaffolds degraded at a much faster rate, minimizing immunogenicity. Interestingly, subcutaneously implanted soy scaffolds affected blood

  6. Engineered elastomeric proteins with dual elasticity can be controlled by a molecular regulator.

    Science.gov (United States)

    Cao, Yi; Li, Hongbin

    2008-08-01

    Elastomeric proteins are molecular springs that confer excellent mechanical properties to many biological tissues and biomaterials. Depending on the role performed by the tissue or biomaterial, elastomeric proteins can behave as molecular springs or shock absorbers. Here we combine single-molecule atomic force microscopy and protein engineering techniques to create elastomeric proteins that can switch between two distinct types of mechanical behaviour in response to the binding of a molecular regulator. The proteins are mechanically labile by design and behave as entropic springs with an elasticity that is governed by their configurational entropy. However, when a molecular regulator binds to the protein, it switches into a mechanically stable state and can act as a shock absorber. These engineered proteins effectively mimic and combine the two extreme forms of elastic behaviour found in natural elastomeric proteins, and thus represent a new type of smart nanomaterial that will find potential applications in nanomechanics and material sciences.

  7. A protein engineered to bind uranyl selectively and with femtomolar affinity

    Science.gov (United States)

    Zhou, Lu; Bosscher, Mike; Zhang, Changsheng; Özçubukçu, Salih; Zhang, Liang; Zhang, Wen; Li, Charles J.; Liu, Jianzhao; Jensen, Mark P.; Lai, Luhua; He, Chuan

    2014-03-01

    Uranyl (UO22+), the predominant aerobic form of uranium, is present in the ocean at a concentration of ~3.2 parts per 109 (13.7 nM) however, the successful enrichment of uranyl from this vast resource has been limited by the high concentrations of metal ions of similar size and charge, which makes it difficult to design a binding motif that is selective for uranyl. Here we report the design and rational development of a uranyl-binding protein using a computational screening process in the initial search for potential uranyl-binding sites. The engineered protein is thermally stable and offers very high affinity and selectivity for uranyl with a Kd of 7.4 femtomolar (fM) and >10,000-fold selectivity over other metal ions. We also demonstrated that the uranyl-binding protein can repeatedly sequester 30-60% of the uranyl in synthetic sea water. The chemical strategy employed here may be applied to engineer other selective metal-binding proteins for biotechnology and remediation applications.

  8. 40 CFR 91.1008 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  9. Secure Business Process Engineering: a socio-technical approach

    OpenAIRE

    Salnitri, Mattia

    2016-01-01

    Dealing with security is a central activity for todays organizations. Security breaches impact on the activities executed in organizations, preventing them to execute their business processes and, therefore, causing millions of dollars of losses. Security by design principles underline the importance of considering security as early as during the design of organizations to avoid expensive fixes during later phases of their lifecycle. However, the design of secure business processes cannot tak...

  10. Cell-free protein synthesis enabled rapid prototyping for metabolic engineering and synthetic biology

    Directory of Open Access Journals (Sweden)

    Lihong Jiang

    2018-06-01

    Full Text Available Advances in metabolic engineering and synthetic biology have facilitated the manufacturing of many valuable-added compounds and commodity chemicals using microbial cell factories in the past decade. However, due to complexity of cellular metabolism, the optimization of metabolic pathways for maximal production represents a grand challenge and an unavoidable barrier for metabolic engineering. Recently, cell-free protein synthesis system (CFPS has been emerging as an enabling alternative to address challenges in biomanufacturing. This review summarizes the recent progresses of CFPS in rapid prototyping of biosynthetic pathways and genetic circuits (biosensors to speed up design-build-test (DBT cycles of metabolic engineering and synthetic biology. Keywords: Cell-free protein synthesis, Metabolic pathway optimization, Genetic circuits, Metabolic engineering, Synthetic biology

  11. Gene composer: database software for protein construct design, codon engineering, and gene synthesis.

    Science.gov (United States)

    Lorimer, Don; Raymond, Amy; Walchli, John; Mixon, Mark; Barrow, Adrienne; Wallace, Ellen; Grice, Rena; Burgin, Alex; Stewart, Lance

    2009-04-21

    To improve efficiency in high throughput protein structure determination, we have developed a database software package, Gene Composer, which facilitates the information-rich design of protein constructs and their codon engineered synthetic gene sequences. With its modular workflow design and numerous graphical user interfaces, Gene Composer enables researchers to perform all common bio-informatics steps used in modern structure guided protein engineering and synthetic gene engineering. An interactive Alignment Viewer allows the researcher to simultaneously visualize sequence conservation in the context of known protein secondary structure, ligand contacts, water contacts, crystal contacts, B-factors, solvent accessible area, residue property type and several other useful property views. The Construct Design Module enables the facile design of novel protein constructs with altered N- and C-termini, internal insertions or deletions, point mutations, and desired affinity tags. The modifications can be combined and permuted into multiple protein constructs, and then virtually cloned in silico into defined expression vectors. The Gene Design Module uses a protein-to-gene algorithm that automates the back-translation of a protein amino acid sequence into a codon engineered nucleic acid gene sequence according to a selected codon usage table with minimal codon usage threshold, defined G:C% content, and desired sequence features achieved through synonymous codon selection that is optimized for the intended expression system. The gene-to-oligo algorithm of the Gene Design Module plans out all of the required overlapping oligonucleotides and mutagenic primers needed to synthesize the desired gene constructs by PCR, and for physically cloning them into selected vectors by the most popular subcloning strategies. We present a complete description of Gene Composer functionality, and an efficient PCR-based synthetic gene assembly procedure with mis-match specific endonuclease

  12. Gene Composer: database software for protein construct design, codon engineering, and gene synthesis

    Directory of Open Access Journals (Sweden)

    Mixon Mark

    2009-04-01

    Full Text Available Abstract Background To improve efficiency in high throughput protein structure determination, we have developed a database software package, Gene Composer, which facilitates the information-rich design of protein constructs and their codon engineered synthetic gene sequences. With its modular workflow design and numerous graphical user interfaces, Gene Composer enables researchers to perform all common bio-informatics steps used in modern structure guided protein engineering and synthetic gene engineering. Results An interactive Alignment Viewer allows the researcher to simultaneously visualize sequence conservation in the context of known protein secondary structure, ligand contacts, water contacts, crystal contacts, B-factors, solvent accessible area, residue property type and several other useful property views. The Construct Design Module enables the facile design of novel protein constructs with altered N- and C-termini, internal insertions or deletions, point mutations, and desired affinity tags. The modifications can be combined and permuted into multiple protein constructs, and then virtually cloned in silico into defined expression vectors. The Gene Design Module uses a protein-to-gene algorithm that automates the back-translation of a protein amino acid sequence into a codon engineered nucleic acid gene sequence according to a selected codon usage table with minimal codon usage threshold, defined G:C% content, and desired sequence features achieved through synonymous codon selection that is optimized for the intended expression system. The gene-to-oligo algorithm of the Gene Design Module plans out all of the required overlapping oligonucleotides and mutagenic primers needed to synthesize the desired gene constructs by PCR, and for physically cloning them into selected vectors by the most popular subcloning strategies. Conclusion We present a complete description of Gene Composer functionality, and an efficient PCR-based synthetic gene

  13. Engineering of soybean seed storage proteins

    International Nuclear Information System (INIS)

    Dickinson, C.D.; Floener, L.A.; Evans, R.P.; Nielsen, N.C.

    1987-01-01

    Protein engineering is one approach to the improvement of seed quality. With this in mind, a rapid in vitro system has been developed to assay the effect structural modifications have on the assembly of glycinin and β-conglycinin subunit complexes. Transcription plasmids were constructed for production of synthetic glycinin and β-conglycinin mRNAs by SP6 RNA-polymerase. Radiolabeled translation products from these messages were tested for their ability to form complexes. Gy4 and Gy5 proglycinins (group-2 subunits) and the a-subunit of β-conglycinin self-assembled into trimers. Proglycinin Gy2 (group-1 subunit) did not self-assemble, but assembled into mixed trimers in combination with Gy4 proglycinin. No assembly was observed for preproglycinins Gyl and Gy4, or for a Gy4 proglycinin which lacked 27 amino acids in a highly conserved internal sequence. Insertion of alternating MET-ARG residues in predicted turn regions of a hypervariable sequence in Gy4 proglycinin were tolerated when the string was short but inhibited trimer assembly as it became longer. The response to several different long deletions in this hypervariable region have also been tested. Different levels of trimer assembly were obtained and may depend on the secondary structures of the regions being joined in the engineered subunits. This system will be useful to study the assembly of storage protein complexes and to screen against modifications that interfere with subunit assembly

  14. CCNA Security Study Guide, Exam 640-553

    CERN Document Server

    Boyles, Tim

    2010-01-01

    A complete study guide for the new CCNA Security certification exam. In keeping with its status as the leading publisher of CCNA study guides, Sybex introduces the complete guide to the new CCNA security exam. The CCNA Security certification is the first step towards Cisco's new Cisco Certified Security Professional (CCSP) and Cisco Certified Internetworking Engineer-Security. With a foreword by CCNA networking authority Todd Lammle, CCNA Security Study Guide fully covers every exam objective. The companion CD includes the Sybex Test Engine, flashcards, and a PDF of the book.: The CCNA Securit

  15. TGP, an extremely stable, non-aggregating fluorescent protein created by structure-guided surface engineering

    OpenAIRE

    Close, Devin W.; Don Paul, Craig; Langan, Patricia S.; Wilce, Matthew C.J.; Traore, Daouda A.K.; Halfmann, Randal; Rocha, Reginaldo C.; Waldo, Geoffery S.; Payne, Riley J.; Rucker, Joseph B.; Prescott, Mark; Bradbury, Andrew R.M.

    2015-01-01

    In this paper we describe the engineering and X-ray crystal structure of Thermal Green Protein (TGP), an extremely stable, highly soluble, non-aggregating green fluorescent protein. TGP is a soluble variant of the fluorescent protein eCGP123, which despite being highly stable, has proven to be aggregation-prone. The X-ray crystal structure of eCGP123, also determined within the context of this paper, was used to carry out rational surface engineering to improve its solubility, leading to TGP....

  16. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  17. In-depth analysis of protein inference algorithms using multiple search engines and well-defined metrics.

    Science.gov (United States)

    Audain, Enrique; Uszkoreit, Julian; Sachsenberg, Timo; Pfeuffer, Julianus; Liang, Xiao; Hermjakob, Henning; Sanchez, Aniel; Eisenacher, Martin; Reinert, Knut; Tabb, David L; Kohlbacher, Oliver; Perez-Riverol, Yasset

    2017-01-06

    In mass spectrometry-based shotgun proteomics, protein identifications are usually the desired result. However, most of the analytical methods are based on the identification of reliable peptides and not the direct identification of intact proteins. Thus, assembling peptides identified from tandem mass spectra into a list of proteins, referred to as protein inference, is a critical step in proteomics research. Currently, different protein inference algorithms and tools are available for the proteomics community. Here, we evaluated five software tools for protein inference (PIA, ProteinProphet, Fido, ProteinLP, MSBayesPro) using three popular database search engines: Mascot, X!Tandem, and MS-GF+. All the algorithms were evaluated using a highly customizable KNIME workflow using four different public datasets with varying complexities (different sample preparation, species and analytical instruments). We defined a set of quality control metrics to evaluate the performance of each combination of search engines, protein inference algorithm, and parameters on each dataset. We show that the results for complex samples vary not only regarding the actual numbers of reported protein groups but also concerning the actual composition of groups. Furthermore, the robustness of reported proteins when using databases of differing complexities is strongly dependant on the applied inference algorithm. Finally, merging the identifications of multiple search engines does not necessarily increase the number of reported proteins, but does increase the number of peptides per protein and thus can generally be recommended. Protein inference is one of the major challenges in MS-based proteomics nowadays. Currently, there are a vast number of protein inference algorithms and implementations available for the proteomics community. Protein assembly impacts in the final results of the research, the quantitation values and the final claims in the research manuscript. Even though protein

  18. Development and Validation of Mechanical Engineering Trade Skills Assessment Instrument for Sustainable Job Security in Yobe State

    Science.gov (United States)

    Adamu, Gishua Garba; Dawha, Josphine Musa; Kamar, Tiamiyu Salihu

    2015-01-01

    Mechanical Engineering Trade Skills Assessment Instrument (METSAI) is aimed at determining the extent to which students have acquired practical skills before graduation that will enable them get employment for sustainable job security in Yobe state. The study employed instrumentation research design. The populations of the study were 23 mechanical…

  19. Using Resurrected Ancestral Proviral Proteins to Engineer Virus Resistance

    Directory of Open Access Journals (Sweden)

    Asunción Delgado

    2017-05-01

    Full Text Available Proviral factors are host proteins hijacked by viruses for processes essential for virus propagation such as cellular entry and replication. Pathogens and their hosts co-evolve. It follows that replacing a proviral factor with a functional ancestral form of the same protein could prevent viral propagation without fatally compromising organismal fitness. Here, we provide proof of concept of this notion. Thioredoxins serve as general oxidoreductases in all known cells. We report that several laboratory resurrections of Precambrian thioredoxins display substantial levels of functionality within Escherichia coli. Unlike E. coli thioredoxin, however, these ancestral thioredoxins are not efficiently recruited by the bacteriophage T7 for its replisome and therefore prevent phage propagation in E. coli. These results suggest an approach to the engineering of virus resistance. Diseases caused by viruses may have a devastating effect in agriculture. We discuss how the suggested approach could be applied to the engineering of plant virus resistance.

  20. Preparation of scaffolds from human hair proteins for tissue-engineering applications

    International Nuclear Information System (INIS)

    Verma, Vipin; Verma, Poonam; Ray, Alok R; Ray, Pratima

    2008-01-01

    Human hair proteins were isolated and purified for the fabrication of tissue-engineering scaffolds. Their cellular compatibility was studied using NIH3T3 mice fibroblast cells. The proteins were characterized using FTIR spectroscopy, sodium dodecyl sulfate-polyacrylamide gel electrophoresis for molecular weights and two-dimensional polyacrylamide gel electrophoresis for their isoelectric points (pIs). The molecular weights of keratins were in the range of 40-60 kilo-Daltons (kDa) and of matrix proteins were in the range of 15-30 kDa. The pIs of keratins were found to be in the range of 4.5-5.3. Sponges of the proteins were formed by lyophilization. Scanning electron microscopy was performed to examine the surface. Swelling studies were carried out in phosphate buffer saline at physiological pH 7.4. The hydrophilic character of the protein surface was studied by determining an average contact angle, which came to be 37 0 . The wells of tissue culture plates were coated with these proteins for studying the attachment and morphology of the cells. The protein detachment study was done to ensure the adsorption of proteins on the wells until the completion of the experiments. The cellular growth on a protein-coated surface showed three-dimensional 'bulged' morphology due to cell-cell and cell-matrix contacts. The sponges of human hair proteins supported more cells for a longer period than control. The morphology and cell proliferation studies exhibited by NIH3T3 cells on these proteins have shown their potential to be used as tissue-engineering scaffolds with better cell-cell contacts and leucine-aspartic acid-valine (LDV)-mediated cell-matrix interactions

  1. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  2. Capturing security requirements for software systems.

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  3. Capturing security requirements for software systems

    Directory of Open Access Journals (Sweden)

    Hassan El-Hadary

    2014-07-01

    Full Text Available Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  4. Capturing security requirements for software systems

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  5. Cytocompatible and water stable ultrafine protein fibers for tissue engineering

    Science.gov (United States)

    Jiang, Qiuran

    This dissertation proposal focuses on the development of cytocompatible and water stable protein ultrafine fibers for tissue engineering. The protein-based ultrafine fibers have the potential to be used for biomedicine, due to their biocompatibility, biodegradability, similarity to natural extracellular matrix (ECM) in physical structure and chemical composition, and superior adsorption properties due to their high surface to volume ratio. However, the current technologies to produce the protein-based ultrafine fibers for biomedical applications still have several problems. For instance, the current electrospinning and phase separation technologies generate scaffolds composed of densely compacted ultrafine fibers, and cells can spread just on the surface of the fiber bulk, and hardly penetrate into the inner sections of scaffolds. Thus, these scaffolds can merely emulate the ECM as a two dimensional basement membrane, but are difficult to mimic the three dimensional ECM stroma. Moreover, the protein-based ultrafine fibers do not possess sufficient water stability and strength for biomedical applications, and need modifications such as crosslinking. However, current crosslinking methods are either high in toxicity or low in crosslinking efficiency. To solve the problems mentioned above, zein, collagen, and gelatin were selected as the raw materials to represent plant proteins, animal proteins, and denatured proteins in this dissertation. A benign solvent system was developed specifically for the fabrication of collagen ultrafine fibers. In addition, the gelatin scaffolds with a loose fibrous structure, high cell-accessibility and cell viability were produced by a novel ultralow concentration phase separation method aiming to simulate the structure of three dimensional (3D) ECM stroma. Non-toxic crosslinking methods using citric acid as the crosslinker were also developed for electrospun or phase separated scaffolds from these three proteins, and proved to be

  6. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Doohwan Oh

    2014-12-01

    Full Text Available With the emergence of the Internet of Things (IoT, a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  7. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Science.gov (United States)

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-01-01

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382

  8. A malicious pattern detection engine for embedded security systems in the Internet of Things.

    Science.gov (United States)

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-12-16

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  9. The Unreasonable Ineffectiveness of Security Engineering: An Overview

    NARCIS (Netherlands)

    Pavlovic, Dusko

    2010-01-01

    In his 1960 essay, Eugene Wigner raised the question of ‿the unreasonable effectiveness of mathematics in natural sciences‿. After several decades of security research, we are tempted to ask the opposite question: Are we not unreasonably ineffective? Why are we not more secure from all the security

  10. Secure computing, economy, and trust

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Damgård, Ivan B.; Jakobsen, Thomas

    In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, cryptography and security engineering and develop and implement secure auctions for practical real-world problems. In essence this paper is an o...

  11. Roles of beta-turns in protein folding: from peptide models to protein engineering.

    Science.gov (United States)

    Marcelino, Anna Marie C; Gierasch, Lila M

    2008-05-01

    Reverse turns are a major class of protein secondary structure; they represent sites of chain reversal and thus sites where the globular character of a protein is created. It has been speculated for many years that turns may nucleate the formation of structure in protein folding, as their propensity to occur will favor the approximation of their flanking regions and their general tendency to be hydrophilic will favor their disposition at the solvent-accessible surface. Reverse turns are local features, and it is therefore not surprising that their structural properties have been extensively studied using peptide models. In this article, we review research on peptide models of turns to test the hypothesis that the propensities of turns to form in short peptides will relate to the roles of corresponding sequences in protein folding. Turns with significant stability as isolated entities should actively promote the folding of a protein, and by contrast, turn sequences that merely allow the chain to adopt conformations required for chain reversal are predicted to be passive in the folding mechanism. We discuss results of protein engineering studies of the roles of turn residues in folding mechanisms. Factors that correlate with the importance of turns in folding indeed include their intrinsic stability, as well as their topological context and their participation in hydrophobic networks within the protein's structure.

  12. Cyber-Informed Engineering

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert S. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Benjamin, Jacob [Idaho National Lab. (INL), Idaho Falls, ID (United States); Wright, Virginia L. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Quinones, Luis [Idaho National Lab. (INL), Idaho Falls, ID (United States); Paz, Jonathan [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2017-03-01

    A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.

  13. Cyber-Informed Engineering

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Benjamin, Jacob; Wright, Virginia L.; Quinones, Luis; Paz, Jonathan

    2017-01-01

    A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.

  14. Using Resurrected Ancestral Proviral Proteins to Engineer Virus Resistance.

    Science.gov (United States)

    Delgado, Asunción; Arco, Rocio; Ibarra-Molero, Beatriz; Sanchez-Ruiz, Jose M

    2017-05-09

    Proviral factors are host proteins hijacked by viruses for processes essential for virus propagation such as cellular entry and replication. Pathogens and their hosts co-evolve. It follows that replacing a proviral factor with a functional ancestral form of the same protein could prevent viral propagation without fatally compromising organismal fitness. Here, we provide proof of concept of this notion. Thioredoxins serve as general oxidoreductases in all known cells. We report that several laboratory resurrections of Precambrian thioredoxins display substantial levels of functionality within Escherichia coli. Unlike E. coli thioredoxin, however, these ancestral thioredoxins are not efficiently recruited by the bacteriophage T7 for its replisome and therefore prevent phage propagation in E. coli. These results suggest an approach to the engineering of virus resistance. Diseases caused by viruses may have a devastating effect in agriculture. We discuss how the suggested approach could be applied to the engineering of plant virus resistance. Copyright © 2017 The Author(s). Published by Elsevier Inc. All rights reserved.

  15. Case Study Application of the Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers

    Science.gov (United States)

    2016-04-01

    ER D C/ EL C R- 16 -1 Ecosystem Management and Restoration Research Program Case Study Application of the Biodiversity Security Index... Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers Richard A. Cole... Biodiversity Security Index (BSI) was applied to 23 project sites ranked for restoration feasibility study annual funding by the U. S. Army Corps of

  16. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    Science.gov (United States)

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  17. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Directory of Open Access Journals (Sweden)

    Tiago M. Fernández-Caramés

    2016-12-01

    Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  18. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Science.gov (United States)

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  19. A Security Approach in System Development Life Cycle

    OpenAIRE

    P.Mahizharuvi; Dr.Alagarsamy

    2011-01-01

    Many software organizations today are confronted with challenge of building secure software systems. Traditional software engineering principles place little emphasis on security. These principles tend to tread security as one of a long list of quality factors that are expected from all professionally developed software. As software systems of today have a wide reach, security has become a more important factor than ever in the history of software engineering can no longer be treated as Separ...

  20. From Protein Engineering to Immobilization: Promising Strategies for the Upgrade of Industrial Enzymes

    Science.gov (United States)

    Singh, Raushan Kumar; Tiwari, Manish Kumar; Singh, Ranjitha; Lee, Jung-Kul

    2013-01-01

    Enzymes found in nature have been exploited in industry due to their inherent catalytic properties in complex chemical processes under mild experimental and environmental conditions. The desired industrial goal is often difficult to achieve using the native form of the enzyme. Recent developments in protein engineering have revolutionized the development of commercially available enzymes into better industrial catalysts. Protein engineering aims at modifying the sequence of a protein, and hence its structure, to create enzymes with improved functional properties such as stability, specific activity, inhibition by reaction products, and selectivity towards non-natural substrates. Soluble enzymes are often immobilized onto solid insoluble supports to be reused in continuous processes and to facilitate the economical recovery of the enzyme after the reaction without any significant loss to its biochemical properties. Immobilization confers considerable stability towards temperature variations and organic solvents. Multipoint and multisubunit covalent attachments of enzymes on appropriately functionalized supports via linkers provide rigidity to the immobilized enzyme structure, ultimately resulting in improved enzyme stability. Protein engineering and immobilization techniques are sequential and compatible approaches for the improvement of enzyme properties. The present review highlights and summarizes various studies that have aimed to improve the biochemical properties of industrially significant enzymes. PMID:23306150

  1. From protein engineering to immobilization: promising strategies for the upgrade of industrial enzymes.

    Science.gov (United States)

    Singh, Raushan Kumar; Tiwari, Manish Kumar; Singh, Ranjitha; Lee, Jung-Kul

    2013-01-10

    Enzymes found in nature have been exploited in industry due to their inherent catalytic properties in complex chemical processes under mild experimental and environmental conditions. The desired industrial goal is often difficult to achieve using the native form of the enzyme. Recent developments in protein engineering have revolutionized the development of commercially available enzymes into better industrial catalysts. Protein engineering aims at modifying the sequence of a protein, and hence its structure, to create enzymes with improved functional properties such as stability, specific activity, inhibition by reaction products, and selectivity towards non-natural substrates. Soluble enzymes are often immobilized onto solid insoluble supports to be reused in continuous processes and to facilitate the economical recovery of the enzyme after the reaction without any significant loss to its biochemical properties. Immobilization confers considerable stability towards temperature variations and organic solvents. Multipoint and multisubunit covalent attachments of enzymes on appropriately functionalized supports via linkers provide rigidity to the immobilized enzyme structure, ultimately resulting in improved enzyme stability. Protein engineering and immobilization techniques are sequential and compatible approaches for the improvement of enzyme properties. The present review highlights and summarizes various studies that have aimed to improve the biochemical properties of industrially significant enzymes.

  2. Sequence-engineered mRNA Without Chemical Nucleoside Modifications Enables an Effective Protein Therapy in Large Animals

    Science.gov (United States)

    Thess, Andreas; Grund, Stefanie; Mui, Barbara L; Hope, Michael J; Baumhof, Patrick; Fotin-Mleczek, Mariola; Schlake, Thomas

    2015-01-01

    Being a transient carrier of genetic information, mRNA could be a versatile, flexible, and safe means for protein therapies. While recent findings highlight the enormous therapeutic potential of mRNA, evidence that mRNA-based protein therapies are feasible beyond small animals such as mice is still lacking. Previous studies imply that mRNA therapeutics require chemical nucleoside modifications to obtain sufficient protein expression and avoid activation of the innate immune system. Here we show that chemically unmodified mRNA can achieve those goals as well by applying sequence-engineered molecules. Using erythropoietin (EPO) driven production of red blood cells as the biological model, engineered Epo mRNA elicited meaningful physiological responses from mice to nonhuman primates. Even in pigs of about 20 kg in weight, a single adequate dose of engineered mRNA encapsulated in lipid nanoparticles (LNPs) induced high systemic Epo levels and strong physiological effects. Our results demonstrate that sequence-engineered mRNA has the potential to revolutionize human protein therapies. PMID:26050989

  3. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  4. Security Requirements – Analysis of the Issue

    Directory of Open Access Journals (Sweden)

    Jhon Vincent

    2013-12-01

    Full Text Available Needs about security are matters little taken into account when managing requirements engineering , and when considered in the life cycle of the system , they tend to become a general list of functions, as password of protection , firewalls , virus detection tools , and other similar. But in fact, they cannot be considered as requirements of security, because they are implementation mechanisms to try to meet unspecified requirements, as an authenticated access. As a result, the security requirements for the system are ignored, which are required to protect essential services and assets, besides, when are specified, is not considered the prospect of future attacks. This paper describes the need for a systematic approach to managing security requirements engineering, in order to help avoid the problem of generic lists and take into account the future perspective. Several related approaches are described and also are provided references additional material that can help requirements engineers to ensure that their products be taken into account, effectively , the security requirements.

  5. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  6. Computer-aided support for Secure Tropos

    NARCIS (Netherlands)

    Massacci, F.; Mylopoulos, J.; Zannone, N.

    2007-01-01

    In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of security requirements. This paper briefly recaps the concepts proposed for capturing security aspects, and presents an

  7. Integrated Controlling System and Unified Database for High Throughput Protein Crystallography Experiments

    International Nuclear Information System (INIS)

    Gaponov, Yu.A.; Igarashi, N.; Hiraki, M.; Sasajima, K.; Matsugaki, N.; Suzuki, M.; Kosuge, T.; Wakatsuki, S.

    2004-01-01

    An integrated controlling system and a unified database for high throughput protein crystallography experiments have been developed. Main features of protein crystallography experiments (purification, crystallization, crystal harvesting, data collection, data processing) were integrated into the software under development. All information necessary to perform protein crystallography experiments is stored (except raw X-ray data that are stored in a central data server) in a MySQL relational database. The database contains four mutually linked hierarchical trees describing protein crystals, data collection of protein crystal and experimental data processing. A database editor was designed and developed. The editor supports basic database functions to view, create, modify and delete user records in the database. Two search engines were realized: direct search of necessary information in the database and object oriented search. The system is based on TCP/IP secure UNIX sockets with four predefined sending and receiving behaviors, which support communications between all connected servers and clients with remote control functions (creating and modifying data for experimental conditions, data acquisition, viewing experimental data, and performing data processing). Two secure login schemes were designed and developed: a direct method (using the developed Linux clients with secure connection) and an indirect method (using the secure SSL connection using secure X11 support from any operating system with X-terminal and SSH support). A part of the system has been implemented on a new MAD beam line, NW12, at the Photon Factory Advanced Ring for general user experiments

  8. Argumentation-Based Security Requirements Elicitation: The Next Round

    NARCIS (Netherlands)

    Ionita, Dan; Bullee, Jan-Willem; Wieringa, Roelf J.

    2014-01-01

    Information Security Risk Assessment can be viewed as part of requirements engineering because it is used to translate security goals into security requirements, where security requirements are the desired system properties that mitigate threats to security goals. To improve the defensibility of

  9. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  10. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  11. Using Proven Reference Monitor Patterns for Security Evaluation

    Directory of Open Access Journals (Sweden)

    Mark R. Heckman

    2016-04-01

    Full Text Available The most effective approach to evaluating the security of complex systems is to deliberately construct the systems using security patterns specifically designed to make them evaluable. Just such an integrated set of security patterns was created decades ago based on the Reference Monitor abstraction. An associated systematic security engineering and evaluation methodology was codified as an engineering standard in the Trusted Computer System Evaluation Criteria (TCSEC. This paper explains how the TCSEC and its Trusted Network Interpretation (TNI constitute a set of security patterns for large, complex and distributed systems and how those patterns have been repeatedly and successfully used to create and evaluate some of the most secure government and commercial systems ever developed.

  12. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  13. Proteins engineering

    International Nuclear Information System (INIS)

    2000-01-01

    At the - Departement d'Ingenierie et d'etudes de proteines (Deip) of the CEA more than seventy researchers are working hard to understand the function of proteins. For that they use the molecular labelling technique (F.M.)

  14. Protein trans-splicing of multiple atypical split inteins engineered from natural inteins.

    Directory of Open Access Journals (Sweden)

    Ying Lin

    Full Text Available Protein trans-splicing by split inteins has many uses in protein production and research. Splicing proteins with synthetic peptides, which employs atypical split inteins, is particularly useful for site-specific protein modifications and labeling, because the synthetic peptide can be made to contain a variety of unnatural amino acids and chemical modifications. For this purpose, atypical split inteins need to be engineered to have a small N-intein or C-intein fragment that can be more easily included in a synthetic peptide that also contains a small extein to be trans-spliced onto target proteins. Here we have successfully engineered multiple atypical split inteins capable of protein trans-splicing, by modifying and testing more than a dozen natural inteins. These included both S1 split inteins having a very small (11-12 aa N-intein fragment and S11 split inteins having a very small (6 aa C-intein fragment. Four of the new S1 and S11 split inteins showed high efficiencies (85-100% of protein trans-splicing both in E. coli cells and in vitro. Under in vitro conditions, they exhibited reaction rate constants ranging from ~1.7 × 10(-4 s(-1 to ~3.8 × 10(-4 s(-1, which are comparable to or higher than those of previously reported atypical split inteins. These findings should facilitate a more general use of trans-splicing between proteins and synthetic peptides, by expanding the availability of different atypical split inteins. They also have implications on understanding the structure-function relationship of atypical split inteins, particularly in terms of intein fragment complementation.

  15. Food and nutritional security requires adequate protein as well as energy, delivered from whole-year crop production.

    Science.gov (United States)

    Coles, Graeme D; Wratten, Stephen D; Porter, John R

    2016-01-01

    Human food security requires the production of sufficient quantities of both high-quality protein and dietary energy. In a series of case-studies from New Zealand, we show that while production of food ingredients from crops on arable land can meet human dietary energy requirements effectively, requirements for high-quality protein are met more efficiently by animal production from such land. We present a model that can be used to assess dietary energy and quality-corrected protein production from various crop and crop/animal production systems, and demonstrate its utility. We extend our analysis with an accompanying economic analysis of commercially-available, pre-prepared or simply-cooked foods that can be produced from our case-study crop and animal products. We calculate the per-person, per-day cost of both quality-corrected protein and dietary energy as provided in the processed foods. We conclude that mixed dairy/cropping systems provide the greatest quantity of high-quality protein per unit price to the consumer, have the highest food energy production and can support the dietary requirements of the highest number of people, when assessed as all-year-round production systems. Global food and nutritional security will largely be an outcome of national or regional agroeconomies addressing their own food needs. We hope that our model will be used for similar analyses of food production systems in other countries, agroecological zones and economies.

  16. Tissue-engineered human bioartificial muscles expressing a foreign recombinant protein for gene therapy

    Science.gov (United States)

    Powell, C.; Shansky, J.; Del Tatto, M.; Forman, D. E.; Hennessey, J.; Sullivan, K.; Zielinski, B. A.; Vandenburgh, H. H.

    1999-01-01

    Murine skeletal muscle cells transduced with foreign genes and tissue engineered in vitro into bioartificial muscles (BAMs) are capable of long-term delivery of soluble growth factors when implanted into syngeneic mice (Vandenburgh et al., 1996b). With the goal of developing a therapeutic cell-based protein delivery system for humans, similar genetic tissue-engineering techniques were designed for human skeletal muscle stem cells. Stem cell myoblasts were isolated, cloned, and expanded in vitro from biopsied healthy adult (mean age, 42 +/- 2 years), and elderly congestive heart failure patient (mean age, 76 +/- 1 years) skeletal muscle. Total cell yield varied widely between biopsies (50 to 672 per 100 mg of tissue, N = 10), but was not significantly different between the two patient groups. Percent myoblasts per biopsy (73 +/- 6%), number of myoblast doublings prior to senescence in vitro (37 +/- 2), and myoblast doubling time (27 +/- 1 hr) were also not significantly different between the two patient groups. Fusion kinetics of the myoblasts were similar for the two groups after 20-22 doublings (74 +/- 2% myoblast fusion) when the biopsy samples had been expanded to 1 to 2 billion muscle cells, a number acceptable for human gene therapy use. The myoblasts from the two groups could be equally transduced ex vivo with replication-deficient retroviral expression vectors to secrete 0.5 to 2 microg of a foreign protein (recombinant human growth hormone, rhGH)/10(6) cells/day, and tissue engineered into human BAMs containing parallel arrays of differentiated, postmitotic myofibers. This work suggests that autologous human skeletal myoblasts from a potential patient population can be isolated, genetically modified to secrete foreign proteins, and tissue engineered into implantable living protein secretory devices for therapeutic use.

  17. Adhesive protein interactions with chitosan: consequences for valve endothelial cell growth on tissue-engineering materials.

    Science.gov (United States)

    Cuy, Janet L; Beckstead, Benjamin L; Brown, Chad D; Hoffman, Allan S; Giachelli, Cecilia M

    2003-11-01

    Stable endothelialization of a tissue-engineered heart valve is essential for proper valve function, although adhesive characteristics of the native valve endothelial cell (VEC) have rarely been explored. This research evaluated VEC adhesive qualities and attempted to enhance VEC growth on the biopolymer chitosan, a novel tissue-engineering scaffold material with promising biological and chemical properties. Aortic VEC cultures were isolated and found to preferentially adhere to fibronectin, collagen types IV and I over laminin and osteopontin in a dose-dependent manner. Seeding of VEC onto comparison substrates revealed VEC growth and morphology to be preferential in the order: tissue culture polystyrene > gelatin, poly(DL-lactide-co-glycolide), chitosan > poly(hydroxy alkanoate). Adhesive protein precoating of chitosan did not significantly enhance VEC growth, despite equivalent protein adsorption as to polystyrene. Initial cell adhesion to protein-precoated chitosan, however, was higher than for polystyrene. Composite chitosan/collagen type IV films were investigated as an alternative to simple protein precoatings, and were shown to improve VEC growth and morphology over chitosan alone. These findings suggest potential manipulation of chitosan properties to improve amenability to valve tissue-engineering applications. Copyright 2003 Wiley Periodicals, Inc.

  18. Engineering a novel multifunctional green fluorescent protein tag for a wide variety of protein research.

    Directory of Open Access Journals (Sweden)

    Takuya Kobayashi

    Full Text Available BACKGROUND: Genetically encoded tag is a powerful tool for protein research. Various kinds of tags have been developed: fluorescent proteins for live-cell imaging, affinity tags for protein isolation, and epitope tags for immunological detections. One of the major problems concerning the protein tagging is that many constructs with different tags have to be made for different applications, which is time- and resource-consuming. METHODOLOGY/PRINCIPAL FINDINGS: Here we report a novel multifunctional green fluorescent protein (mfGFP tag which was engineered by inserting multiple peptide tags, i.e., octa-histidine (8xHis, streptavidin-binding peptide (SBP, and c-Myc tag, in tandem into a loop of GFP. When fused to various proteins, mfGFP monitored their localization in living cells. Streptavidin agarose column chromatography with the SBP tag successfully isolated the protein complexes in a native form with a high purity. Tandem affinity purification (TAP with 8xHis and SBP tags in mfGFP further purified the protein complexes. mfGFP was clearly detected by c-Myc-specific antibody both in immunofluorescence and immuno-electron microscopy (EM. These findings indicate that mfGFP works well as a multifunctional tag in mammalian cells. The tag insertion was also successful in other fluorescent protein, mCherry. CONCLUSIONS AND SIGNIFICANCE: The multifunctional fluorescent protein tag is a useful tool for a wide variety of protein research, and may have the advantage over other multiple tag systems in its higher expandability and compatibility with existing and future tag technologies.

  19. Food and nutritional security requires adequate protein as well as energy, delivered from whole-year crop production

    DEFF Research Database (Denmark)

    Coles, Graeme D; Wratten, Stephen D; Porter, John Roy

    2016-01-01

    Human food security requires the production of sufficient quantities of both high-quality protein and dietary energy. In a series of case-studies from New Zealand, we show that while production of food ingredients from crops on arable land can meet human dietary energy requirements effectively...... and nutritional security will largely be an outcome of national or regional agroeconomies addressing their own food needs. We hope that our model will be used for similar analyses of food production systems in other countries, agroecological zones and economies....

  20. Identifying and engineering promoters for high level and sustainable therapeutic recombinant protein production in cultured mammalian cells.

    Science.gov (United States)

    Ho, Steven C L; Yang, Yuansheng

    2014-08-01

    Promoters are essential on plasmid vectors to initiate transcription of the transgenes when generating therapeutic recombinant proteins expressing mammalian cell lines. High and sustained levels of gene expression are desired during therapeutic protein production while gene expression is useful for cell engineering. As many finely controlled promoters exhibit cell and product specificity, new promoters need to be identified, optimized and carefully evaluated before use. Suitable promoters can be identified using techniques ranging from simple molecular biology methods to modern high-throughput omics screenings. Promoter engineering is often required after identification to either obtain high and sustained expression or to provide a wider range of gene expression. This review discusses some of the available methods to identify and engineer promoters for therapeutic recombinant protein expression in mammalian cells.

  1. Security controls in a Cullinet database environment

    International Nuclear Information System (INIS)

    Thompson, R.E.

    1988-01-01

    Security controls using Cullinet's Integrated Data Management System (IDMS) are examined. IDMS software integrity problems, with emphasis on security package interfaces, are disclosed. Solutions applied at Sandia Laboratories Engineering Information Management computing facilty are presented. An overall IDMS computer security philosophy is reviewed

  2. Effects of Bone Morphogenic Proteins on Engineered Cartilage

    Science.gov (United States)

    Gooch, Keith, J.; Blunk, Torsten; Courter, Donald L.; Sieminski, Alisha; Vunjak-Novakovic, Gordana; Freed, Lisa E.

    2007-01-01

    A report describes experiments on the effects of bone morphogenic proteins (BMPs) on engineered cartilage grown in vitro. In the experiments, bovine calf articular chondrocytes were seeded onto biodegradable polyglycolic acid scaffolds and cultured in, variously, a control medium or a medium supplemented with BMP-2, BMP-12, or BMP-13 in various concentrations. Under all conditions investigated, cell-polymer constructs cultivated for 4 weeks macroscopically and histologically resembled native cartilage. At a concentration of 100 ng/mL, BMP-2, BMP-12, or BMP-13 caused (1) total masses of the constructs to exceed those of the controls by 121, 80, or 62 percent, respectively; (2) weight percentages of glycosaminoglycans in the constructs to increase by 27, 18, or 15, respectively; and (3) total collagen contents of the constructs to decrease to 63, 89, or 83 percent of the control values, respectively. BMP-2, but not BMP-12 or BMP-13, promoted chondrocyte hypertrophy. These observations were interpreted as suggesting that the three BMPs increase the growth rates and modulate the compositions of engineered cartilage. It was also concluded that in vitro engineered cartilage is a suitable system for studying effects of BMPs on chondrogenesis in a well-defined environment.

  3. Facile construction of a random protein domain insertion library using an engineered transposon.

    Science.gov (United States)

    Shah, Vandan; Pierre, Brennal; Kim, Jin Ryoun

    2013-01-15

    Insertional fusion between multiple protein domains represents a novel means of creating integrated functionalities. Currently, there is no robust guideline for selection of insertion sites ensuring the desired functional outcome of insertional fusion. Therefore, construction and testing of random domain insertion libraries, in which a host protein domain is randomly inserted into a guest protein domain, significantly benefit extensive exploration of sequence spaces for insertion sites. Short peptide residues are usually introduced between protein domains to alleviate structural conflicts, and the interdomain linker residues may affect the functional outcome of protein insertion complexes. Unfortunately, optimal control of interdomain linker residues is not always available in conventional methods used to construct random domain insertion libraries. Moreover, most conventional methods employ blunt-end rather than sticky-end ligation between host and guest DNA fragments, thus lowering library construction efficiency. Here, we report the facile construction of random domain insertion libraries using an engineered transposon. We show that random domain insertion with optimal control of interdomain linker residues was possible with our engineered transposon-based method. In addition, our method employs sticky-end rather than blunt-end ligation between host and guest DNA fragments, thus allowing for facile construction of relatively large sized libraries. Copyright © 2012 Elsevier Inc. All rights reserved.

  4. Protein design and engineering of a de novo pathway for microbial production of 1,3-propanediol from glucose.

    Science.gov (United States)

    Chen, Zhen; Geng, Feng; Zeng, An-Ping

    2015-02-01

    Protein engineering to expand the substrate spectrum of native enzymes opens new possibilities for bioproduction of valuable chemicals from non-natural pathways. No natural microorganism can directly use sugars to produce 1,3-propanediol (PDO). Here, we present a de novo route for the biosynthesis of PDO from sugar, which may overcome the mentioned limitations by expanding the homoserine synthesis pathway. The accomplishment of pathway from homoserine to PDO is achieved by protein engineering of glutamate dehydrogenase (GDH) and pyruvate decarboxylase to sequentially convert homoserine to 4-hydroxy-2-ketobutyrate and 3-hydroxypropionaldehyde. The latter is finally converted to PDO by using a native alcohol dehydrogenase. In this work, we report on experimental accomplishment of this non-natural pathway, especially by protein engineering of GDH for the key step of converting homoserine to 4-hydroxy-2-ketobutyrate. These results show the feasibility and significance of protein engineering for de novo pathway design and overproduction of desired industrial products. Copyright © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Security and Network Operations [video

    OpenAIRE

    Myrick, Matthew

    2012-01-01

    Senior Security Engineer, Matthew Myrick discusses the current cyber threats that we are all facing, the five W's (who, what, when, where, and how) of cyber security, past and present cyber-attack trends, and ways you can help protect yourself and your enterprise from cyber-attack.

  6. 40 CFR 85.1708 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense. [39 FR 32611, Sept. 10...

  7. Artificial membrane-binding proteins stimulate oxygenation of stem cells during engineering of large cartilage tissue

    Science.gov (United States)

    Armstrong, James P. K.; Shakur, Rameen; Horne, Joseph P.; Dickinson, Sally C.; Armstrong, Craig T.; Lau, Katherine; Kadiwala, Juned; Lowe, Robert; Seddon, Annela; Mann, Stephen; Anderson, J. L. Ross; Perriman, Adam W.; Hollander, Anthony P.

    2015-06-01

    Restricted oxygen diffusion can result in central cell necrosis in engineered tissue, a problem that is exacerbated when engineering large tissue constructs for clinical application. Here we show that pre-treating human mesenchymal stem cells (hMSCs) with synthetic membrane-active myoglobin-polymer-surfactant complexes can provide a reservoir of oxygen capable of alleviating necrosis at the centre of hyaline cartilage. This is achieved through the development of a new cell functionalization methodology based on polymer-surfactant conjugation, which allows the delivery of functional proteins to the hMSC membrane. This new approach circumvents the need for cell surface engineering using protein chimerization or genetic transfection, and we demonstrate that the surface-modified hMSCs retain their ability to proliferate and to undergo multilineage differentiation. The functionalization technology is facile, versatile and non-disruptive, and in addition to tissue oxygenation, it should have far-reaching application in a host of tissue engineering and cell-based therapies.

  8. Integrating enzyme immobilization and protein engineering: An alternative path for the development of novel and improved industrial biocatalysts.

    Science.gov (United States)

    Bernal, Claudia; Rodríguez, Karen; Martínez, Ronny

    2018-06-09

    Enzyme immobilization often achieves reusable biocatalysts with improved operational stability and solvent resistance. However, these modifications are generally associated with a decrease in activity or detrimental modifications in catalytic properties. On the other hand, protein engineering aims to generate enzymes with increased performance at specific conditions by means of genetic manipulation, directed evolution and rational design. However, the achieved biocatalysts are generally generated as soluble enzymes, -thus not reusable- and their performance under real operational conditions is uncertain. Combined protein engineering and enzyme immobilization approaches have been employed as parallel or consecutive strategies for improving an enzyme of interest. Recent reports show efforts on simultaneously improving both enzymatic and immobilization components through genetic modification of enzymes and optimizing binding chemistry for site-specific and oriented immobilization. Nonetheless, enzyme engineering and immobilization are usually performed as separate workflows to achieve improved biocatalysts. In this review, we summarize and discuss recent research aiming to integrate enzyme immobilization and protein engineering and propose strategies to further converge protein engineering and enzyme immobilization efforts into a novel "immobilized biocatalyst engineering" research field. We believe that through the integration of both enzyme engineering and enzyme immobilization strategies, novel biocatalysts can be obtained, not only as the sum of independently improved intrinsic and operational properties of enzymes, but ultimately tailored specifically for increased performance as immobilized biocatalysts, potentially paving the way for a qualitative jump in the development of efficient, stable biocatalysts with greater real-world potential in challenging bioprocess applications. Copyright © 2018. Published by Elsevier Inc.

  9. TGP, an extremely stable, non-aggregating fluorescent protein created by structure-guided surface engineering

    Science.gov (United States)

    Close, Devin W.; Don Paul, Craig; Langan, Patricia S.; Wilce, Matthew C.J.; Traore, Daouda A.K.; Halfmann, Randal; Rocha, Reginaldo C.; Waldo, Geoffery S.; Payne, Riley J.; Rucker, Joseph B.; Prescott, Mark; Bradbury, Andrew R.M.

    2014-01-01

    In this paper we describe the engineering and X-ray crystal structure of Thermal Green Protein (TGP), an extremely stable, highly soluble, non-aggregating green fluorescent protein. TGP is a soluble variant of the fluorescent protein eCGP123, which despite being highly stable, has proven to be aggregation-prone. The X-ray crystal structure of eCGP123, also determined within the context of this paper, was used to carry out rational surface engineering to improve its solubility, leading to TGP. The approach involved simultaneously eliminating crystal lattice contacts while increasing the overall negative charge of the protein. Despite intentional disruption of lattice contacts and introduction of high entropy glutamate side chains, TGP crystallized readily in a number of different conditions and the X-ray crystal structure of TGP was determined to 1.9 Å resolution. The structural reasons for the enhanced stability of TGP and eCGP123 are discussed. We demonstrate the utility of using TGP as a fusion partner in various assays and significantly, in amyloid assays in which the standard fluorescent protein, EGFP, is undesirable because of aberrant oligomerization. PMID:25287913

  10. DNA Nanotechnology-Enabled Interfacial Engineering for Biosensor Development.

    Science.gov (United States)

    Ye, Dekai; Zuo, Xiaolei; Fan, Chunhai

    2018-06-12

    Biosensors represent biomimetic analytical tools for addressing increasing needs in medical diagnosis, environmental monitoring, security, and biodefense. Nevertheless, widespread real-world applications of biosensors remain challenging due to limitations of performance, including sensitivity, specificity, speed, and reproducibility. In this review, we present a DNA nanotechnology-enabled interfacial engineering approach for improving the performance of biosensors. We first introduce the main challenges of the biosensing interfaces, especially under the context of controlling the DNA interfacial assembly. We then summarize recent progress in DNA nanotechnology and efforts to harness DNA nanostructures to engineer various biological interfaces, with a particular focus on the use of framework nucleic acids. We also discuss the implementation of biosensors to detect physiologically relevant nucleic acids, proteins, small molecules, ions, and other biomarkers. This review highlights promising applications of DNA nanotechnology in interfacial engineering for biosensors and related areas.

  11. Information Security Management in Context of Globalization

    OpenAIRE

    Wawak, Slawomir

    2012-01-01

    Modern information technologies are the engine of globalization. At the same time, the global market influences the way of looking at information security. Information security thus becomes an increasingly important field. The article discuses the results of research on information security management systems in public administration in Poland.

  12. 40 CFR 90.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request for...

  13. 40 CFR 89.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  14. Quantum Security of Cryptographic Primitives

    OpenAIRE

    Gagliardoni, Tommaso

    2017-01-01

    We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be natively run on a quantum infrastructure, such as quantum key distribution). Moreover, there exist also hybrid models, where traditional crypto...

  15. Processing multilevel secure test and evaluation information

    Science.gov (United States)

    Hurlburt, George; Hildreth, Bradley; Acevedo, Teresa

    1994-07-01

    The Test and Evaluation Community Network (TECNET) is building a Multilevel Secure (MLS) system. This system features simultaneous access to classified and unclassified information and easy access through widely available communications channels. It provides the necessary separation of classification levels, assured through the use of trusted system design techniques, security assessments and evaluations. This system enables cleared T&E users to view and manipulate classified and unclassified information resources either using a single terminal interface or multiple windows in a graphical user interface. TECNET is in direct partnership with the National Security Agency (NSA) to develop and field the MLS TECNET capability in the near term. The centerpiece of this partnership is a state-of-the-art Concurrent Systems Security Engineering (CSSE) process. In developing the MLS TECNET capability, TECNET and NSA are providing members, with various expertise and diverse backgrounds, to participate in the CSSE process. The CSSE process is founded on the concepts of both Systems Engineering and Concurrent Engineering. Systems Engineering is an interdisciplinary approach to evolve and verify an integrated and life cycle balanced set of system product and process solutions that satisfy customer needs (ASD/ENS-MIL STD 499B 1992). Concurrent Engineering is design and development using the simultaneous, applied talents of a diverse group of people with the appropriate skills. Harnessing diverse talents to support CSSE requires active participation by team members in an environment that both respects and encourages diversity.

  16. Development of Genome Engineering Tools from Plant-Specific PPR Proteins Using Animal Cultured Cells.

    Science.gov (United States)

    Kobayashi, Takehito; Yagi, Yusuke; Nakamura, Takahiro

    2016-01-01

    The pentatricopeptide repeat (PPR) motif is a sequence-specific RNA/DNA-binding module. Elucidation of the RNA/DNA recognition mechanism has enabled engineering of PPR motifs as new RNA/DNA manipulation tools in living cells, including for genome editing. However, the biochemical characteristics of PPR proteins remain unknown, mostly due to the instability and/or unfolding propensities of PPR proteins in heterologous expression systems such as bacteria and yeast. To overcome this issue, we constructed reporter systems using animal cultured cells. The cell-based system has highly attractive features for PPR engineering: robust eukaryotic gene expression; availability of various vectors, reagents, and antibodies; highly efficient DNA delivery ratio (>80 %); and rapid, high-throughput data production. In this chapter, we introduce an example of such reporter systems: a PPR-based sequence-specific translational activation system. The cell-based reporter system can be applied to characterize plant genes of interested and to PPR engineering.

  17. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  18. Improving industrial process control systems security

    CERN Document Server

    Epting, U; CERN. Geneva. TS Department

    2004-01-01

    System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...

  19. Security and privacy in smart grids

    CERN Document Server

    Xiao, Yang

    2013-01-01

    Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas-making it an ideal reference for students, researchers, and engineers in these fields. The book explains grid security development and deployment and introduces novel approaches for securing today'

  20. 40 CFR 94.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary. (2...

  1. Design, Engineering and Application of an Amyloidogenic Protein, SBAFP-m1, for use in Nanotechnological Applications

    Science.gov (United States)

    Peralta, Maria del Refugio

    Nanotechnology relies on collaborations across scientific disciplines such as physics, engineering, chemistry and biology. In nanotechnology, researchers manipulate molecules on the nanometer scale for various applications, ranging from tissue engineering, nanowire synthesis, and alternative energy devices. By utilizing various biological scaffolds, namely amyloid fibrils, the work of nanometer molecular control can be achieved through the use of self-assembly systems. Here, a systematic design scheme was developed to engineer protein based amyloid fibrils and was successfully applied to the design of two, unique self-assembled monomers, SBAFP-m1 and RGAFP-m1, from naturally occurring ice binding proteins found in insects and plants. A highly idealized, in-register dimer interface was designed and experimentally synthesized and demonstrated to form micron long amyloid fibrils (Chapter 2). The strength and resistance of the designer amyloid fibrils formed by SBAFP-m1 were probed in Chapter 3. Most notably, the ultimate tensile strength of SBAFP-m1 fibrils was experimentally determined to be 2.1 +/- 1.7 GPa, on par with that of naturally occurring amyloid fibrils in literature and steel. The fibrils were found to maintain their beta-sheet structure over a wide range of temperatures, from - 80 °C to 90 °C. Fibrils were resistant to common protein denaturants like 8M urea, 2.5 M guanidine hydrochloride, 2.5 M NaCl, organic solvents (methanol, ethanol, isopropanol and acetone), and across the pH range two to 11. SBAFP-m1 was mutated to add a 5x cysteine tag to the N-terminus, allowing for gold nanoparticle conjugation along the fibril axis (Chapter 4). The gold-conjugated fibrils were then enhanced with silver to produce nanowires. Various attempts to selectively synthesize heterogeneous fibrils from SBAFP-m1 mutants were attempted in Chapter 5. An attempt to de-stabilize the homogeneous fibril assembly through unfavorable homogeneous protein interactions was not

  2. Requirements engineering for trust management: Model, methodology, and reasoning

    NARCIS (Netherlands)

    Giorgini, P.; Massacci, F.; Mylopoulos, J.; Zannone, N.

    2006-01-01

    A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizational level, as opposed to an IT system level, and mapping these into security and trust management policies is still an open

  3. Engineering secure Internet of Things systems

    CERN Document Server

    Aziz, Benjamin; Crispo, Bruno

    2016-01-01

    This book examines important security considerations for the Internet of Things (IoT). IoT is collecting a growing amount of private and sensitive data about our lives, and requires increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability.

  4. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  5. Overview on zein protein: a promising pharmaceutical excipient in drug delivery systems and tissue engineering.

    Science.gov (United States)

    Labib, Gihan

    2018-01-01

    Natural pharmaceutical excipients have been applied extensively in the past decades owing to their safety and biocompatibility. Zein, a natural protein of plant origin offers great benefit over other synthetic polymers used in controlled drug and biomedical delivery systems. It was used in a variety of medical fields including pharmaceutical and biomedical drug targeting, vaccine, tissue engineering, and gene delivery. Being biodegradable and biocompatible, the current review focuses on the history and the medical application of zein as an attractive still promising biopolymer. Areas covered: The current review gives a broadscope on zein as a still promising protein excipient in different fields. Zein- based drug and biomedical delivery systems are discussed with special focus on current and potential application in controlled drug delivery systems, and tissue engineering. Expert opinion: Zein as a protein of natural origin can still be considered a promising polymer in the field of drug delivery systems as well as in tissue engineering. Although different researchers spotted light on zein application in different industrial fields extensively, the feasibility of its use in the field of drug delivery replenished by investigators in recent years has not yet been fully approached.

  6. Information engineering

    Energy Technology Data Exchange (ETDEWEB)

    Hunt, D.N.

    1997-02-01

    The Information Engineering thrust area develops information technology to support the programmatic needs of Lawrence Livermore National Laboratory`s Engineering Directorate. Progress in five programmatic areas are described in separate reports contained herein. These are entitled Three-dimensional Object Creation, Manipulation, and Transport, Zephyr:A Secure Internet-Based Process to Streamline Engineering Procurements, Subcarrier Multiplexing: Optical Network Demonstrations, Parallel Optical Interconnect Technology Demonstration, and Intelligent Automation Architecture.

  7. Modulating bacterial and gut mucosal interactions with engineered biofilm matrix proteins.

    Science.gov (United States)

    Duraj-Thatte, Anna M; Praveschotinunt, Pichet; Nash, Trevor R; Ward, Frederick R; Joshi, Neel S

    2018-02-22

    Extracellular appendages play a significant role in mediating communication between bacteria and their host. Curli fibers are a class of bacterial fimbria that is highly amenable to engineering. We demonstrate the use of engineered curli fibers to rationally program interactions between bacteria and components of the mucosal epithelium. Commensal E. coli strains were engineered to produce recombinant curli fibers fused to the trefoil family of human cytokines. Biofilms formed from these strains bound more mucins than those producing wild-type curli fibers, and modulated mucin rheology as well. When treated with bacteria producing the curli-trefoil fusions mammalian cells behaved identically in terms of their migration behavior as when they were treated with the corresponding soluble trefoil factors. Overall, this demonstrates the potential utility of curli fibers as a scaffold for the display of bioactive domains and an untapped approach to rationally modulating host-microbe interactions using bacterial matrix proteins.

  8. Protein engineering of subtilisins to improve stability in detergent formulations.

    Science.gov (United States)

    von der Osten, C; Branner, S; Hastrup, S; Hedegaard, L; Rasmussen, M D; Bisgård-Frantzen, H; Carlsen, S; Mikkelsen, J M

    1993-03-01

    Microbial proteases are used extensively in a large number of industrial processes and most importantly in detergent formulations facilitating the removal of proteinaceous stains. Site-directed mutagenesis has been employed in the construction of subtilisin variants with improved storage and oxidation stabilities. It is shown that in spite of significant structural homology between subtilisins subjected to protein engineering the effects of specific mutations can be quite different. Mutations that stabilize one subtilisin may destabilize another.

  9. Your employees: the front line in cyber security

    OpenAIRE

    Ashenden, D

    2016-01-01

    First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/)

  10. In vivo and in vitro protein ligation by naturally occurring and engineered split DnaE inteins.

    Directory of Open Access Journals (Sweden)

    A Sesilja Aranko

    Full Text Available BACKGROUND: Protein trans-splicing by naturally occurring split DnaE inteins is used for protein ligation of foreign peptide fragments. In order to widen biotechnological applications of protein trans-splicing, it is highly desirable to have split inteins with shorter C-terminal fragments, which can be chemically synthesized. PRINCIPAL FINDINGS: We report the identification of new functional split sites in DnaE inteins from Synechocystis sp. PCC6803 and from Nostoc punctiforme. One of the newly engineered split intein bearing C-terminal 15 residues showed more robust protein trans-splicing activity than naturally occurring split DnaE inteins in a foreign context. During the course of our experiments, we found that protein ligation by protein trans-splicing depended not only on the splicing junction sequences, but also on the foreign extein sequences. Furthermore, we could classify the protein trans-splicing reactions in foreign contexts with a simple kinetic model into three groups according to their kinetic parameters in the presence of various reducing agents. CONCLUSION: The shorter C-intein of the newly engineered split intein could be a useful tool for biotechnological applications including protein modification, incorporation of chemical probes, and segmental isotopic labelling. Based on kinetic analysis of the protein splicing reactions, we propose a general strategy to improve ligation yields by protein trans-splicing, which could significantly enhance the applications of protein ligation by protein trans-splicing.

  11. Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models

    National Research Council Canada - National Science Library

    Mead, Nancy R; Viswanathan, Venkatesh; Padmanabhan, Deepa; Raveendran, Anusha

    2008-01-01

    ...). This report is for information technology managers and security professionals, management personnel with technical and information security knowledge, and any personnel who manage security-critical...

  12. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  13. PIPE: a protein-protein interaction prediction engine based on the re-occurring short polypeptide sequences between known interacting protein pairs

    Directory of Open Access Journals (Sweden)

    Greenblatt Jack

    2006-07-01

    Full Text Available Abstract Background Identification of protein interaction networks has received considerable attention in the post-genomic era. The currently available biochemical approaches used to detect protein-protein interactions are all time and labour intensive. Consequently there is a growing need for the development of computational tools that are capable of effectively identifying such interactions. Results Here we explain the development and implementation of a novel Protein-Protein Interaction Prediction Engine termed PIPE. This tool is capable of predicting protein-protein interactions for any target pair of the yeast Saccharomyces cerevisiae proteins from their primary structure and without the need for any additional information or predictions about the proteins. PIPE showed a sensitivity of 61% for detecting any yeast protein interaction with 89% specificity and an overall accuracy of 75%. This rate of success is comparable to those associated with the most commonly used biochemical techniques. Using PIPE, we identified a novel interaction between YGL227W (vid30 and YMR135C (gid8 yeast proteins. This lead us to the identification of a novel yeast complex that here we term vid30 complex (vid30c. The observed interaction was confirmed by tandem affinity purification (TAP tag, verifying the ability of PIPE to predict novel protein-protein interactions. We then used PIPE analysis to investigate the internal architecture of vid30c. It appeared from PIPE analysis that vid30c may consist of a core and a secondary component. Generation of yeast gene deletion strains combined with TAP tagging analysis indicated that the deletion of a member of the core component interfered with the formation of vid30c, however, deletion of a member of the secondary component had little effect (if any on the formation of vid30c. Also, PIPE can be used to analyse yeast proteins for which TAP tagging fails, thereby allowing us to predict protein interactions that are not

  14. Self-Assembly of Protein Monolayers Engineered for Improved Monoclonal Immunoglobulin G Binding

    Directory of Open Access Journals (Sweden)

    Jeremy H. Lakey

    2011-08-01

    Full Text Available Bacterial outer membrane proteins, along with a filling lipid molecule can be modified to form stable self-assembled monolayers on gold. The transmembrane domain of Escherichia coli outer membrane protein A has been engineered to create a scaffold protein to which functional motifs can be fused. In earlier work we described the assembly and structure of an antibody-binding array where the Z domain of Staphylococcus aureus protein A was fused to the scaffold protein. Whilst the binding of rabbit polyclonal immunoglobulin G (IgG to the array is very strong, mouse monoclonal IgG dissociates from the array easily. This is a problem since many immunodiagnostic tests rely upon the use of mouse monoclonal antibodies. Here we describe a strategy to develop an antibody-binding array that will bind mouse monoclonal IgG with lowered dissociation from the array. A novel protein consisting of the scaffold protein fused to two pairs of Z domains separated by a long flexible linker was manufactured. Using surface plasmon resonance the self-assembly of the new protein on gold and the improved binding of mouse monoclonal IgG were demonstrated.

  15. Mis-translation of a Computationally Designed Protein Yields an Exceptionally Stable Homodimer: Implications for Protein Engineering and Evolution.

    Energy Technology Data Exchange (ETDEWEB)

    Dantas, Gautam; Watters, Alexander L.; Lunde, Bradley; Eletr, Ziad; Isern, Nancy G.; Roseman, Toby; Lipfert, Jan; Doniach, Sebastian; Tompa, Martin; Kuhlman, Brian; Stoddard, Barry L.; Varani, Gabriele; Baker, David

    2006-10-06

    We recently used computational protein design to create an extremely stable, globular protein, Top7, with a sequence and fold not observed previously in nature. Since Top7 was created in the absence of genetic selection, it provides a rare opportunity to investigate aspects of the cellular protein production and surveillance machinery that are subject to natural selection. Here we show that a portion of the Top7 protein corresponding to the final 49 C-terminal residues is efficiently mistranslated and accumulates at high levels in E. coli. We used circular dichroism spectroscopy, size-exclusion chromatography, small-angle x-ray scattering, analytical ultra-centrifugation, and NMR spectroscopy to show that the resulting CFr protein adopts a compact, extremely-stable, obligate, symmetric, homo-dimeric structure. Based on the solution structure, we engineered an even more stable variant of CFr by disulfide-induced covalent circularisation that should be an excellent platform for design of novel functions. The accumulation of high levels of CFr exposes the high error rate of the protein translation machinery, and the rarity of correspondingly stable fragments in natural proteins implies a stringent evolutionary pressure against protein sub-fragments that can independently fold into stable structures. The symmetric self-association between two identical mistranslated CFr sub-units to generate an extremely stable structure parallels a mechanism for natural protein-fold evolution by modular recombination of stable protein sub-structures.

  16. Translation system engineering in Escherichia coli enhances non-canonical amino acid incorporation into proteins.

    Science.gov (United States)

    Gan, Rui; Perez, Jessica G; Carlson, Erik D; Ntai, Ioanna; Isaacs, Farren J; Kelleher, Neil L; Jewett, Michael C

    2017-05-01

    The ability to site-specifically incorporate non-canonical amino acids (ncAAs) into proteins has made possible the study of protein structure and function in fundamentally new ways, as well as the bio synthesis of unnatural polymers. However, the task of site-specifically incorporating multiple ncAAs into proteins with high purity and yield continues to present a challenge. At the heart of this challenge lies the lower efficiency of engineered orthogonal translation system components compared to their natural counterparts (e.g., translation elements that specifically use a ncAA and do not interact with the cell's natural translation apparatus). Here, we show that evolving and tuning expression levels of multiple components of an engineered translation system together as a whole enhances ncAA incorporation efficiency. Specifically, we increase protein yield when incorporating multiple p-azido-phenylalanine(pAzF) residues into proteins by (i) evolving the Methanocaldococcus jannaschii p-azido-phenylalanyl-tRNA synthetase anti-codon binding domain, (ii) evolving the elongation factor Tu amino acid-binding pocket, and (iii) tuning the expression of evolved translation machinery components in a single vector. Use of the evolved translation machinery in a genomically recoded organism lacking release factor one enabled enhanced multi-site ncAA incorporation into proteins. We anticipate that our approach to orthogonal translation system development will accelerate and expand our ability to site-specifically incorporate multiple ncAAs into proteins and biopolymers, advancing new horizons for synthetic and chemical biotechnology. Biotechnol. Bioeng. 2017;114: 1074-1086. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  17. Applications of Engineered DNA-Binding Molecules Such as TAL Proteins and the CRISPR/Cas System in Biology Research

    Directory of Open Access Journals (Sweden)

    Toshitsugu Fujita

    2015-09-01

    Full Text Available Engineered DNA-binding molecules such as transcription activator-like effector (TAL or TALE proteins and the clustered regularly interspaced short palindromic repeats (CRISPR and CRISPR-associated proteins (Cas (CRISPR/Cas system have been used extensively for genome editing in cells of various types and species. The sequence-specific DNA-binding activities of these engineered DNA-binding molecules can also be utilized for other purposes, such as transcriptional activation, transcriptional repression, chromatin modification, visualization of genomic regions, and isolation of chromatin in a locus-specific manner. In this review, we describe applications of these engineered DNA-binding molecules for biological purposes other than genome editing.

  18. The Utah Nuclear Engineering Program and DevonWay are Developing One and Unique Approach to PLiM for Securing the Nation's Nuclear Future

    International Nuclear Information System (INIS)

    Jevremovic, Tatjana; Choe, Dongok; Yang, Haori; White, Sally; Kelly, Mike

    2012-01-01

    The safety culture involving a comprehensive training of the employed engineers at the power plant facilities is neither a simple nor a straightforward task. With aging management and operators, impact of the Fukushima nuclear event, unforeseen and timely unpredictable effects of nuclear memories (Three Mile Island, Chernobyl, Second World War) as evoked every time we have worldwide challenges or discussions of where the nuclear technology will/would further develop, we face a fearful question - is our educational and training approach the right one; is it going to assure continuous and secured practices in providing safe operation of our nuclear power plants?... We at the University of Utah with our just recently revitalized Nuclear Engineering Program, find that the root of securing the safety culture and providing its sustainability in our existing and future nuclear power plants, lies in very early educational practices. We believe that every program in nuclear engineering education shall include training in nuclear safety. That training shall certainly include industrial based practices and involve experts from the companies that develop and contribute to nuclear power safety to add to class practices at the University teaching settings. Working with DevonWay, a leading company in developing software to improve the safety cultures at nuclear power plants in the country, we have implemented the 'Track and Trace' software into our nuclear engineering program, emphasizing high quality training of our undergraduate and graduate students, and promoting a higher level safety culture practices at our nuclear engineering facilities. (author)

  19. Apatite nano-crystalline surface modification of poly(lactide-co-glycolide) sintered microsphere scaffolds for bone tissue engineering: implications for protein adsorption.

    Science.gov (United States)

    Jabbarzadeh, Ehsan; Nair, Lakshmi S; Khan, Yusuf M; Deng, Meng; Laurencin, Cato T

    2007-01-01

    A number of bone tissue engineering approaches are aimed at (i) increasing the osteconductivity and osteoinductivity of matrices, and (ii) incorporating bioactive molecules within the scaffolds. In this study we examined the growth of a nano-crystalline mineral layer on poly(lactide-co-glycolide) (PLAGA) sintered microsphere scaffolds for tissue engineering. In addition, the influence of the mineral precipitate layer on protein adsorption on the scaffolds was studied. Scaffolds were mineralized by incubation in simulated body fluid (SBF). Scanning electron microscopy (SEM) analysis revealed that mineralized scaffolds possess a rough surface with a plate-like nanostructure covering the surface of microspheres. The results of protein adsorption and release studies showed that while the protein release pattern was similar for PLAGA and mineralized PLAGA scaffolds, precipitation of the mineral layer on PLAGA led to enhanced protein adsorption and slower protein release. Mineralization of tissue-engineered surfaces provides a method for both imparting bioactivity and controlling levels of protein adsorption and release.

  20. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... Security Challenges; Accelerating Innovation Through Systems Analysis; and Leveraging Industry for Impact... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  1. Security and privacy for implantable medical devices

    CERN Document Server

    Carrara, Sandro

    2014-01-01

     This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).  It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have  recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in C...

  2. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0071] Homeland Security Science and... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and...

  3. Homology modeling and protein engineering of alkane monooxygenase in Burkholderia thailandensis MSMB121: in silico insights.

    Science.gov (United States)

    Jain, Chakresh Kumar; Gupta, Money; Prasad, Yamuna; Wadhwa, Gulshan; Sharma, Sanjeev Kumar

    2014-07-01

    The degradation of hydrocarbons plays an important role in the eco-balancing of petroleum products, pesticides and other toxic products in the environment. The degradation of hydrocarbons by microbes such as Geobacillus thermodenitrificans, Burkhulderia, Gordonia sp. and Acinetobacter sp. has been studied intensively in the literature. The present study focused on the in silico protein engineering of alkane monooxygenase (ladA)-a protein involved in the alkane degradation pathway. We demonstrated the improvement in substrate binding energy with engineered ladA in Burkholderia thailandensis MSMB121. We identified an ortholog of ladA monooxygenase found in B. thailandensis MSMB121, and showed it to be an enzyme involved in an alkane degradation pathway studied extensively in Geobacillus thermodenitrificans. Homology modeling of the three-dimensional structure of ladA was performed with a crystal structure (protein databank ID: 3B9N) as a template in MODELLER 9v11, and further validated using PROCHECK, VERIFY-3D and WHATIF tools. Specific amino acids were substituted in the region corresponding to amino acids 305-370 of ladA protein, resulting in an enhancement of binding energy in different alkane chain molecules as compared to wild protein structures in the docking experiments. The substrate binding energy with the protein was calculated using Vina (Implemented in VEGAZZ). Molecular dynamics simulations were performed to study the dynamics of different alkane chain molecules inside the binding pockets of wild and mutated ladA. Here, we hypothesize an improvement in binding energies and accessibility of substrates towards engineered ladA enzyme, which could be further facilitated for wet laboratory-based experiments for validation of the alkane degradation pathway in this organism.

  4. Engineer medium and feed for modulating N-glycosylation of recombinant protein production in CHO cell culture

    DEFF Research Database (Denmark)

    Fan, Yuzhou; Kildegaard, Helene Faustrup; Andersen, Mikael Rørdam

    2017-01-01

    Chinese hamster ovary (CHO) cells have become the primary expression system for the production of complex recombinant proteins due to their long-term success in industrial scale production and generating appropriate protein N-glycans similar to that of humans. Control and optimization of protein N......-glycosylation is crucial, as the structure of N-glycans can largely influence both biological and physicochemical properties of recombinant proteins. Protein N-glycosylation in CHO cell culture can be controlled and tuned by engineering medium, feed, culture process, as well as genetic elements of the cell...

  5. A fluorescent cassette-based strategy for engineering multiple domain fusion proteins

    Directory of Open Access Journals (Sweden)

    Khorchid Ahmad

    2003-07-01

    Full Text Available Abstract Background The engineering of fusion proteins has become increasingly important and most recently has formed the basis of many biosensors, protein purification systems, and classes of new drugs. Currently, most fusion proteins consist of three or fewer domains, however, more sophisticated designs could easily involve three or more domains. Using traditional subcloning strategies, this requires micromanagement of restriction enzymes sites that results in complex workaround solutions, if any at all. Results Therefore, to aid in the efficient construction of fusion proteins involving multiple domains, we have created a new expression vector that allows us to rapidly generate a library of cassettes. Cassettes have a standard vector structure based on four specific restriction endonuclease sites and using a subtle property of blunt or compatible cohesive end restriction enzymes, they can be fused in any order and number of times. Furthermore, the insertion of PCR products into our expression vector or the recombination of cassettes can be dramatically simplified by screening for the presence or absence of fluorescence. Conclusions Finally, the utility of this new strategy was demonstrated by the creation of basic cassettes for protein targeting to subcellular organelles and for protein purification using multiple affinity tags.

  6. Geological disposal: security and R and D. Security of 'second draft for R and D of geological disposal'

    International Nuclear Information System (INIS)

    Shiotsuki, Masao; Miyahara, Kaname

    2003-01-01

    The second draft for R and D of geological disposal (second draft) was arranged in 1999. The idea of security of geological disposal in the second draft is explained. The evaluation results of the uncertainty analysis and an example of evaluation of the effect of separation nuclear transmutation on the geological disposal are shown. The construction of strong engineered barrier is a basic idea of geological disposal system. Three processes such as isolation, engineering countermeasures and safety evaluation are carried out for the security of geological disposal. The security of geological environment for a long time of 12 sites in Japan was studied by data. Provability of production and enforcement of engineered barrier were confirmed by trial of over pack, tests and the present and future technologies developed. By using the conditions of reference case in the second draft, the evaluation results of dose effects in the two cases: 1) 90 to 99% Cs and Sr removed from HLW (High Level radioactive Waste) and 2) high stripping ratio of actinium series are explained. (S.Y.)

  7. Development of transport mechanical engineering as the condition of maintenance of social and economic security of region

    Directory of Open Access Journals (Sweden)

    Vsevolod Petrovich Babushkin

    2012-12-01

    Full Text Available In the article, the transport role in the decision of problems of innovative and scientifically-technological development of territory is defined. Dependence of quality, completeness and timeliness of granting of transport services on replenishment and updating of park of locomotives, cars, i.e. from a level of development of domestic transport mechanical engineering is shown. The basic problems of development given branches –low competitiveness of made production are revealed. The basic accent in the course of such analysis is made on research of competitive possibilities of the enterprises of railway mechanical engineering of Sverdlovsk area. Such enterprises play the increasing role, become points of development of region’s economy and maintenance of its social and economic safety. The cooperation communications, which have developed in an industrial complex of Sverdlovsk area on the basis of development of modern manufacture on building of electric locomotives, have allowed to generate in region cluster railway mechanical engineering. The structure cluster is shown, development prospects, the estimation of its influence on the economy of Sverdlovsk area and maintenance of its social and economic security is given

  8. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... its business. ADDRESSES: The meeting will be held at the Department of Homeland Security (DHS... as new developments in systems engineering, cyber-security, knowledge management and how best to... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  9. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... HSSTAC input on how to improve that collaboration. --Cyber Security and the evolution of the Cyber... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...

  10. P185-M Protein Identification and Validation of Results in Workflows that Integrate over Various Instruments, Datasets, Search Engines

    Science.gov (United States)

    Hufnagel, P.; Glandorf, J.; Körting, G.; Jabs, W.; Schweiger-Hufnagel, U.; Hahner, S.; Lubeck, M.; Suckau, D.

    2007-01-01

    Analysis of complex proteomes often results in long protein lists, but falls short in measuring the validity of identification and quantification results on a greater number of proteins. Biological and technical replicates are mandatory, as is the combination of the MS data from various workflows (gels, 1D-LC, 2D-LC), instruments (TOF/TOF, trap, qTOF or FTMS), and search engines. We describe a database-driven study that combines two workflows, two mass spectrometers, and four search engines with protein identification following a decoy database strategy. The sample was a tryptically digested lysate (10,000 cells) of a human colorectal cancer cell line. Data from two LC-MALDI-TOF/TOF runs and a 2D-LC-ESI-trap run using capillary and nano-LC columns were submitted to the proteomics software platform ProteinScape. The combined MALDI data and the ESI data were searched using Mascot (Matrix Science), Phenyx (GeneBio), ProteinSolver (Bruker and Protagen), and Sequest (Thermo) against a decoy database generated from IPI-human in order to obtain one protein list across all workflows and search engines at a defined maximum false-positive rate of 5%. ProteinScape combined the data to one LC-MALDI and one LC-ESI dataset. The initial separate searches from the two combined datasets generated eight independent peptide lists. These were compiled into an integrated protein list using the ProteinExtractor algorithm. An initial evaluation of the generated data led to the identification of approximately 1200 proteins. Result integration on a peptide level allowed discrimination of protein isoforms that would not have been possible with a mere combination of protein lists.

  11. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  12. Integrated security system definition

    International Nuclear Information System (INIS)

    Campbell, G.K.; Hall, J.R. II

    1985-01-01

    The objectives of an integrated security system are to detect intruders and unauthorized activities with a high degree of reliability and the to deter and delay them until effective response/engagement can be accomplished. Definition of an effective integrated security system requires proper application of a system engineering methodology. This paper summarizes a methodology and describes its application to the problem of integrated security system definition. This process includes requirements identification and analysis, allocation of identified system requirements to the subsystem level and provides a basis for identification of synergistic subsystem elements and for synthesis into an integrated system. The paper discusses how this is accomplished, emphasizing at each step how system integration and subsystem synergism is considered. The paper concludes with the product of the process: implementation of an integrated security system

  13. Engineering security agreements against external insider threat

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Cleeff, A.; van Eck, Pascal; Wieringa, Roelf J.

    2013-01-01

    Companies are increasingly engaging in complex inter-organisational networks of business and trading part- ners, service and managed security providers to run their operations. Therefore, it is now common to outsource critical business processes and to completely move IT resources to the custody of

  14. A genetic replacement system for selection-based engineering of essential proteins

    Science.gov (United States)

    2012-01-01

    Background Essential genes represent the core of biological functions required for viability. Molecular understanding of essentiality as well as design of synthetic cellular systems includes the engineering of essential proteins. An impediment to this effort is the lack of growth-based selection systems suitable for directed evolution approaches. Results We established a simple strategy for genetic replacement of an essential gene by a (library of) variant(s) during a transformation. The system was validated using three different essential genes and plasmid combinations and it reproducibly shows transformation efficiencies on the order of 107 transformants per microgram of DNA without any identifiable false positives. This allowed for reliable recovery of functional variants out of at least a 105-fold excess of non-functional variants. This outperformed selection in conventional bleach-out strains by at least two orders of magnitude, where recombination between functional and non-functional variants interfered with reliable recovery even in recA negative strains. Conclusions We propose that this selection system is extremely suitable for evaluating large libraries of engineered essential proteins resulting in the reliable isolation of functional variants in a clean strain background which can readily be used for in vivo applications as well as expression and purification for use in in vitro studies. PMID:22898007

  15. Tissue-engineered matrices as functional delivery systems: adsorption and release of bioactive proteins from degradable composite scaffolds.

    Science.gov (United States)

    Cushnie, Emily K; Khan, Yusuf M; Laurencin, Cato T

    2010-08-01

    A tissue-engineered bone graft should imitate the ideal autograft in both form and function. However, biomaterials that have appropriate chemical and mechanical properties for grafting applications often lack biological components that may enhance regeneration. The concept of adding proteins such as growth factors to scaffolds has therefore emerged as a possible solution to improve overall graft design. In this study, we investigated this concept by loading porous hydroxyapatite-poly(lactide-co-glycolide) (HA-PLAGA) scaffolds with a model protein, cytochrome c, and then studying its release in a phosphate-buffered saline solution. The HA-PLAGA scaffold has previously been shown to be bioactive, osteoconductive, and to have appropriate physical properties for tissue engineering applications. The loading experiments demonstrated that the HA-PLAGA scaffold could also function effectively as a substrate for protein adsorption and release. Scaffold protein adsorptive loading (as opposed to physical entrapment within the matrix) was directly related to levels of scaffold HA-content. The HA phase of the scaffold facilitated protein retention in the matrix following incubation in aqueous buffer for periods up to 8 weeks. Greater levels of protein retention time may improve the protein's effective activity by increasing the probability for protein-cell interactions. The ability to control protein loading and delivery simply via composition of the HA-PLAGA scaffold offers the potential of forming robust functionalized bone grafts. (c) 2010 Wiley Periodicals, Inc.

  16. Keeping electronic records secure.

    Science.gov (United States)

    Easton, David

    2013-10-01

    Are electronic engineering maintenance records relating to the hospital estate or a medical device as important as electronic patient records? Computer maintenance management systems (CMMS) are increasingly being used to manage all-round maintenance activities. However, the accuracy of the data held on them, and a level of security that prevents tampering with records, or other unauthorised changes to them to 'cover' poor practice, are both essential, so that, should an individual be injured or killed on hospital grounds, and a law suit follow, the estates team can be confident that it has accurate data to prove it has fulfilled its duty of care. Here David Easton MSc CEng FIHEEM MIET, director of Zener Engineering Services, and chair of IHEEM's Medical Devices Advisory Group, discusses the issues around maintenance databases, and the security and integrity of maintenance data.

  17. A dual-mode secure UHF RFID tag with a crypto engine in 0.13-μm CMOS

    Science.gov (United States)

    Tao, Yang; Linghao, Zhu; Xi, Tan; Junyu, Wang; Lirong, Zheng; Hao, Min

    2016-07-01

    An ultra-high-frequency (UHF) radio frequency identification (RFID) secure tag chip with a non-crypto mode and a crypto mode is presented. During the supply chain management, the tag works in the non-crypto mode in which the on-chip crypto engine is not enabled and the tag chip has a sensitivity of -12.8 dBm for long range communication. At the point of sales (POS), the tag will be switched to the crypto mode in order to protect the privacy of customers. In the crypto mode, an advanced encryption standard (AES) crypto engine is enabled and the sensitivity of the tag chip is switched to +2 dBm for short range communication, which is a method of physical protection. The tag chip is implemented and verified in a standard 0.13-μm CMOS process. Project supported by the National Science & Technology Pillar Program of China (No. 2015BAK36B01).

  18. Protein- protein interaction detection system using fluorescent protein microdomains

    Science.gov (United States)

    Waldo, Geoffrey S.; Cabantous, Stephanie

    2010-02-23

    The invention provides a protein labeling and interaction detection system based on engineered fragments of fluorescent and chromophoric proteins that require fused interacting polypeptides to drive the association of the fragments, and further are soluble and stable, and do not change the solubility of polypeptides to which they are fused. In one embodiment, a test protein X is fused to a sixteen amino acid fragment of GFP (.beta.-strand 10, amino acids 198-214), engineered to not perturb fusion protein solubility. A second test protein Y is fused to a sixteen amino acid fragment of GFP (.beta.-strand 11, amino acids 215-230), engineered to not perturb fusion protein solubility. When X and Y interact, they bring the GFP strands into proximity, and are detected by complementation with a third GFP fragment consisting of GFP amino acids 1-198 (strands 1-9). When GFP strands 10 and 11 are held together by interaction of protein X and Y, they spontaneous association with GFP strands 1-9, resulting in structural complementation, folding, and concomitant GFP fluorescence.

  19. Engineering and Application of Zinc Finger Proteins and TALEs for Biomedical Research.

    Science.gov (United States)

    Kim, Moon-Soo; Kini, Anu Ganesh

    2017-08-01

    Engineered DNA-binding domains provide a powerful technology for numerous biomedical studies due to their ability to recognize specific DNA sequences. Zinc fingers (ZF) are one of the most common DNA-binding domains and have been extensively studied for a variety of applications, such as gene regulation, genome engineering and diagnostics. Another novel DNA-binding domain known as a transcriptional activator-like effector (TALE) has been more recently discovered, which has a previously undescribed DNA-binding mode. Due to their modular architecture and flexibility, TALEs have been rapidly developed into artificial gene targeting reagents. Here, we describe the methods used to design these DNA-binding proteins and their key applications in biomedical research.

  20. DoD Identity Matching Engine for Security and Analysis (IMESA) Access to Criminal Justice Information (CJI) and Terrorist Screening Databases (TSDB)

    Science.gov (United States)

    2016-05-04

    Department of Defense INSTRUCTION NUMBER 5525.19 May 4, 2016 USD(P&R) SUBJECT: DoD Identity Matching Engine for Security and Analysis...DoD Identity Management Capability Enterprise Services Application (IMESA) Access to FBI National Crime Information Center (NCIC) Files,” April 22...Coordinates with: (1) The USD(I) for oversight and maintenance responsibilities, and for changes to digital DoD personnel identity data and

  1. Teaching Information Security Students to "Think thief"

    NARCIS (Netherlands)

    Hartel, Pieter H.; Junger, Marianne

    2012-01-01

    We report on an educational experiment where information security master students were encouraged to think out of the box. Instead of taking the usual point of view of the security engineer we challenged the students to take the point of view of the motivated offender. We report on the exciting

  2. Cell biology of sarcomeric protein engineering: disease modeling and therapeutic potential.

    Science.gov (United States)

    Thompson, Brian R; Metzger, Joseph M

    2014-09-01

    The cardiac sarcomere is the functional unit for myocyte contraction. Ordered arrays of sarcomeric proteins, held in stoichiometric balance with each other, respond to calcium to coordinate contraction and relaxation of the heart. Altered sarcomeric structure-function underlies the primary basis of disease in multiple acquired and inherited heart disease states. Hypertrophic and restrictive cardiomyopathies are caused by inherited mutations in sarcomeric genes and result in altered contractility. Ischemia-mediated acidosis directly alters sarcomere function resulting in decreased contractility. In this review, we highlight the use of acute genetic engineering of adult cardiac myocytes through stoichiometric replacement of sarcomeric proteins in these disease states with particular focus on cardiac troponin I. Stoichiometric replacement of disease causing mutations has been instrumental in defining the molecular mechanisms of hypertrophic and restrictive cardiomyopathy in a cellular context. In addition, taking advantage of stoichiometric replacement through gene therapy is discussed, highlighting the ischemia-resistant histidine-button, A164H cTnI. Stoichiometric replacement of sarcomeric proteins offers a potential gene therapy avenue to replace mutant proteins, alter sarcomeric responses to pathophysiologic insults, or neutralize altered sarcomeric function in disease. © 2014 Wiley Periodicals, Inc.

  3. Efficient myogenic differentiation of human adipose-derived stem cells by the transduction of engineered MyoD protein

    Energy Technology Data Exchange (ETDEWEB)

    Sung, Min Sun [Korea Research Institute of Bioscience and Biotechnology (KRIBB), 125 Gwahak-ro, Yuseong-gu, Daejeon 305-806 (Korea, Republic of); Biosystems and Bioengineering Program, University of Science and Technology (UST), Daejeon 305-350 (Korea, Republic of); Mun, Ji-Young [Korea Research Institute of Bioscience and Biotechnology (KRIBB), 125 Gwahak-ro, Yuseong-gu, Daejeon 305-806 (Korea, Republic of); Kwon, Ohsuk [Korea Research Institute of Bioscience and Biotechnology (KRIBB), 125 Gwahak-ro, Yuseong-gu, Daejeon 305-806 (Korea, Republic of); Biosystems and Bioengineering Program, University of Science and Technology (UST), Daejeon 305-350 (Korea, Republic of); Kwon, Ki-Sun [Korea Research Institute of Bioscience and Biotechnology (KRIBB), 125 Gwahak-ro, Yuseong-gu, Daejeon 305-806 (Korea, Republic of); Oh, Doo-Byoung, E-mail: dboh@kribb.re.kr [Korea Research Institute of Bioscience and Biotechnology (KRIBB), 125 Gwahak-ro, Yuseong-gu, Daejeon 305-806 (Korea, Republic of); Biosystems and Bioengineering Program, University of Science and Technology (UST), Daejeon 305-350 (Korea, Republic of)

    2013-07-19

    Highlights: •MyoD was engineered to contain protein transduction domain and endosome-disruptive INF7 peptide. •The engineered MyoD-IT showed efficient nuclear targeting through an endosomal escape by INF7 peptide. •By applying MyoD-IT, human adipose-derived stem cells (hASCs) were differentiated into myogenic cells. •hASCs differentiated by applying MyoD-IT fused to myotubes through co-culturing with mouse myoblasts. •Myogenic differentiation using MyoD-IT is a safe method without the concern of altering the genome. -- Abstract: Human adipose-derived stem cells (hASCs) have great potential as cell sources for the treatment of muscle disorders. To provide a safe method for the myogenic differentiation of hASCs, we engineered the MyoD protein, a key transcription factor for myogenesis. The engineered MyoD (MyoD-IT) was designed to contain the TAT protein transduction domain for cell penetration and the membrane-disrupting INF7 peptide, which is an improved version of the HA2 peptide derived from influenza. MyoD-IT showed greatly improved nuclear targeting ability through an efficient endosomal escape induced by the pH-sensitive membrane disruption of the INF7 peptide. By applying MyoD-IT to a culture, hASCs were efficiently differentiated into long spindle-shaped myogenic cells expressing myosin heavy chains. Moreover, these cells differentiated by an application of MyoD-IT fused to myotubes with high efficiency through co-culturing with mouse C2C12 myoblasts. Because internalized proteins can be degraded in cells without altering the genome, the myogenic differentiation of hASCs using MyoD-IT would be a safe and clinically applicable method.

  4. Efficient myogenic differentiation of human adipose-derived stem cells by the transduction of engineered MyoD protein

    International Nuclear Information System (INIS)

    Sung, Min Sun; Mun, Ji-Young; Kwon, Ohsuk; Kwon, Ki-Sun; Oh, Doo-Byoung

    2013-01-01

    Highlights: •MyoD was engineered to contain protein transduction domain and endosome-disruptive INF7 peptide. •The engineered MyoD-IT showed efficient nuclear targeting through an endosomal escape by INF7 peptide. •By applying MyoD-IT, human adipose-derived stem cells (hASCs) were differentiated into myogenic cells. •hASCs differentiated by applying MyoD-IT fused to myotubes through co-culturing with mouse myoblasts. •Myogenic differentiation using MyoD-IT is a safe method without the concern of altering the genome. -- Abstract: Human adipose-derived stem cells (hASCs) have great potential as cell sources for the treatment of muscle disorders. To provide a safe method for the myogenic differentiation of hASCs, we engineered the MyoD protein, a key transcription factor for myogenesis. The engineered MyoD (MyoD-IT) was designed to contain the TAT protein transduction domain for cell penetration and the membrane-disrupting INF7 peptide, which is an improved version of the HA2 peptide derived from influenza. MyoD-IT showed greatly improved nuclear targeting ability through an efficient endosomal escape induced by the pH-sensitive membrane disruption of the INF7 peptide. By applying MyoD-IT to a culture, hASCs were efficiently differentiated into long spindle-shaped myogenic cells expressing myosin heavy chains. Moreover, these cells differentiated by an application of MyoD-IT fused to myotubes with high efficiency through co-culturing with mouse C2C12 myoblasts. Because internalized proteins can be degraded in cells without altering the genome, the myogenic differentiation of hASCs using MyoD-IT would be a safe and clinically applicable method

  5. Software To Secure Distributed Propulsion Simulations

    Science.gov (United States)

    Blaser, Tammy M.

    2003-01-01

    Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn Research Center, and its industry partners, has taken an active role in mitigating the security threats associated with developing and operating their proprietary aerospace propulsion simulations. In particular, they are developing a collaborative Common Object Request Broker Architecture (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines

  6. Perimeter security for Minnesota correctional facilities

    Energy Technology Data Exchange (ETDEWEB)

    Crist, D. [Minnesota Department of Corrections, St. Paul, MN (United States); Spencer, D.D. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.

  7. Iris Cryptography for Security Purpose

    Science.gov (United States)

    Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.

    2018-04-01

    In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.

  8. Cyber security best practices for the nuclear industry

    International Nuclear Information System (INIS)

    Badr, I.

    2012-01-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  9. Cyber security best practices for the nuclear industry

    Energy Technology Data Exchange (ETDEWEB)

    Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  10. Arming Technology in Yeast-Novel Strategy for Whole-cell Biocatalyst and Protein Engineering.

    Science.gov (United States)

    Kuroda, Kouichi; Ueda, Mitsuyoshi

    2013-09-09

    Cell surface display of proteins/peptides, in contrast to the conventional intracellular expression, has many attractive features. This arming technology is especially effective when yeasts are used as a host, because eukaryotic modifications that are often required for functional use can be added to the surface-displayed proteins/peptides. A part of various cell wall or plasma membrane proteins can be genetically fused to the proteins/peptides of interest to be displayed. This technology, leading to the generation of so-called "arming technology", can be employed for basic and applied research purposes. In this article, we describe various strategies for the construction of arming yeasts, and outline the diverse applications of this technology to industrial processes such as biofuel and chemical productions, pollutant removal, and health-related processes, including oral vaccines. In addition, arming technology is suitable for protein engineering and directed evolution through high-throughput screening that is made possible by the feature that proteins/peptides displayed on cell surface can be directly analyzed using intact cells without concentration and purification. Actually, novel proteins/peptides with improved or developed functions have been created, and development of diagnostic/therapeutic antibodies are likely to benefit from this powerful approach.

  11. Automated Security Testing of Web Widget Interactions

    NARCIS (Netherlands)

    Bezemer, C.P.; Mesbah, A.; Van Deursen, A.

    2009-01-01

    This paper is a pre-print of: Cor-Paul Bezemer, Ali Mesbah, and Arie van Deursen. Automated Security Testing of Web Widget Interactions. In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering

  12. Single-Point Mutation with a Rotamer Library Toolkit: Toward Protein Engineering.

    Science.gov (United States)

    Pottel, Joshua; Moitessier, Nicolas

    2015-12-28

    Protein engineers have long been hard at work to harness biocatalysts as a natural source of regio-, stereo-, and chemoselectivity in order to carry out chemistry (reactions and/or substrates) not previously achieved with these enzymes. The extreme labor demands and exponential number of mutation combinations have induced computational advances in this domain. The first step in our virtual approach is to predict the correct conformations upon mutation of residues (i.e., rebuilding side chains). For this purpose, we opted for a combination of molecular mechanics and statistical data. In this work, we have developed automated computational tools to extract protein structural information and created conformational libraries for each amino acid dependent on a variable number of parameters (e.g., resolution, flexibility, secondary structure). We have also developed the necessary tool to apply the mutation and optimize the conformation accordingly. For side-chain conformation prediction, we obtained overall average root-mean-square deviations (RMSDs) of 0.91 and 1.01 Å for the 18 flexible natural amino acids within two distinct sets of over 3000 and 1500 side-chain residues, respectively. The commonly used dihedral angle differences were also evaluated and performed worse than the state of the art. These two metrics are also compared. Furthermore, we generated a family-specific library for kinases that produced an average 2% lower RMSD upon side-chain reconstruction and a residue-specific library that yielded a 17% improvement. Ultimately, since our protein engineering outlook involves using our docking software, Fitted/Impacts, we applied our mutation protocol to a benchmarked data set for self- and cross-docking. Our side-chain reconstruction does not hinder our docking software, demonstrating differences in pose prediction accuracy of approximately 2% (RMSD cutoff metric) for a set of over 200 protein/ligand structures. Similarly, when docking to a set of over 100

  13. Protein engineering of CYP105s for their industrial uses.

    Science.gov (United States)

    Yasuda, Kaori; Sugimoto, Hiroshi; Hayashi, Keiko; Takita, Teisuke; Yasukawa, Kiyoshi; Ohta, Miho; Kamakura, Masaki; Ikushiro, Shinichi; Shiro, Yoshitsugu; Sakaki, Toshiyuki

    2018-01-01

    Cytochrome P450 enzymes belonging to the CYP105 family are predominantly found in bacteria belonging to the phylum Actinobacteria and the order Actinomycetales. In this review, we focused on the protein engineering of P450s belonging to the CYP105 family for industrial use. Two Arg substitutions to Ala of CYP105A1 enhanced its vitamin D 3 25- and 1α-hydroxylation activities by 400 and 100-fold, respectively. The coupling efficiency between product formation and NADPH oxidation was largely improved by the R84A mutation. The quintuple mutant Q87W/T115A/H132L/R194W/G294D of CYP105AB3 showed a 20-fold higher activity than the wild-type enzyme. Amino acids at positions 87 and 191 were located at the substrate entrance channel, and that at position 294 was located close to the heme group. Semi-rational engineering of CYP105A3 selected the best performing mutant, T85F/T119S/V194N/N363Y, for producing pravastatin. The T119S and N363Y mutations synergistically had remarkable effects on the interaction between CYP105A3 and putidaredoxin. Although wild-type CYP105AS1 hydroxylated compactin to 6-epi-pravastatin, the quintuple mutant I95T/Q127R/A180V/L236I/A265N converted almost all compactin to pravastatin. Five amino acid substitutions by two rounds of mutagenesis almost completely changed the stereo-selectivity of CYP105AS1. These results strongly suggest that the protein engineering of CYP105 enzymes greatly increase their industrial utility. This article is part of a Special Issue entitled: Cytochrome P450 biodiversity and biotechnology, edited by Erika Plettner, Gianfranco Gilardi, Luet Wong, Vlada Urlacher, Jared Goldstone. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Securities issues in reserves reporting

    International Nuclear Information System (INIS)

    Legg, M.B.

    1997-01-01

    Securities issues in oil and gas reserves reporting were discussed. Alberta requires specific information regarding important oil and gas properties, plants, facilities and installations. When preparing the reserves report, the following elements are important to consider: (1) the author of the report must be a registered professional engineer or registered professional geologist, (2) the report itself must be an engineering document, (3) the content of the report must be extensive, (4) it should be prepared in accordance with petroleum engineering and evaluation practices, and must include a summary of estimated net reserves

  15. Optimizing man-machine performance of a personnel access restriction security system

    International Nuclear Information System (INIS)

    Banks, W.W.; Moore, J.W.

    1988-01-01

    This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design

  16. Engineered, highly reactive substrates of microbial transglutaminase enable protein labeling within various secondary structure elements.

    Science.gov (United States)

    Rachel, Natalie M; Quaglia, Daniela; Lévesque, Éric; Charette, André B; Pelletier, Joelle N

    2017-11-01

    Microbial transglutaminase (MTG) is a practical tool to enzymatically form isopeptide bonds between peptide or protein substrates. This natural approach to crosslinking the side-chains of reactive glutamine and lysine residues is solidly rooted in food and textile processing. More recently, MTG's tolerance for various primary amines in lieu of lysine have revealed its potential for site-specific protein labeling with aminated compounds, including fluorophores. Importantly, MTG can label glutamines at accessible positions in the body of a target protein, setting it apart from most labeling enzymes that react exclusively at protein termini. To expand its applicability as a labeling tool, we engineered the B1 domain of Protein G (GB1) to probe the selectivity and enhance the reactivity of MTG toward its glutamine substrate. We built a GB1 library where each variant contained a single glutamine at positions covering all secondary structure elements. The most reactive and selective variants displayed a >100-fold increase in incorporation of a recently developed aminated benzo[a]imidazo[2,1,5-cd]indolizine-type fluorophore, relative to native GB1. None of the variants were destabilized. Our results demonstrate that MTG can react readily with glutamines in α-helical, β-sheet, and unstructured loop elements and does not favor one type of secondary structure. Introducing point mutations within MTG's active site further increased reactivity toward the most reactive substrate variant, I6Q-GB1, enhancing MTG's capacity to fluorescently label an engineered, highly reactive glutamine substrate. This work demonstrates that MTG-reactive glutamines can be readily introduced into a protein domain for fluorescent labeling. © 2017 The Protein Society.

  17. Strategies in megasynthase engineering – fatty acid synthases (FAS as model proteins

    Directory of Open Access Journals (Sweden)

    Manuel Fischer

    2017-06-01

    Full Text Available Megasynthases are large multienzyme proteins that produce a plethora of important natural compounds by catalyzing the successive condensation and modification of precursor units. Within the class of megasynthases, polyketide synthases (PKS are responsible for the production of a large spectrum of bioactive polyketides (PK, which have frequently found their way into therapeutic applications. Rational engineering approaches have been performed during the last 25 years that seek to employ the “assembly-line synthetic concept” of megasynthases in order to deliver new bioactive compounds. Here, we highlight PKS engineering strategies in the light of the newly emerging structural information on megasynthases, and argue that fatty acid synthases (FAS are and will be valuable objects for further developing this field.

  18. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  19. Geothermal reservoir engineering

    CERN Document Server

    Grant, Malcolm Alister

    2011-01-01

    As nations alike struggle to diversify and secure their power portfolios, geothermal energy, the essentially limitless heat emanating from the earth itself, is being harnessed at an unprecedented rate.  For the last 25 years, engineers around the world tasked with taming this raw power have used Geothermal Reservoir Engineering as both a training manual and a professional reference.  This long-awaited second edition of Geothermal Reservoir Engineering is a practical guide to the issues and tasks geothermal engineers encounter in the course of their daily jobs. The bo

  20. Security electronics circuits manual

    CERN Document Server

    MARSTON, R M

    1998-01-01

    Security Electronics Circuits Manual is an invaluable guide for engineers and technicians in the security industry. It will also prove to be a useful guide for students and experimenters, as well as providing experienced amateurs and DIY enthusiasts with numerous ideas to protect their homes, businesses and properties.As with all Ray Marston's Circuits Manuals, the style is easy-to-read and non-mathematical, with the emphasis firmly on practical applications, circuits and design ideas. The ICs and other devices used in the practical circuits are modestly priced and readily available ty

  1. Developing a secured social networking site using information security awareness techniques

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2014-11-01

    Full Text Available Background: Ever since social network sites (SNS became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has confirmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it.

  2. Handheld highly selective plasmonic chem/biosensor using engineered binding proteins for extreme conformational changes

    Science.gov (United States)

    Kosciolek, Derek J.; Sonar, Ajay; Lepak, Lori A.; Schnatz, Peter; Bendoym, Igor; Brown, Mia C.; Koder, Ronald L.; Crouse, David T.

    2017-08-01

    In this project we develop a handheld, portable, highly selective and sensitive chem/biosensor that has potential applications in both airborne and water-based environmental sensing. The device relies on a plasmonic chip of subwavelength-scale periodic gold rods engineered to resonate in the near infrared. The chip is functionalized with a novel class of proteins that exhibit large conformational changes upon binding to a specific target analyte. The subsequent change in local refractive index near the surface of the gold is one to two orders of magnitude greater than current conventional methods, which produces a readily measurable 5 to 10 percent difference in light transmission. This allows us to forgo traditional, bulky tabletop setups in favor of a compact form factor. Using commercially available optics to construct a transmission-based optical train, measured changes in bulk refractive index are presented here. While synthesis of binding protein efforts are focused on heme as analyte for proof of concept validation, the functionalized protein can be engineered to pair with a wide variety of analytes with minimal alterations to the plasmonic chip or device design. Such flexibility allows for this device to potentially meet the needs of first responders and health care professionals in a multitude of scenarios.

  3. 7 CFR 1753.17 - Engineering services.

    Science.gov (United States)

    2010-01-01

    ... form. (B) The contract will not accomplish loan purposes. (C) The engineering service fees are unreasonable. (D) The contract presents unacceptable loan security risk to RUS. (E) The consulting engineering... loan shall be rendered by a qualified engineer selected by the borrower or by qualified employees on...

  4. Aspect-oriented security hardening of UML design models

    CERN Document Server

    Mouheb, Djedjiga; Pourzandi, Makan; Wang, Lingyu; Nouh, Mariam; Ziarati, Raha; Alhadidi, Dima; Talhi, Chamseddine; Lima, Vitor

    2015-01-01

    This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The

  5. Catalysis by a de novo zinc-mediated protein interface: implications for natural enzyme evolution and rational enzyme engineering.

    Science.gov (United States)

    Der, Bryan S; Edwards, David R; Kuhlman, Brian

    2012-05-08

    Here we show that a recent computationally designed zinc-mediated protein interface is serendipitously capable of catalyzing carboxyester and phosphoester hydrolysis. Although the original motivation was to design a de novo zinc-mediated protein-protein interaction (called MID1-zinc), we observed in the homodimer crystal structure a small cleft and open zinc coordination site. We investigated if the cleft and zinc site at the designed interface were sufficient for formation of a primitive active site that can perform hydrolysis. MID1-zinc hydrolyzes 4-nitrophenyl acetate with a rate acceleration of 10(5) and a k(cat)/K(M) of 630 M(-1) s(-1) and 4-nitrophenyl phosphate with a rate acceleration of 10(4) and a k(cat)/K(M) of 14 M(-1) s(-1). These rate accelerations by an unoptimized active site highlight the catalytic power of zinc and suggest that the clefts formed by protein-protein interactions are well-suited for creating enzyme active sites. This discovery has implications for protein evolution and engineering: from an evolutionary perspective, three-coordinated zinc at a homodimer interface cleft represents a simple evolutionary path to nascent enzymatic activity; from a protein engineering perspective, future efforts in de novo design of enzyme active sites may benefit from exploring clefts at protein interfaces for active site placement.

  6. IdentiPy: an extensible search engine for protein identification in shotgun proteomics.

    Science.gov (United States)

    Levitsky, Lev I; Ivanov, Mark V; Lobas, Anna A; Bubis, Julia A; Tarasova, Irina A; Solovyeva, Elizaveta M; Pridatchenko, Marina L; Gorshkov, Mikhail V

    2018-04-23

    We present an open-source, extensible search engine for shotgun proteomics. Implemented in Python programming language, IdentiPy shows competitive processing speed and sensitivity compared with the state-of-the-art search engines. It is equipped with a user-friendly web interface, IdentiPy Server, enabling the use of a single server installation accessed from multiple workstations. Using a simplified version of X!Tandem scoring algorithm and its novel ``auto-tune'' feature, IdentiPy outperforms the popular alternatives on high-resolution data sets. Auto-tune adjusts the search parameters for the particular data set, resulting in improved search efficiency and simplifying the user experience. IdentiPy with the auto-tune feature shows higher sensitivity compared with the evaluated search engines. IdentiPy Server has built-in post-processing and protein inference procedures and provides graphic visualization of the statistical properties of the data set and the search results. It is open-source and can be freely extended to use third-party scoring functions or processing algorithms, and allows customization of the search workflow for specialized applications.

  7. Arming Technology in Yeast—Novel Strategy for Whole-cell Biocatalyst and Protein Engineering

    Directory of Open Access Journals (Sweden)

    Mitsuyoshi Ueda

    2013-09-01

    Full Text Available Cell surface display of proteins/peptides, in contrast to the conventional intracellular expression, has many attractive features. This arming technology is especially effective when yeasts are used as a host, because eukaryotic modifications that are often required for functional use can be added to the surface-displayed proteins/peptides. A part of various cell wall or plasma membrane proteins can be genetically fused to the proteins/peptides of interest to be displayed. This technology, leading to the generation of so-called “arming technology”, can be employed for basic and applied research purposes. In this article, we describe various strategies for the construction of arming yeasts, and outline the diverse applications of this technology to industrial processes such as biofuel and chemical productions, pollutant removal, and health-related processes, including oral vaccines. In addition, arming technology is suitable for protein engineering and directed evolution through high-throughput screening that is made possible by the feature that proteins/peptides displayed on cell surface can be directly analyzed using intact cells without concentration and purification. Actually, novel proteins/peptides with improved or developed functions have been created, and development of diagnostic/therapeutic antibodies are likely to benefit from this powerful approach.

  8. Optical and digital techniques for information security

    CERN Document Server

    2005-01-01

    Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies for Security Applications. This book encompases the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This Information Security book will draw on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report innovative technologies that can be applied to information security issues. The Advanced Sciences and Technologies for Security Applications series focuses on research monographs in the areas of: -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection...

  9. Problem of Information Security Traffic on Internet

    Directory of Open Access Journals (Sweden)

    Slavko Šarić

    2012-10-01

    Full Text Available Internet information traffic becomes greater and moreimportant. With increasing growth of information importancerequirement for its security becomes indispensable. Theinformation security problem especially affect large and smallcompanies whose prosperity is depending on Internet presence.This affecting the three areas of Internet commerce: credit cardtransactions, virtual private networks and digital certification.To ensure information traffic it is necessary to find a solution,in a proper way, for three major problems: frontier problem,market problem and government problem. While the eventualemergence of security standards for Internet transactions isexpected, it will not automatically result in secure Internettransactions. In future, there is a wealth of security issues thatwill continue to require attention: internal security, continuedhacking, social engineering, malicious code, reliability andperformance, skills shortages and denial of se1vice attacks.

  10. Center for Coastline Security Technology, Year-2

    National Research Council Canada - National Science Library

    Glegg, Stewart; Glenn, William; Furht, Borko; Beaujean, P. P; Frisk, G; Schock, S; VonEllenrieder, K; Ananthakrishnan, P; An, E; Granata, R

    2007-01-01

    ...), the Imaging Technology Center, the Department of Computer Science and Engineering, and the University Consortium for Intermodal Transportation Safety and Security at Florida Atlantic University...

  11. Engineering signal peptides for enhanced protein secretion from Lactococcus lactis.

    Science.gov (United States)

    Ng, Daphne T W; Sarkar, Casim A

    2013-01-01

    Lactococcus lactis is an attractive vehicle for biotechnological production of proteins and clinical delivery of therapeutics. In many such applications using this host, it is desirable to maximize secretion of recombinant proteins into the extracellular space, which is typically achieved by using the native signal peptide from a major secreted lactococcal protein, Usp45. In order to further increase protein secretion from L. lactis, inherent limitations of the Usp45 signal peptide (Usp45sp) must be elucidated. Here, we performed extensive mutagenesis on Usp45sp to probe the effects of both the mRNA sequence (silent mutations) and the peptide sequence (amino acid substitutions) on secretion. We screened signal peptides based on their resulting secretion levels of Staphylococcus aureus nuclease and further evaluated them for secretion of Bacillus subtilis α-amylase. Silent mutations alone gave an increase of up to 16% in the secretion of α-amylase through a mechanism consistent with relaxed mRNA folding around the ribosome binding site and enhanced translation. Targeted amino acid mutagenesis in Usp45sp, combined with additional silent mutations from the best clone in the initial screen, yielded an increase of up to 51% in maximum secretion of α-amylase while maintaining secretion at lower induction levels. The best sequence from our screen preserves the tripartite structure of the native signal peptide but increases the positive charge of the n-region. Our study presents the first example of an engineered L. lactis signal peptide with a higher secretion yield than Usp45sp and, more generally, provides strategies for further enhancing protein secretion in bacterial hosts.

  12. Engineer Medium and Feed for Modulating N-Glycosylation of Recombinant Protein Production in CHO Cell Culture.

    Science.gov (United States)

    Fan, Yuzhou; Kildegaard, Helene Faustrup; Andersen, Mikael Rørdam

    2017-01-01

    Chinese hamster ovary (CHO) cells have become the primary expression system for the production of complex recombinant proteins due to their long-term success in industrial scale production and generating appropriate protein N-glycans similar to that of humans. Control and optimization of protein N-glycosylation is crucial, as the structure of N-glycans can largely influence both biological and physicochemical properties of recombinant proteins. Protein N-glycosylation in CHO cell culture can be controlled and tuned by engineering medium, feed, culture process, as well as genetic elements of the cell. In this chapter, we will focus on how to carry out experiments for N-glycosylation modulation through medium and feed optimization. The workflow and typical methods involved in the experiment process will be presented.

  13. CASP CompTIA Advanced Security Practitioner Study Guide Exam CAS-001

    CERN Document Server

    Gregg, Michael

    2012-01-01

    Get Prepared for CompTIA Advanced Security Practitioner (CASP) Exam Targeting security professionals who either have their CompTIA Security+ certification or are looking to achieve a more advanced security certification, this CompTIA Authorized study guide is focused on the new CompTIA Advanced Security Practitioner (CASP) Exam CAS-001. Veteran IT security expert and author Michael Gregg details the technical knowledge and skills you need to conceptualize, design, and engineer secure solutions across complex enterprise environments. He prepares you for aspects of the certification test that as

  14. Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents

    Science.gov (United States)

    2015-01-01

    very large public and private fingerprint databases comprehensive risk analysis and system security contribution to developing international ...Safety and Security Program which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety...201 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 201 Science and Engineering

  15. Developments in the Nuclear Safeguards and Security Engineering Degree Program at Tomsk Polytechnic University

    International Nuclear Information System (INIS)

    Boiko, Vladimir I.; Demyanyuk, Dmitry G.; Silaev, Maxim E.; Duncan, Cristen L.; Heinberg, Cynthia L.; Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.

    2009-01-01

    Over the last six years, Tomsk Polytechnic University (TPU) has developed a 5 1/2 year engineering degree program in the field of Material Protection Control and Accounting (MPC and A). In 2009 the first students graduated with this new degree. There were 25 job offers from nuclear fuel cycle enterprises of Russia and Kazakhstan for 17 graduates of the program. Due to the rather wide selection of workplaces, all graduates have obtained positions at nuclear enterprises. The program was developed within the Applied Physics and Engineering Department (APED). The laboratory and methodological base has been created taking into consideration the experience of the similar program at the Moscow Engineering Physics Institute (MEPhI). However, the TPU program has some distinguishing features such as the inclusion of special courses pertaining to fuel enrichment and reprocessing. During the last two years, three MPC and A laboratories have been established at APED. This was made possible due to several factors such as establishment of the State innovative educational program at TPU, assistance of the U.S. Department of Energy through Pacific Northwest National Laboratory and Los Alamos National Laboratory, and the financial support of the Swedish Radiation Safety Authority and some Russian private companies. All three of the MPC and A laboratories are part of the Innovative Educational Center 'Nuclear Technologies and Non-Proliferation,' which deals with many topics including research activities, development of new curricula for experts training and retraining, and training of master's students. In 2008, TPU developed a relationship with the International Atomic Energy Agency (IAEA), which was familiarized with APED's current resources and activities. The IAEA has shown interest in creation of a master's degree educational program in the field of nuclear security at TPU. A future objective is to acquaint nuclear fuel cycle enterprises with new APED capabilities and involve

  16. A novel quantum scheme for secure two-party distance computation

    Science.gov (United States)

    Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun

    2017-12-01

    Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.

  17. Advanced Course in Engineering (ACE) - Cyber Security Boot Camp

    National Research Council Canada - National Science Library

    Older, Susan

    2008-01-01

    .... ACE achieved its stated objectives by completely immersing students in the cyber-security discipline for ten weeks, through a combination of intense coursework, open-ended problems, and internship...

  18. Zephyr: A secure Internet process to streamline engineering

    Energy Technology Data Exchange (ETDEWEB)

    Jordan, C.W.; Niven, W.A.; Cavitt, R.E. [and others

    1998-05-12

    Lawrence Livermore National Laboratory (LLNL) is implementing an Internet-based process pilot called `Zephyr` to streamline engineering and commerce using the Internet. Major benefits have accrued by using Zephyr in facilitating industrial collaboration, speeding the engineering development cycle, reducing procurement time, and lowering overall costs. Programs at LLNL are potentializing the efficiencies introduced since implementing Zephyr. Zephyr`s pilot functionality is undergoing full integration with Business Systems, Finance, and Vendors to support major programs at the Laboratory.

  19. Evaluation of Biological Toxicity of CdTe Quantum Dots with Different Coating Reagents according to Protein Expression of Engineering Escherichia coli

    Directory of Open Access Journals (Sweden)

    Wei Xu

    2015-01-01

    Full Text Available The results obtained from toxicity assessment of quantum dots (QDs can be used to establish guidelines for the application of QDs in bioimaging. This paper focused on the design of a novel method to evaluate the toxicity of CdTe QDs using engineering Escherichia coli as a model. The toxicity of mercaptoacetic acid (MPA, glutathione (GSH, and L-cysteine (Cys capped CdTe QDs was analyzed according to the heterologous protein expression in BL21/DE3, engineering Escherichia coli extensively used for protein expression. The results showed that the MPA-CdTe QDs had more serious toxicity than the other two kinds of CdTe QDs. The microscopic images and SEM micrographs further proved that both the proliferation and the protein expression of engineering Escherichia coli were inhibited after treatment with MPA-CdTe QDs. The proposed method is important to evaluate biological toxicity of both QDs and other nanoparticles.

  20. Security in a Web 2.0+ World A Standards Based Approach

    CERN Document Server

    Solari , Carlos Curtis

    2010-01-01

    Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know how to make effective security policy decisions to engineers who design ICT systems - a guide to information security and standards in the Web 2.0+ era. It provides an understanding of IT security in the converged world of communications technology based on the Internet Protocol. Many companies are currently applying security mo

  1. Three Perspectives on DSEEP and Security : Training Goals, Use Cases and the Selection of Security Measures

    NARCIS (Netherlands)

    Möller, B.; Croom-Johnson, S.; Huiskamp, W.

    2013-01-01

    As joint, combined and Civil-Military exercises are becoming increasingly common, the need for security in collective mission simulation is growing. SISO has developed the Distributed Simulation Engineering and Execution Process (DSEEP) standard that provides a recommended process for development,

  2. Guarding the Gates: Confronting Social Engineering in Nuclear Power

    International Nuclear Information System (INIS)

    LeClair, Jane

    2014-01-01

    The presentation is structured as follows: Overview; Physical Security; Data Security; Intrusion from the Outside; Intrusion From the Inside; Isolate ‘Protected’ Areas; Social Engineering; Questions?

  3. A study of authorization architectures for grid security

    International Nuclear Information System (INIS)

    Pang Yanguang; Sun Gongxing; Pei Erming; Ma Nan

    2006-01-01

    Grid security is one of key issues in grid computing, while current research focus is put on the grid authorization. There is a brief discussion about the drawback of the common GSI (Grid Security Infrastructure) authorization firstly, then analysis is made on the latest several grid authorization architectures, such as structures, policy descriptions, engines, applications, and finally their features are summarized. (authors)

  4. Computational Intelligence, Cyber Security and Computational Models

    CERN Document Server

    Anitha, R; Lekshmi, R; Kumar, M; Bonato, Anthony; Graña, Manuel

    2014-01-01

    This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

  5. TAL effectors: highly adaptable phytobacterial virulence factors and readily engineered DNA targeting proteins

    Science.gov (United States)

    Doyle, Erin L.; Stoddard, Barry L.; Voytas, Daniel F.; Bogdanove, Adam J.

    2013-01-01

    Transcription activator-like (TAL) effectors are transcription factors injected into plant cells by pathogenic bacteria in the genus Xanthomonas. They function as virulence factors by activating host genes important for disease, or as avirulence factors by turning on genes that provide resistance. DNA binding specificity is encoded by polymorphic repeats in each protein that correspond one-to-one with different nucleotides. This code has facilitated target identification and opened new avenues for engineering disease resistance. It has also enabled TAL effector customization for targeted gene control, genome editing, and other applications. This article reviews the structural basis for TAL effector-DNA specificity, the impact of the TAL effector-DNA code on plant pathology and engineered resistance, and recent accomplishments and future challenges in TAL effector-based DNA targeting. PMID:23707478

  6. Towards a Modernization Process for Secure Data Warehouses

    Science.gov (United States)

    Blanco, Carlos; Pérez-Castillo, Ricardo; Hernández, Arnulfo; Fernández-Medina, Eduardo; Trujillo, Juan

    Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints are not properly integrated in the complete DWs’ development process, being traditionally considered in the last stages. Furthermore, legacy systems need a reverse engineering process in order to accomplish re-documentation for detecting new security requirements as well as system’s design recovery to enable migration and reuse. Thus, we have proposed a model driven architecture (MDA) for secure DWs which takes into account security issues from the early stages of development and provides automatic transformations between models. This paper fulfills this architecture providing an architecture-driven modernization (ADM) process focused on obtaining conceptual security models from legacy OLAP systems.

  7. Modelling security properties in a grid-based operating system with anti-goals

    OpenAIRE

    Arenas, A.; Aziz, Benjamin; Bicarregui, J.; Matthews, B.; Yang, E.

    2008-01-01

    In this paper, we discuss the use of formal requirements-engineering techniques in capturing security requirements for a Grid-based operating system. We use KAOS goal model to represent two security goals for Grid systems, namely authorisation and single-sign on authentication. We apply goal-refinement to derive security requirements for these two security goals and we develop a model of antigoals and show how system vulnerabilities and threats to the security goals can arise from such anti-m...

  8. Social engineering: mitigating a stealthy risk.

    Science.gov (United States)

    Maas, Jos

    2014-01-01

    Can a Healthcare Facility (HCF) be victimized by Social Engineering (SE)? Yes, says the author If so, what can you do about it? This article explains what Social Engineering is; how it is used; and how to use proactive security to prevent such an attack.

  9. Process Control System Cyber Security Standards - An Overview

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  10. Site-specific antibody-drug conjugates: the nexus of bioorthogonal chemistry, protein engineering, and drug development.

    Science.gov (United States)

    Agarwal, Paresh; Bertozzi, Carolyn R

    2015-02-18

    Antibody-drug conjugates (ADCs) combine the specificity of antibodies with the potency of small molecules to create targeted drugs. Despite the simplicity of this concept, generation of clinically successful ADCs has been very difficult. Over the past several decades, scientists have learned a great deal about the constraints on antibodies, linkers, and drugs as they relate to successful construction of ADCs. Once these components are in hand, most ADCs are prepared by nonspecific modification of antibody lysine or cysteine residues with drug-linker reagents, which results in heterogeneous product mixtures that cannot be further purified. With advances in the fields of bioorthogonal chemistry and protein engineering, there is growing interest in producing ADCs by site-specific conjugation to the antibody, yielding more homogeneous products that have demonstrated benefits over their heterogeneous counterparts in vivo. Here, we chronicle the development of a multitude of site-specific conjugation strategies for assembly of ADCs and provide a comprehensive account of key advances and their roots in the fields of bioorthogonal chemistry and protein engineering.

  11. A human engineering and ergonomic evaluation of the security access panel interface

    International Nuclear Information System (INIS)

    Hartney, C.; Banks, W.W.

    1995-02-01

    The purpose of this study was to empirically determine which of several security hardware interface designs produced the highest levels of end-user performance and acceptance. The FESSP Security Alarms and Monitoring Systems program area commissioned the authors study as decision support for upgrading the Argus security system's primary user interface so that Argus equipment will support the new DOE and DoD security access badges. Twenty-two test subjects were repeatedly tested using six remote access panel (RAP) designs. Lawrence Livermore National Laboratory (LLNL) uses one of these interface designs in its security access booths. Along with the RAP B insert-style reader, the authors tested five prototype RAP variants, each with a different style of swipe badge reader, through which a badge is moved or swiped. The authors asked the untrained test subjects to use each RAP while they described how they thought they should respond so that the system would operate correctly in reading the magnetic strip on a security badge. With each RAP variant, subjects were required to make four successful card reads (swipes) in which the card reader correctly read and logged the transaction. After each trial, a subject completed a 10-item interface acceptance evaluation before approaching the next RAP. After interacting with the RAP interfaces (for a total of the six RAP trials), each subject completed a 7-item overview evaluation that compared and ranked the five experimental RAPs, using the original (RAP B) insert style as a standard

  12. Engineering applications of fpgas chaotic systems, artificial neural networks, random number generators, and secure communication systems

    CERN Document Server

    Tlelo-Cuautle, Esteban; de la Fraga, Luis Gerardo

    2016-01-01

    This book offers readers a clear guide to implementing engineering applications with FPGAs, from the mathematical description to the hardware synthesis, including discussion of VHDL programming and co-simulation issues. Coverage includes FPGA realizations such as: chaos generators that are described from their mathematical models; artificial neural networks (ANNs) to predict chaotic time series, for which a discussion of different ANN topologies is included, with different learning techniques and activation functions; random number generators (RNGs) that are realized using different chaos generators, and discussions of their maximum Lyapunov exponent values and entropies. Finally, optimized chaotic oscillators are synchronized and realized to implement a secure communication system that processes black and white and grey-scale images. In each application, readers will find VHDL programming guidelines and computer arithmetic issues, along with co-simulation examples with Active-HDL and Simulink. Readers will b...

  13. Recoding aminoacyl-tRNA synthetases for synthetic biology by rational protein-RNA engineering.

    Science.gov (United States)

    Hadd, Andrew; Perona, John J

    2014-12-19

    We have taken a rational approach to redesigning the amino acid binding and aminoacyl-tRNA pairing specificities of bacterial glutaminyl-tRNA synthetase. The four-stage engineering incorporates generalizable design principles and improves the pairing efficiency of noncognate glutamate with tRNA(Gln) by over 10(5)-fold compared to the wild-type enzyme. Better optimized designs of the protein-RNA complex include substantial reengineering of the globular core region of the tRNA, demonstrating a role for specific tRNA nucleotides in specifying the identity of the genetically encoded amino acid. Principles emerging from this engineering effort open new prospects for combining rational and genetic selection approaches to design novel aminoacyl-tRNA synthetases that ligate noncanonical amino acids onto tRNAs. This will facilitate reconstruction of the cellular translation apparatus for applications in synthetic biology.

  14. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  15. Engineering Aromatic-Aromatic Interactions To Nucleate Folding in Intrinsically Disordered Regions of Proteins.

    Science.gov (United States)

    Balakrishnan, Swati; Sarma, Siddhartha P

    2017-08-22

    Aromatic interactions are an important force in protein folding as they combine the stability of a hydrophobic interaction with the selectivity of a hydrogen bond. Much of our understanding of aromatic interactions comes from "bioinformatics" based analyses of protein structures and from the contribution of these interactions to stabilizing secondary structure motifs in model peptides. In this study, the structural consequences of aromatic interactions on protein folding have been explored in engineered mutants of the molten globule protein apo-cytochrome b 5 . Structural changes from disorder to order due to aromatic interactions in two variants of the protein, viz., WF-cytb5 and FF-cytb5, result in significant long-range secondary and tertiary structure. The results show that 54 and 52% of the residues in WF-cytb5 and FF-cytb5, respectively, occupy ordered regions versus 26% in apo-cytochrome b 5 . The interactions between the aromatic groups are offset-stacked and edge-to-face for the Trp-Phe and Phe-Phe mutants, respectively. Urea denaturation studies indicate that both mutants have a C m higher than that of apo-cytochrome b 5 and are more stable to chaotropic agents than apo-cytochrome b 5 . The introduction of these aromatic residues also results in "trimer" interactions with existing aromatic groups, reaffirming the selectivity of the aromatic interactions. These studies provide insights into the aromatic interactions that drive disorder-to-order transitions in intrinsically disordered regions of proteins and will aid in de novo protein design beyond small peptide scaffolds.

  16. A divide and conquer approach to determine the Pareto frontier for optimization of protein engineering experiments

    Science.gov (United States)

    He, Lu; Friedman, Alan M.; Bailey-Kellogg, Chris

    2016-01-01

    In developing improved protein variants by site-directed mutagenesis or recombination, there are often competing objectives that must be considered in designing an experiment (selecting mutations or breakpoints): stability vs. novelty, affinity vs. specificity, activity vs. immunogenicity, and so forth. Pareto optimal experimental designs make the best trade-offs between competing objectives. Such designs are not “dominated”; i.e., no other design is better than a Pareto optimal design for one objective without being worse for another objective. Our goal is to produce all the Pareto optimal designs (the Pareto frontier), in order to characterize the trade-offs and suggest designs most worth considering, but to avoid explicitly considering the large number of dominated designs. To do so, we develop a divide-and-conquer algorithm, PEPFR (Protein Engineering Pareto FRontier), that hierarchically subdivides the objective space, employing appropriate dynamic programming or integer programming methods to optimize designs in different regions. This divide-and-conquer approach is efficient in that the number of divisions (and thus calls to the optimizer) is directly proportional to the number of Pareto optimal designs. We demonstrate PEPFR with three protein engineering case studies: site-directed recombination for stability and diversity via dynamic programming, site-directed mutagenesis of interacting proteins for affinity and specificity via integer programming, and site-directed mutagenesis of a therapeutic protein for activity and immunogenicity via integer programming. We show that PEPFR is able to effectively produce all the Pareto optimal designs, discovering many more designs than previous methods. The characterization of the Pareto frontier provides additional insights into the local stability of design choices as well as global trends leading to trade-offs between competing criteria. PMID:22180081

  17. A divide-and-conquer approach to determine the Pareto frontier for optimization of protein engineering experiments.

    Science.gov (United States)

    He, Lu; Friedman, Alan M; Bailey-Kellogg, Chris

    2012-03-01

    In developing improved protein variants by site-directed mutagenesis or recombination, there are often competing objectives that must be considered in designing an experiment (selecting mutations or breakpoints): stability versus novelty, affinity versus specificity, activity versus immunogenicity, and so forth. Pareto optimal experimental designs make the best trade-offs between competing objectives. Such designs are not "dominated"; that is, no other design is better than a Pareto optimal design for one objective without being worse for another objective. Our goal is to produce all the Pareto optimal designs (the Pareto frontier), to characterize the trade-offs and suggest designs most worth considering, but to avoid explicitly considering the large number of dominated designs. To do so, we develop a divide-and-conquer algorithm, Protein Engineering Pareto FRontier (PEPFR), that hierarchically subdivides the objective space, using appropriate dynamic programming or integer programming methods to optimize designs in different regions. This divide-and-conquer approach is efficient in that the number of divisions (and thus calls to the optimizer) is directly proportional to the number of Pareto optimal designs. We demonstrate PEPFR with three protein engineering case studies: site-directed recombination for stability and diversity via dynamic programming, site-directed mutagenesis of interacting proteins for affinity and specificity via integer programming, and site-directed mutagenesis of a therapeutic protein for activity and immunogenicity via integer programming. We show that PEPFR is able to effectively produce all the Pareto optimal designs, discovering many more designs than previous methods. The characterization of the Pareto frontier provides additional insights into the local stability of design choices as well as global trends leading to trade-offs between competing criteria. Copyright © 2011 Wiley Periodicals, Inc.

  18. Specific Internalisation of Gold Nanoparticles into Engineered Porous Protein Cages via Affinity Binding.

    Science.gov (United States)

    Paramelle, David; Peng, Tao; Free, Paul; Fernig, David G; Lim, Sierin; Tomczak, Nikodem

    2016-01-01

    Porous protein cages are supramolecular protein self-assemblies presenting pores that allow the access of surrounding molecules and ions into their core in order to store and transport them in biological environments. Protein cages' pores are attractive channels for the internalisation of inorganic nanoparticles and an alternative for the preparation of hybrid bioinspired nanoparticles. However, strategies based on nanoparticle transport through the pores are largely unexplored, due to the difficulty of tailoring nanoparticles that have diameters commensurate with the pores size and simultaneously displaying specific affinity to the cages' core and low non-specific binding to the cages' outer surface. We evaluated the specific internalisation of single small gold nanoparticles, 3.9 nm in diameter, into porous protein cages via affinity binding. The E2 protein cage derived from the Geobacillus stearothermophilus presents 12 pores, 6 nm in diameter, and an empty core of 13 nm in diameter. We engineered the E2 protein by site-directed mutagenesis with oligohistidine sequences exposing them into the cage's core. Dynamic light scattering and electron microscopy analysis show that the structures of E2 protein cages mutated with bis- or penta-histidine sequences are well conserved. The surface of the gold nanoparticles was passivated with a self-assembled monolayer made of a mixture of short peptidols and thiolated alkane ethylene glycol ligands. Such monolayers are found to provide thin coatings preventing non-specific binding to proteins. Further functionalisation of the peptide coated gold nanoparticles with Ni2+ nitrilotriacetic moieties enabled the specific binding to oligohistidine tagged cages. The internalisation via affinity binding was evaluated by electron microscopy analysis. From the various mutations tested, only the penta-histidine mutated E2 protein cage showed repeatable and stable internalisation. The present work overcomes the limitations of currently

  19. Key Future Engineering Capabilities for Human Capital Retention

    Science.gov (United States)

    Sivich, Lorrie

    Projected record retirements of Baby Boomer generation engineers have been predicted to result in significant losses of mission-critical knowledge in space, national security, and future scientific ventures vital to high-technology corporations. No comprehensive review or analysis of engineering capabilities has been performed to identify threats related to the specific loss of mission-critical knowledge posed by the increasing retirement of tenured engineers. Archival data from a single diversified Fortune 500 aerospace manufacturing engineering company's engineering career database were analyzed to ascertain whether relationships linking future engineering capabilities, engineering disciplines, and years of engineering experience could be identified to define critical knowledge transfer models. Chi square, logistic, and linear regression analyses were used to map patterns of discipline-specific, mission-critical knowledge using archival data of engineers' perceptions of engineering capabilities, key developmental experiences, and knowledge learned from their engineering careers. The results from the study were used to document key engineering future capabilities. The results were then used to develop a proposed human capital retention plan to address specific key knowledge gaps of younger engineers as veteran engineers retire. The potential for social change from this study involves informing leaders of aerospace engineering corporations on how to build better quality mentoring or succession plans to fill the void of lost knowledge from retiring engineers. This plan can secure mission-critical knowledge for younger engineers for current and future product development and increased global competitiveness in the technology market.

  20. Nuclear Safeguards and Security Education at Russian Universities

    International Nuclear Information System (INIS)

    Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.; Duncan, Cristen L.

    2008-01-01

    The U.S. Department of Energy is assisting key Russian universities in developing safeguards and security degree programs to prepare the next generation of specialists who will be responsible for protecting nuclear material from illicit use. These programs include course and laboratory work in nuclear material measurements, vulnerability analysis, exterior and interior sensors, and legal aspects of nuclear nonproliferation. Moscow Engineering Physics Institute (MEPhI) has graduated nine classes of masters students, most of who are working in government agencies, research organizations, or pursuing their PhD. With DOE support, MEPhI has also established a 5 1/2-year engineering degree program in safeguards and security. This is a hands-on degree that more closely meets the needs of nuclear facilities. The first class graduated in February 2007, marking a major milestone in Russian nonproliferation education. A second engineering degree program has been established at Tomsk Polytechnic University and is designed to reach those students east of the Ural Mountains, where many nuclear facilities are located. The first class will graduate in February 2009. This paper describes current development of these education programs, new initiatives, and sustainability efforts to ensure their continued viability after DOE support ends. The paper also describes general nonproliferation education activities supported by DOE that complement the more technical safeguards and security education programs.

  1. Engineered mutations in fibrillin-1 leading to Marfan syndrome act at the protein, cellular and organismal levels.

    Science.gov (United States)

    Zeyer, Karina A; Reinhardt, Dieter P

    2015-01-01

    Fibrillins are the major components of microfibrils in the extracellular matrix of elastic and non-elastic tissues. They are multi-domain proteins, containing primarily calcium binding epidermal growth factor-like (cbEGF) domains and 8-cysteine/transforming growth factor-beta binding protein-like (TB) domains. Mutations in the fibrillin-1 gene give rise to Marfan syndrome, a connective tissue disorder with clinical complications in the cardiovascular, skeletal, ocular and other organ systems. Here, we review the consequences of engineered Marfan syndrome mutations in fibrillin-1 at the protein, cellular and organismal levels. Representative point mutations associated with Marfan syndrome in affected individuals have been introduced and analyzed in recombinant fibrillin-1 fragments. Those mutations affect fibrillin-1 on a structural and functional level. Mutations which impair folding of cbEGF domains can affect protein trafficking. Protein folding disrupted by some mutations can lead to defective secretion in mutant fibrillin-1 fragments, whereas fragments with other Marfan mutations are secreted normally. Many Marfan mutations render fibrillin-1 more susceptible to proteolysis. There is also evidence that some mutations affect heparin binding. Few mutations have been further analyzed in mouse models. An extensively studied mouse model of Marfan syndrome expresses mouse fibrillin-1 with a missense mutation (p.C1039G). The mice display similar characteristics to human patients with Marfan syndrome. Overall, the analyses of engineered mutations leading to Marfan syndrome provide important insights into the pathogenic molecular mechanisms exerted by mutated fibrillin-1. Copyright © 2015 Elsevier B.V. All rights reserved.

  2. CORBASec Used to Secure Distributed Aerospace Propulsion Simulations

    Science.gov (United States)

    Blaser, Tammy M.

    2003-01-01

    The NASA Glenn Research Center and its industry partners are developing a Common Object Request Broker (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines. It was developed by Glenn and is being managed by the NASA Ames Research Center as the lead center reporting directly to NASA Headquarters' Aerospace Technology Enterprise. Glenn is an active domain member of the Object Management Group: an open membership, not-for-profit consortium that produces and manages computer industry specifications (i.e., CORBA) for interoperable enterprise applications. When NPSS is deployed, it will assemble a distributed aerospace propulsion simulation scenario from proprietary analytical CORBA servers and execute them with security afforded by the CORBASec implementation. The NPSS CORBASec test bed was initially developed with the TPBroker Security Service product (Hitachi Computer Products (America), Inc., Waltham, MA) using the Object Request Broker (ORB), which is based on the TPBroker Basic Object Adaptor, and using NPSS software across different firewall products. The test bed has been migrated to the Portable Object Adaptor architecture using the Hitachi Security Service product based on the VisiBroker 4.x ORB (Borland, Scotts Valley, CA) and on the Orbix 2000 ORB (Dublin, Ireland, with U.S. headquarters in Waltham, MA). Glenn, GE Aircraft Engines, and Pratt & Whitney Aircraft are the initial industry partners contributing to the NPSS CORBASec test bed. The test bed uses Security SecurID (RSA Security Inc., Bedford, MA) two-factor token-based authentication together with Hitachi Security Service digital-certificate-based authentication to validate the various NPSS users. The test

  3. 46 CFR 113.35-9 - Mechanical engine order telegraph systems.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Mechanical engine order telegraph systems. 113.35-9 Section 113.35-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING COMMUNICATION AND ALARM SYSTEMS AND EQUIPMENT Engine Order Telegraph Systems § 113.35-9 Mechanical engine order...

  4. Free-Standing Metal Oxide Nanoparticle Superlattices Constructed with Engineered Protein Containers Show in Crystallo Catalytic Activity.

    Science.gov (United States)

    Lach, Marcel; Künzle, Matthias; Beck, Tobias

    2017-12-11

    The construction of defined nanostructured catalysts is challenging. In previous work, we established a strategy to assemble binary nanoparticle superlattices with oppositely charged protein containers as building blocks. Here, we show that these free-standing nanoparticle superlattices are catalytically active. The metal oxide nanoparticles inside the protein scaffold are accessible for a range of substrates and show oxidase-like and peroxidase-like activity. The stable superlattices can be reused for several reaction cycles. In contrast to bulk nanoparticle-based catalysts, which are prone to aggregation and difficult to characterize, nanoparticle superlattices based on engineered protein containers provide an innovative synthetic route to structurally defined heterogeneous catalysts with control over nanoparticle size and composition. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Engineering multifunctional protein nanoparticles by in vitro disassembling and reassembling of heterologous building blocks

    Science.gov (United States)

    Unzueta, Ugutz; Serna, Naroa; Sánchez-García, Laura; Roldán, Mónica; Sánchez-Chardi, Alejandro; Mangues, Ramón; Villaverde, Antonio; Vázquez, Esther

    2017-12-01

    The engineering of protein self-assembling at the nanoscale allows the generation of functional and biocompatible materials, which can be produced by easy biological fabrication. The combination of cationic and histidine-rich stretches in fusion proteins promotes oligomerization as stable protein-only regular nanoparticles that are composed by a moderate number of building blocks. Among other applications, these materials are highly appealing as tools in targeted drug delivery once empowered with peptidic ligands of cell surface receptors. In this context, we have dissected here this simple technological platform regarding the controlled disassembling and reassembling of the composing building blocks. By applying high salt and imidazole in combination, nanoparticles are disassembled in a process that is fully reversible upon removal of the disrupting agents. By taking this approach, we accomplish here the in vitro generation of hybrid nanoparticles formed by heterologous building blocks. This fact demonstrates the capability to generate multifunctional and/or multiparatopic or multispecific materials usable in nanomedical applications.

  6. Integrating Protein Engineering and Bioorthogonal Click Conjugation for Extracellular Vesicle Modulation and Intracellular Delivery.

    Directory of Open Access Journals (Sweden)

    Ming Wang

    Full Text Available Exosomes are small, cell-secreted vesicles that transfer proteins and genetic information between cells. This intercellular transmission regulates many physiological and pathological processes. Therefore, exosomes have emerged as novel biomarkers for disease diagnosis and as nanocarriers for drug delivery. Here, we report an easy-to-adapt and highly versatile methodology to modulate exosome composition and conjugate exosomes for intracellular delivery. Our strategy combines the metabolic labeling of newly synthesized proteins or glycan/glycoproteins of exosome-secreting cells with active azides and bioorthogonal click conjugation to modify and functionalize the exosomes. The azide-integrated can be conjugated to a variety of small molecules and proteins and can efficiently deliver conjugates into cells. The metabolic engineering of exosomes diversifies the chemistry of exosomes and expands the functions that can be introduced into exosomes, providing novel, powerful tools to study the roles of exosomes in biology and expand the biomedical potential of exosomes.

  7. Strategic engineering for cloud computing and big data analytics

    CERN Document Server

    Ramachandran, Muthu; Sarwar, Dilshad

    2017-01-01

    This book demonstrates the use of a wide range of strategic engineering concepts, theories and applied case studies to improve the safety, security and sustainability of complex and large-scale engineering and computer systems. It first details the concepts of system design, life cycle, impact assessment and security to show how these ideas can be brought to bear on the modeling, analysis and design of information systems with a focused view on cloud-computing systems and big data analytics. This informative book is a valuable resource for graduate students, researchers and industry-based practitioners working in engineering, information and business systems as well as strategy. .

  8. 2nd International Doctoral Symposium on Applied Computation and Security Systems

    CERN Document Server

    Cortesi, Agostino; Saeed, Khalid; Chaki, Nabendu

    2016-01-01

    The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

  9. Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia

    Directory of Open Access Journals (Sweden)

    Angélica Flórez

    2016-07-01

    Full Text Available This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC. This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between them, which allow an understanding of the synergy between the different existing components. The complexity of the CEC is detailed from the view of the Influence Diagram of System Dynamics and the Domain Diagram of Software Engineering. The resulting model makes cyber security evident as a strategic component of national security.

  10. Appliance of geochemical engineering in radioactive waste disposal

    International Nuclear Information System (INIS)

    Li Shuang; Zhang Chengjiang; Ni Shijun; Li Kuanliang

    2008-01-01

    The basic foundation of applying geochemical engineering to control environment, common engineering models of disposal radioactive waste and the functions of the engineering barriers are introduced in this paper. The authors take the geochemical engineering barrier materiel research of a radioactive waste repository as an example to explain the appliance of geochemical engineering in the disposal of radioactive waste. And the results show that it can enhance the security of the nuclear waste repository if we use geochemical engineering barrier. (authors)

  11. Critical infrastructure security assessment, prevention, detection, response

    CERN Document Server

    FLAMMINI, F

    2012-01-01

    The most comprehensive handbook on critical infrastructures (CI), addressing both logical and physical security from an engineering point of view. The book surveys state-of-the-art methodologies and tools for CI analysis as well as strategies and technologies for CI protection.

  12. A survey of approaches combining safety and security for industrial control systems

    International Nuclear Information System (INIS)

    Kriaa, Siwar; Pietre-Cambacedes, Ludovic; Bouissou, Marc; Halgand, Yoran

    2015-01-01

    The migration towards digital control systems creates new security threats that can endanger the safety of industrial infrastructures. Addressing the convergence of safety and security concerns in this context, we provide a comprehensive survey of existing approaches to industrial facility design and risk assessment that consider both safety and security. We also provide a comparative analysis of the different approaches identified in the literature. - Highlights: • We raise awareness of safety and security convergence in numerical control systems. • We highlight safety and security interdependencies for modern industrial systems. • We give a survey of approaches combining safety and security engineering. • We discuss the potential of the approaches to model safety and security interactions

  13. Exploring Robust and Resilient Pathways to Water Security (Invited)

    Science.gov (United States)

    Brown, C. M.

    2013-12-01

    Lack of water security and the resultant cumulative effects of water-related hazards are understood to hinder economic growth throughout the world. Traditional methods for achieving water security as exemplified in the industrialized world have exerted negative externalities such as degradation of aquatic ecosystems. There is also growing concern that such methods may not be robust to climate variability change. It has been proposed that alternative pathways to water security must be followed in the developing world. However, it is not clear such pathways currently exist and there is an inherent moral hazard in such recommendations. This presentation will present a multidimensional definition of water security, explore the conflict in norms between engineering and ecologically oriented communities, and present a framework synthesizing those norms for assessing and innovating robust and resilient pathways to water security.

  14. The secure reactors

    International Nuclear Information System (INIS)

    Hannerz, K.

    1987-01-01

    The principle of Process Inherent Ultimate Safety (PIUS) is a new approach to Light Water Reactor (LWR) safety that could represent a solution to the present problems of public distrust, regulatory maze and plant design complexity plaguing the nuclear industry in many countries. A unique thermohydraulic design of the primary system ensures core integrity, and thereby gurarantees freedom from significant releases of radioactive matter, in all credible emergencies. This is accomplished entirely without reliance on potentially failure prone engineered safety systems and with immunity to operator mistskes. The potential for human fallibility to cause accidents is thereby drastically reduced in an easily understood way. Plant design can be greatly simplified because redundant, diverse safety systems are no longer needed. The paper briefly describes the PIUS design principle and the two SECURE reactor designs based on it, i.e. SECURE-H for district heating and process steam and SECURE-P (usually known simply as PIUS) for electric power generation. Demonstration of simulated system over-all thermohydraulic function and transient response in a large electrically heated test loop is described and results from some component development work is given. (author)

  15. Asset Identification for Security Risk Assessment in Web Applications

    OpenAIRE

    Hisham M. Haddad; Brunil D. Romero

    2009-01-01

    As software applications become more complex they require more security, allowing them to reach an appropriate level of quality to manage information, and therefore achieving business objectives. Web applications represent one segment of software industry where security risk assessment is essential. Web engineering must address new challenges to provide new techniques and tools that guarantee high quality application development. This work focuses asset identification, the initial step in sec...

  16. Biomolecular engineering for nanobio/bionanotechnology

    Science.gov (United States)

    Nagamune, Teruyuki

    2017-04-01

    Biomolecular engineering can be used to purposefully manipulate biomolecules, such as peptides, proteins, nucleic acids and lipids, within the framework of the relations among their structures, functions and properties, as well as their applicability to such areas as developing novel biomaterials, biosensing, bioimaging, and clinical diagnostics and therapeutics. Nanotechnology can also be used to design and tune the sizes, shapes, properties and functionality of nanomaterials. As such, there are considerable overlaps between nanotechnology and biomolecular engineering, in that both are concerned with the structure and behavior of materials on the nanometer scale or smaller. Therefore, in combination with nanotechnology, biomolecular engineering is expected to open up new fields of nanobio/bionanotechnology and to contribute to the development of novel nanobiomaterials, nanobiodevices and nanobiosystems. This review highlights recent studies using engineered biological molecules (e.g., oligonucleotides, peptides, proteins, enzymes, polysaccharides, lipids, biological cofactors and ligands) combined with functional nanomaterials in nanobio/bionanotechnology applications, including therapeutics, diagnostics, biosensing, bioanalysis and biocatalysts. Furthermore, this review focuses on five areas of recent advances in biomolecular engineering: (a) nucleic acid engineering, (b) gene engineering, (c) protein engineering, (d) chemical and enzymatic conjugation technologies, and (e) linker engineering. Precisely engineered nanobiomaterials, nanobiodevices and nanobiosystems are anticipated to emerge as next-generation platforms for bioelectronics, biosensors, biocatalysts, molecular imaging modalities, biological actuators, and biomedical applications.

  17. Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

    OpenAIRE

    Jinsoo Shin; Hanseong Son; Gyunyoung Heo

    2017-01-01

    Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluatio...

  18. Quantitative Characterization of Configurational Space Sampled by HIV-1 Nucleocapsid Using Solution NMR, X-ray Scattering and Protein Engineering.

    Science.gov (United States)

    Deshmukh, Lalit; Schwieters, Charles D; Grishaev, Alexander; Clore, G Marius

    2016-06-03

    Nucleic-acid-related events in the HIV-1 replication cycle are mediated by nucleocapsid, a small protein comprising two zinc knuckles connected by a short flexible linker and flanked by disordered termini. Combining experimental NMR residual dipolar couplings, solution X-ray scattering and protein engineering with ensemble simulated annealing, we obtain a quantitative description of the configurational space sampled by the two zinc knuckles, the linker and disordered termini in the absence of nucleic acids. We first compute the conformational ensemble (with an optimal size of three members) of an engineered nucleocapsid construct lacking the N- and C-termini that satisfies the experimental restraints, and then validate this ensemble, as well as characterize the disordered termini, using the experimental data from the full-length nucleocapsid construct. The experimental and computational strategy is generally applicable to multidomain proteins. Differential flexibility within the linker results in asymmetric motion of the zinc knuckles which may explain their functionally distinct roles despite high sequence identity. One of the configurations (populated at a level of ≈40 %) closely resembles that observed in various ligand-bound forms, providing evidence for conformational selection and a mechanistic link between protein dynamics and function. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. The economics of information security and privacy

    CERN Document Server

    Böhme, Rainer

    2013-01-01

    In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the viability of a free and open information society. While economics and information security comprise the nucleus of an academic movement that quickly drew the attention of thinktanks, industry, and governmen

  20. Mutational breeding and genetic engineering in the development of high grain protein content.

    Science.gov (United States)

    Wenefrida, Ida; Utomo, Herry S; Linscombe, Steve D

    2013-12-04

    Cereals are the most important crops in the world for both human consumption and animal feed. Improving their nutritional values, such as high protein content, will have significant implications, from establishing healthy lifestyles to helping remediate malnutrition problems worldwide. Besides providing a source of carbohydrate, grain is also a natural source of dietary fiber, vitamins, minerals, specific oils, and other disease-fighting phytocompounds. Even though cereal grains contain relatively little protein compared to legume seeds, they provide protein for the nutrition of humans and livestock that is about 3 times that of legumes. Most cereal seeds lack a few essential amino acids; therefore, they have imbalanced amino acid profiles. Lysine (Lys), threonine (Thr), methionine (Met), and tryptophan (Trp) are among the most critical and are a limiting factor in many grain crops for human nutrition. Tremendous research has been put into the efforts to improve these essential amino acids. Development of high protein content can be outlined in four different approaches through manipulating seed protein bodies, modulating certain biosynthetic pathways to overproduce essential and limiting amino acids, increasing nitrogen relocation to the grain through the introduction of transgenes, and exploiting new genetic variance. Various technologies have been employed to improve protein content including conventional and mutational breeding, genetic engineering, marker-assisted selection, and genomic analysis. Each approach involves a combination of these technologies. Advancements in nutrigenomics and nutrigenetics continue to improve public knowledge at a rapid pace on the importance of specific aspects of food nutrition for optimum fitness and health. An understanding of the molecular basis for human health and genetic predisposition to certain diseases through human genomes enables individuals to personalize their nutritional requirements. It is critically important

  1. Trans-species Engineering of Glycosylated Therapeutic Proteins

    DEFF Research Database (Denmark)

    Yang, Zhang

    eukaryotes and even prokaryotes. Insect and yeast cells produce O-glycosylation incompatible with use in humans, however recently the yeast Pichia was engineered to perform the first step of human-like O-glycosylation. This review provides an overview of past and current engineering efforts of N...

  2. Molecular basis of glyphosate resistance: Different approaches through protein engineering

    Science.gov (United States)

    Pollegioni, Loredano; Schonbrunn, Ernst; Siehl, Daniel

    2011-01-01

    Glyphosate (N-phosphonomethyl-glycine) is the most-used herbicide in the world: glyphosate-based formulations exhibit broad-spectrum herbicidal activity with minimal human and environmental toxicity. The extraordinary success of this simple small molecule is mainly due to the high specificity of glyphosate towards the plant enzyme enolpyruvylshikimate-3-phosphate synthase in the shikimate pathway leading to biosynthesis of aromatic amino acids. Starting in 1996, transgenic glyphosate-resistant plants were introduced thus allowing the application of the herbicide to the crop (post-emergence) to remove emerged weeds without crop damage. This review focuses on the evolution of mechanisms of resistance to glyphosate as obtained through natural diversity, the gene shuffling approach to molecular evolution, and a rational, structure-based approach to protein engineering. In addition, we offer rationale for the means by which the modifications made have had their intended effect. PMID:21668647

  3. Genetically Engineering Entomopathogenic Fungi.

    Science.gov (United States)

    Zhao, H; Lovett, B; Fang, W

    2016-01-01

    Entomopathogenic fungi have been developed as environmentally friendly alternatives to chemical insecticides in biocontrol programs for agricultural pests and vectors of disease. However, mycoinsecticides currently have a small market share due to low virulence and inconsistencies in their performance. Genetic engineering has made it possible to significantly improve the virulence of fungi and their tolerance to adverse conditions. Virulence enhancement has been achieved by engineering fungi to express insect proteins and insecticidal proteins/peptides from insect predators and other insect pathogens, or by overexpressing the pathogen's own genes. Importantly, protein engineering can be used to mix and match functional domains from diverse genes sourced from entomopathogenic fungi and other organisms, producing insecticidal proteins with novel characteristics. Fungal tolerance to abiotic stresses, especially UV radiation, has been greatly improved by introducing into entomopathogens a photoreactivation system from an archaean and pigment synthesis pathways from nonentomopathogenic fungi. Conversely, gene knockout strategies have produced strains with reduced ecological fitness as recipients for genetic engineering to improve virulence; the resulting strains are hypervirulent, but will not persist in the environment. Coupled with their natural insect specificity, safety concerns can also be mitigated by using safe effector proteins with selection marker genes removed after transformation. With the increasing public concern over the continued use of synthetic chemical insecticides and growing public acceptance of genetically modified organisms, new types of biological insecticides produced by genetic engineering offer a range of environmentally friendly options for cost-effective control of insect pests. Copyright © 2016 Elsevier Inc. All rights reserved.

  4. Freshwater fish for nutrition security in India: Evidence from FAO data

    Directory of Open Access Journals (Sweden)

    Nagesh Kumar Barik

    2017-08-01

    Full Text Available The nutritional dimension is integral to the concept of food security. A wide range of food commodities are required to fulfill nutritional security need of the people. Animal proteins which include milk, fish, meat and egg are essentially required for nutritionally balanced diets which are available from diverse food commodities. The fish in general and freshwater fish in particular are among the fast growing sectors with increasing contributions in the nutrition security of Indian consumers. The present paper analyses relative role of fish in the nutritional security of India based on the food balance sheet data of FAO available for the period 1961–2013. The apparent fish consumption per capita per year in India has increased primarily due to increase in freshwater fish availability from 0.7 kg/cap/year in 1961–3.48 kg/cap/year in 2013, enabling increase in the overall fish availability from 1.9 to 5.04 kg/cap/year during this period. During 1961–2013, contributions of freshwater fish to non-vegetarian protein, animal protein and total protein increased from 9.1 to 27.2, 3.3–8.7 and 0.4–1.7%, respectively

  5. Exploring the Properties of Genetically Engineered Silk-Elastin-Like Protein Films.

    Science.gov (United States)

    Machado, Raul; da Costa, André; Sencadas, Vitor; Pereira, Ana Margarida; Collins, Tony; Rodríguez-Cabello, José Carlos; Lanceros-Méndez, Senentxu; Casal, Margarida

    2015-12-01

    Free standing films of a genetically engineered silk-elastin-like protein (SELP) were prepared using water and formic acid as solvents. Exposure to methanol-saturated air promoted the formation of aggregated β-strands rendering aqueous insolubility and improved the mechanical properties leading to a 10-fold increase in strain-to-failure. The films were optically clear with resistivity values similar to natural rubber and thermally stable up to 180 °C. Addition of glycerol showed to enhance the flexibility of SELP/glycerol films by interacting with SELP molecules through hydrogen bonding, interpenetrating between the polymer chains and granting more conformational freedom. This detailed characterization provides cues for future and unique applications using SELP based biopolymers. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  6. High Performance Protein Sequence Database Scanning on the Cell Broadband Engine

    Directory of Open Access Journals (Sweden)

    Adrianto Wirawan

    2009-01-01

    Full Text Available The enormous growth of biological sequence databases has caused bioinformatics to be rapidly moving towards a data-intensive, computational science. As a result, the computational power needed by bioinformatics applications is growing rapidly as well. The recent emergence of low cost parallel multicore accelerator technologies has made it possible to reduce execution times of many bioinformatics applications. In this paper, we demonstrate how the Cell Broadband Engine can be used as a computational platform to accelerate two approaches for protein sequence database scanning: exhaustive and heuristic. We present efficient parallelization techniques for two representative algorithms: the dynamic programming based Smith–Waterman algorithm and the popular BLASTP heuristic. Their implementation on a Playstation®3 leads to significant runtime savings compared to corresponding sequential implementations.

  7. Institute of Industrial Engineers Asian Conference 2013

    CERN Document Server

    Tsao, Yu-Chung; Lin, Shi-Woei

    2013-01-01

    This book is based on the research papers presented during The Institute of Industrial Engineers Asian Conference 2013 held at Taipei in July 2013. It presents information on the most recent and relevant research, theories and practices in industrial and systems engineering. Key topics include: Engineering and Technology Management Engineering Economy and Cost Analysis Engineering Education and Training Facilities Planning and Management Global Manufacturing and Management Human Factors Industrial & Systems Engineering Education Information Processing and Engineering Intelligent Systems Manufacturing Systems Operations Research Production Planning and Control Project Management Quality Control and Management Reliability and Maintenance Engineering Safety, Security and Risk Management Supply Chain Management Systems Modeling and Simulation Large scale complex systems.

  8. State of security in Elasticsearch

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Security is an often understated problem in high growth emerging branches of IT like big data and IoT. Elasticsearch is a great example because support for security not only came late, but it's a quite convoluted, non-open, and very expensive solution. Learn how Simone Scarduzio lead his Open Source project ReadonlyREST to become the solution of choice for many. From hackathon hustlers to Fortune500 corporates. ReadonlyREST is simple yet powerful because it leverages the concept of access control list (yes, like firewalls). We'll go through some creative use cases and business concepts made possible by the creative use of ReadonlyREST and its configuration model. About the speaker Simone Scarduzio has a 8 years background in software engineering, spanning from mobile messaging clusters to Cloud-first startups. He wrote the first book about Vert.x, a JVM micro services framework. Recently, he helped Thomson Reuters re-architect legacy back ends into secure, polyglot, resilient distributed systems. Today, ...

  9. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  10. Conceptualizing Communications Security: A value chain approach

    NARCIS (Netherlands)

    Arnbak, A.

    2013-01-01

    Cybersecurity has become a top priority for policymakers these days, but as the engineering saying goes: "if you don’t know what you want, it’s hard to do it right." This paper finds considerable shortcomings in current conceptual and legal frameworks for communications security policymaking. The

  11. Optical Imaging Sensors and Systems for Homeland Security Applications

    CERN Document Server

    Javidi, Bahram

    2006-01-01

    Optical and photonic systems and devices have significant potential for homeland security. Optical Imaging Sensors and Systems for Homeland Security Applications presents original and significant technical contributions from leaders of industry, government, and academia in the field of optical and photonic sensors, systems and devices for detection, identification, prevention, sensing, security, verification and anti-counterfeiting. The chapters have recent and technically significant results, ample illustrations, figures, and key references. This book is intended for engineers and scientists in the relevant fields, graduate students, industry managers, university professors, government managers, and policy makers. Advanced Sciences and Technologies for Security Applications focuses on research monographs in the areas of -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection (including bios...

  12. Security constrained optimal power flow by modern optimization tools

    African Journals Online (AJOL)

    Security constrained optimal power flow by modern optimization tools. ... International Journal of Engineering, Science and Technology ... If you would like more information about how to print, save, and work with PDFs, Highwire Press ...

  13. Engineering a pharmacologically superior form of granulocyte-colony-stimulating factor by fusion with gelatin-like-protein polymer.

    Science.gov (United States)

    Huang, Yan-Shan; Wen, Xiao-Fang; Wu, Yi-Liang; Wang, Ye-Fei; Fan, Min; Yang, Zhi-Yu; Liu, Wei; Zhou, Lin-Fu

    2010-03-01

    The plasma half-life of therapeutic proteins is a critical factor in many clinical applications. Therefore, new strategies to prolong plasma half-life of long-acting peptides and protein drugs are in high demand. Here, we designed an artificial gelatin-like protein (GLK) and fused this hydrophilic GLK polymer to granulocyte-colony-stimulating factor (G-CSF) to generate a chimeric GLK/G-CSF fusion protein. The genetically engineered recombinant GLK/G-CSF (rGLK/G-CSF) fusion protein was purified from Pichia pastoris. In vitro studies demonstrated that rGLK/G-CSF possessed an enlarged hydrodynamic radius, improved thermal stability and retained full bioactivity compared to unfused G-CSF. Following a single subcutaneous administration to rats, the rGLK/G-CSF fusion protein displayed a slower plasma clearance rate and stimulated greater and longer lasting increases in circulating white blood cells than G-CSF. Our findings indicate that fusion with this artificial, hydrophilic, GLK polymer provides many advantages in the construction of a potent hematopoietic factor with extended plasma half-life. This approach could be easily applied to other therapeutic proteins and have important clinical applications. (c) 2009 Elsevier B.V. All rights reserved.

  14. Heart research advances using database search engines, Human Protein Atlas and the Sydney Heart Bank.

    Science.gov (United States)

    Li, Amy; Estigoy, Colleen; Raftery, Mark; Cameron, Darryl; Odeberg, Jacob; Pontén, Fredrik; Lal, Sean; Dos Remedios, Cristobal G

    2013-10-01

    This Methodological Review is intended as a guide for research students who may have just discovered a human "novel" cardiac protein, but it may also help hard-pressed reviewers of journal submissions on a "novel" protein reported in an animal model of human heart failure. Whether you are an expert or not, you may know little or nothing about this particular protein of interest. In this review we provide a strategic guide on how to proceed. We ask: How do you discover what has been published (even in an abstract or research report) about this protein? Everyone knows how to undertake literature searches using PubMed and Medline but these are usually encyclopaedic, often producing long lists of papers, most of which are either irrelevant or only vaguely relevant to your query. Relatively few will be aware of more advanced search engines such as Google Scholar and even fewer will know about Quertle. Next, we provide a strategy for discovering if your "novel" protein is expressed in the normal, healthy human heart, and if it is, we show you how to investigate its subcellular location. This can usually be achieved by visiting the website "Human Protein Atlas" without doing a single experiment. Finally, we provide a pathway to discovering if your protein of interest changes its expression level with heart failure/disease or with ageing. Crown Copyright © 2013. Published by Elsevier B.V. All rights reserved.

  15. Trend of supersonic aircraft engine. Choonsokukiyo engine no doko

    Energy Technology Data Exchange (ETDEWEB)

    Yashima, S [Ishikawajima-Harima Heavy Industries, Co. Ltd., Tokyo (Japan)

    1994-05-01

    The present paper explained the R and D trend of supersonic aircraft engine in Europe, USA and Japan. Taking the high speed flight resistance into consideration, the engine must be characterized by its high exhaust gas speed and high specific thrust (ratio of thrust to the airflow rate) to secure strong thrust by a low airflow rate. Therefore, the turbojet is appropriate. However to reduce the fuel consumption during the cruising flight, the turbofan is normally used with a low by-pass ratio of 0.2 to 0.9. The thrust-to-weight ratio (thrust per unit weight) of low by-pass ratio turbofan engine equipped with afterburner is 7 to 8 in case of stronger thrust than 70kN. Its target value of development is 10. The specific thrust which is a performance parameter of engine exceeds 120s for the fighter engine and is about 30s for the passenger plane engine. The turbine inlet temperature is 2073K at the stage of element research. The overall pressure ratio ranges from 25 to 30. The reheating turbofan engine experimentally built for the research in Japan is 34kN in thrust and 7 in thrust-to-weight ratio. 8 refs., 9 figs.

  16. Teaching Network Security with IP Darkspace Data

    Science.gov (United States)

    Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C.

    2016-01-01

    This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…

  17. Analysis of information security reliability: A tutorial

    International Nuclear Information System (INIS)

    Kondakci, Suleyman

    2015-01-01

    This article presents a concise reliability analysis of network security abstracted from stochastic modeling, reliability, and queuing theories. Network security analysis is composed of threats, their impacts, and recovery of the failed systems. A unique framework with a collection of the key reliability models is presented here to guide the determination of the system reliability based on the strength of malicious acts and performance of the recovery processes. A unique model, called Attack-obstacle model, is also proposed here for analyzing systems with immunity growth features. Most computer science curricula do not contain courses in reliability modeling applicable to different areas of computer engineering. Hence, the topic of reliability analysis is often too diffuse to most computer engineers and researchers dealing with network security. This work is thus aimed at shedding some light on this issue, which can be useful in identifying models, their assumptions and practical parameters for estimating the reliability of threatened systems and for assessing the performance of recovery facilities. It can also be useful for the classification of processes and states regarding the reliability of information systems. Systems with stochastic behaviors undergoing queue operations and random state transitions can also benefit from the approaches presented here. - Highlights: • A concise survey and tutorial in model-based reliability analysis applicable to information security. • A framework of key modeling approaches for assessing reliability of networked systems. • The framework facilitates quantitative risk assessment tasks guided by stochastic modeling and queuing theory. • Evaluation of approaches and models for modeling threats, failures, impacts, and recovery analysis of information systems

  18. Efficient and secure authentication protocol for roaming user in ...

    Indian Academy of Sciences (India)

    BALU L PARNE

    2018-05-29

    May 29, 2018 ... 1 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology (VNIT), ... proposed protocol is presented by BAN logic and the security ..... with session key Sk of the HLR to protect from.

  19. A Practical Teaching Course in Directed Protein Evolution Using the Green Fluorescent Protein as a Model

    Science.gov (United States)

    Ruller, Roberto; Silva-Rocha, Rafael; Silva, Artur; Schneider, Maria Paula Cruz; Ward, Richard John

    2011-01-01

    Protein engineering is a powerful tool, which correlates protein structure with specific functions, both in applied biotechnology and in basic research. Here, we present a practical teaching course for engineering the green fluorescent protein (GFP) from "Aequorea victoria" by a random mutagenesis strategy using error-prone polymerase…

  20. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  1. Enhanced Missing Proteins Detection in NCI60 Cell Lines Using an Integrative Search Engine Approach.

    Science.gov (United States)

    Guruceaga, Elizabeth; Garin-Muga, Alba; Prieto, Gorka; Bejarano, Bartolomé; Marcilla, Miguel; Marín-Vicente, Consuelo; Perez-Riverol, Yasset; Casal, J Ignacio; Vizcaíno, Juan Antonio; Corrales, Fernando J; Segura, Victor

    2017-12-01

    The Human Proteome Project (HPP) aims deciphering the complete map of the human proteome. In the past few years, significant efforts of the HPP teams have been dedicated to the experimental detection of the missing proteins, which lack reliable mass spectrometry evidence of their existence. In this endeavor, an in depth analysis of shotgun experiments might represent a valuable resource to select a biological matrix in design validation experiments. In this work, we used all the proteomic experiments from the NCI60 cell lines and applied an integrative approach based on the results obtained from Comet, Mascot, OMSSA, and X!Tandem. This workflow benefits from the complementarity of these search engines to increase the proteome coverage. Five missing proteins C-HPP guidelines compliant were identified, although further validation is needed. Moreover, 165 missing proteins were detected with only one unique peptide, and their functional analysis supported their participation in cellular pathways as was also proposed in other studies. Finally, we performed a combined analysis of the gene expression levels and the proteomic identifications from the common cell lines between the NCI60 and the CCLE project to suggest alternatives for further validation of missing protein observations.

  2. Network Security via Biometric Recognition of Patterns of Gene Expression

    Science.gov (United States)

    Shaw, Harry C.

    2016-01-01

    Molecular biology provides the ability to implement forms of information and network security completely outside the bounds of legacy security protocols and algorithms. This paper addresses an approach which instantiates the power of gene expression for security. Molecular biology provides a rich source of gene expression and regulation mechanisms, which can be adopted to use in the information and electronic communication domains. Conventional security protocols are becoming increasingly vulnerable due to more intensive, highly capable attacks on the underlying mathematics of cryptography. Security protocols are being undermined by social engineering and substandard implementations by IT (Information Technology) organizations. Molecular biology can provide countermeasures to these weak points with the current security approaches. Future advances in instruments for analyzing assays will also enable this protocol to advance from one of cryptographic algorithms to an integrated system of cryptographic algorithms and real-time assays of gene expression products.

  3. Network Security via Biometric Recognition of Patterns of Gene Expression

    Science.gov (United States)

    Shaw, Harry C.

    2016-01-01

    Molecular biology provides the ability to implement forms of information and network security completely outside the bounds of legacy security protocols and algorithms. This paper addresses an approach which instantiates the power of gene expression for security. Molecular biology provides a rich source of gene expression and regulation mechanisms, which can be adopted to use in the information and electronic communication domains. Conventional security protocols are becoming increasingly vulnerable due to more intensive, highly capable attacks on the underlying mathematics of cryptography. Security protocols are being undermined by social engineering and substandard implementations by IT organizations. Molecular biology can provide countermeasures to these weak points with the current security approaches. Future advances in instruments for analyzing assays will also enable this protocol to advance from one of cryptographic algorithms to an integrated system of cryptographic algorithms and real-time expression and assay of gene expression products.

  4. Dynamics simulations for engineering macromolecular interactions

    Science.gov (United States)

    Robinson-Mosher, Avi; Shinar, Tamar; Silver, Pamela A.; Way, Jeffrey

    2013-01-01

    The predictable engineering of well-behaved transcriptional circuits is a central goal of synthetic biology. The artificial attachment of promoters to transcription factor genes usually results in noisy or chaotic behaviors, and such systems are unlikely to be useful in practical applications. Natural transcriptional regulation relies extensively on protein-protein interactions to insure tightly controlled behavior, but such tight control has been elusive in engineered systems. To help engineer protein-protein interactions, we have developed a molecular dynamics simulation framework that simplifies features of proteins moving by constrained Brownian motion, with the goal of performing long simulations. The behavior of a simulated protein system is determined by summation of forces that include a Brownian force, a drag force, excluded volume constraints, relative position constraints, and binding constraints that relate to experimentally determined on-rates and off-rates for chosen protein elements in a system. Proteins are abstracted as spheres. Binding surfaces are defined radially within a protein. Peptide linkers are abstracted as small protein-like spheres with rigid connections. To address whether our framework could generate useful predictions, we simulated the behavior of an engineered fusion protein consisting of two 20 000 Da proteins attached by flexible glycine/serine-type linkers. The two protein elements remained closely associated, as if constrained by a random walk in three dimensions of the peptide linker, as opposed to showing a distribution of distances expected if movement were dominated by Brownian motion of the protein domains only. We also simulated the behavior of fluorescent proteins tethered by a linker of varying length, compared the predicted Förster resonance energy transfer with previous experimental observations, and obtained a good correspondence. Finally, we simulated the binding behavior of a fusion of two ligands that could

  5. HCCI Combustion Engines Final Report CRADA No. TC02032.0

    Energy Technology Data Exchange (ETDEWEB)

    Aceves, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Lyford-Pike, E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-09-08

    This was a collaborative effort between Lawrence Livermore National Security, LLC (formerly The Regents of the University of California)/Lawrence Livermore National Laboratory (LLNL) and Cummins Engine Company (Cwnmins), to advance the state of the art on HomogeneousCharge Compression-Ignition (HCCI) engines, resulting in a clean, high-efficiency alternative to diesel engines.

  6. Mastering the Nmap scripting engine

    CERN Document Server

    Pale, Paulino Calderón

    2015-01-01

    If you want to learn to write your own scripts for the Nmap Scripting Engine, this is the book for you. It is perfect for network administrators, information security professionals, and even Internet enthusiasts who are familiar with Nmap.

  7. 46 CFR 62.35-35 - Starting systems for internal-combustion engines.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Starting systems for internal-combustion engines. 62.35-35 Section 62.35-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE... Starting systems for internal-combustion engines. The starting systems for propulsion engines and for prime...

  8. Electric power substations engineering

    CERN Document Server

    2003-01-01

    This book covers all aspects of substations, from the initial concept to design, automation, operation, and physical and cyber security. Written by members of the Institute of Electrical and Electronic Engineers (IEEE) Power Engineering Society (PES) Substations Committee, each section provides a tutorial and includes references for further reading and study. The authors use photographs and graphics to help the reader understand the material. Exploring the most recent technological developments regarding industry practice and standards, the book provides an extensive overview of substations th

  9. IntegromeDB: an integrated system and biological search engine.

    Science.gov (United States)

    Baitaluk, Michael; Kozhenkov, Sergey; Dubinina, Yulia; Ponomarenko, Julia

    2012-01-19

    With the growth of biological data in volume and heterogeneity, web search engines become key tools for researchers. However, general-purpose search engines are not specialized for the search of biological data. Here, we present an approach at developing a biological web search engine based on the Semantic Web technologies and demonstrate its implementation for retrieving gene- and protein-centered knowledge. The engine is available at http://www.integromedb.org. The IntegromeDB search engine allows scanning data on gene regulation, gene expression, protein-protein interactions, pathways, metagenomics, mutations, diseases, and other gene- and protein-related data that are automatically retrieved from publicly available databases and web pages using biological ontologies. To perfect the resource design and usability, we welcome and encourage community feedback.

  10. Integration of the security systems in the architectural design of nuclear and important buildings in Egypt

    International Nuclear Information System (INIS)

    Algohary, S.

    2007-01-01

    The new and emerging threats to buildings and infrastructure which are faced by todays engineering design and facility management community in Egypt demand new approaches and solutions that are innovative and increasingly based on risk management principles. In the wake of the damage of Taba hotel in south Sinai (2004) and Sharm El-Sheik hotels in Egypt (July, 2005), there was a growing awareness of public vulnerability to terrorist attacks. This awareness leads to increase the expectations form and responsibilities of the architects, engineers and construction professionals This study reviews and assesses different types of threats to nuclear and important buildings. It identifies also the architectural design, vulnerability and risk management that can enhance security. It also introduces a new approach for integration of architectural design and security in nuclear and important buildings in Egypt. The results shows that escalating threats and risks to important buildings and infrastructures change the role of planners, architects, engineers and builders by increasing the focus on the importance of applying viable security principles to the building designs. Architects in Egypt can assume an important role in improving the life-safety features of important buildings by increasing and integrating new security principles and approaches to improve the security and performance of the buildings against man made disasters

  11. Design and implementation of a high performance network security processor

    Science.gov (United States)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  12. Manipulating fatty acid biosynthesis in microalgae for biofuel through protein-protein interactions.

    Directory of Open Access Journals (Sweden)

    Jillian L Blatti

    Full Text Available Microalgae are a promising feedstock for renewable fuels, and algal metabolic engineering can lead to crop improvement, thus accelerating the development of commercially viable biodiesel production from algae biomass. We demonstrate that protein-protein interactions between the fatty acid acyl carrier protein (ACP and thioesterase (TE govern fatty acid hydrolysis within the algal chloroplast. Using green microalga Chlamydomonas reinhardtii (Cr as a model, a structural simulation of docking CrACP to CrTE identifies a protein-protein recognition surface between the two domains. A virtual screen reveals plant TEs with similar in silico binding to CrACP. Employing an activity-based crosslinking probe designed to selectively trap transient protein-protein interactions between the TE and ACP, we demonstrate in vitro that CrTE must functionally interact with CrACP to release fatty acids, while TEs of vascular plants show no mechanistic crosslinking to CrACP. This is recapitulated in vivo, where overproduction of the endogenous CrTE increased levels of short-chain fatty acids and engineering plant TEs into the C. reinhardtii chloroplast did not alter the fatty acid profile. These findings highlight the critical role of protein-protein interactions in manipulating fatty acid biosynthesis for algae biofuel engineering as illuminated by activity-based probes.

  13. Reference to the Safety Engineering Undergraduate Courses to Improve the Subjects and Contents of the Certified Safety Engineer Qualification and Examination System of China

    OpenAIRE

    Haibin Qiu; Shanghong Shi; Tingdi Zhao; Yiwei Qiao; Jiangshi Zhang

    2013-01-01

    The aim of this paper is to recommend that the subjects and contents of certified safety engineers use safety engineering undergraduate curriculum system for reference. Human resources play an important role in accident prevention and loss control. Education on safety engineering develops quickly in China. Moreover, the State Administration of Work Safety and the National Human Resources and Social Security Ministry have implemented a certified safety engineer qualification and examination sy...

  14. IoT Privacy and Security Challenges for Smart Home Environments

    OpenAIRE

    Huichen Lin; Neil W. Bergmann

    2016-01-01

    Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic enviro...

  15. Engineering of a parainfluenza virus type 5 fusion protein (PIV-5 F): development of an autonomous and hyperfusogenic protein by a combinational mutagenesis approach.

    Science.gov (United States)

    Terrier, O; Durupt, F; Cartet, G; Thomas, L; Lina, B; Rosa-Calatrava, M

    2009-12-01

    The entry of enveloped viruses into host cells is accomplished by fusion of the viral envelope with the target cell membrane. For the paramyxovirus parainfluenza virus type 5 (PIV-5), this fusion involves an attachment protein (HN) and a class I viral fusion protein (F). We investigated the effect of 20 different combinations of 12 amino-acid substitutions within functional domains of the PIV-5 F glycoprotein, by performing cell surface expression measurements, quantitative fusion and syncytia assays. We found that combinations of mutations conferring an autonomous phenotype with mutations leading to an increased fusion activity were compatible and generated functional PIV-5 F proteins. The addition of mutations in the heptad-repeat domains led to both autonomous and hyperfusogenic phenotypes, despite the low cell surface expression of the corresponding mutants. Such engineering approach may prove useful not only for deciphering the fundamental mechanism behind viral-mediated membrane fusion but also in the development of potential therapeutic applications.

  16. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  17. Binding of ReO4- with an engineered MoO42--binding protein: towards a new approach in radiopharmaceutical applications

    International Nuclear Information System (INIS)

    Aryal, Baikuntha P.; Brugarolas, Pedro; He, Chuan

    2012-01-01

    Radiolabeled biomolecules are routinely used for clinical diagnostics. 99m Tc is the most commonly used radioactive tracer in radiopharmaceuticals. 188 Re and 186 Re are also commonly used as radioactive tracers in medicine. However, currently available methods for radiolabeling are lengthy and involve several steps in bioconjugation processes. In this work we present a strategy to engineer proteins that may selectively recognize the perrhenate (ReO 4 - ) ion as a new way to label proteins. We found that a molybdate (MoO 4 2- )-binding protein (ModA) from Escherichia coli can bind perrhenate with high affinity. Using fluorescence and isothermal titration calorimetry measurements, we determined the dissociation constant of ModA for ReO 4 - to be 541 nM and we solved a crystal structure of ModA with a bound ReO 4 - . On the basis of the structure we created a mutant protein containing a disulfide linkage, which exhibited increased affinity for perrhenate (K d = 104 nM). High-resolution crystal structures of ModA (1.7 (angstrom)) and A11C/R153C mutant (2.0 (angstrom)) were solved with bound perrhenate. Both structures show that a perrhenate ion occupies the molybdate binding site using the same amino acid residues that are involved in molybdate binding. The overall structure of the perrhenate-bound ModA is unchanged compared with that of the molybdate-bound form. In the mutant protein, the bound perrhenate is further stabilized by the engineered disulfide bond.

  18. State-of-the-art protein engineering approaches using biological macromolecules: A review from immobilization to implementation view point.

    Science.gov (United States)

    Bilal, Muhammad; Iqbal, Hafiz M N; Guo, Shuqi; Hu, Hongbo; Wang, Wei; Zhang, Xuehong

    2018-03-01

    Over the past years, technological and scientific advances have proven biocatalysis as a sustainable alternative than traditional chemical catalysis including organo- or metallocatalysis. In this context, immobilization based approaches represent simple but effective routes for engineering enzyme catalysts with higher activities than wild-type derivatives. Many enzymes including oxidoreductases have been engineered by rational and directed evolution, to realize the catalytic activity, enantioselectivity, and stability attributes which are essential for their biotechnological exploitation. Induce yet stable activity in enzyme catalysis offer new insights and motivation to engineer efficient catalysts for practical and commercial purposes. It has now become possible to envisage substrate accessibility to the catalytic site of the enzyme by current computational capabilities that reduce the experimental work related to the enzyme selection, screening, and engineering. Herein, state-of-the-art protein engineering approaches for improving enzymatic activities including chemical modification, directed evolution, and rational design or their combination methods are discussed. The emphasis is also given to the applications of the resulting tailored catalysts ranging from fine chemicals to novel pharmaceutical compounds that use biocatalysts as a vital step. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Model-based security analysis of the German health card architecture.

    Science.gov (United States)

    Jürjens, J; Rumm, R

    2008-01-01

    Health-care information systems are particularly security-critical. In order to make these applications secure, the security analysis has to be an integral part of the system design and IT management process for such systems. This work presents the experiences and results from the security analysis of the system architecture of the German Health Card, by making use of an approach to model-based security engineering that is based on the UML extension UMLsec. The focus lies on the security mechanisms and security policies of the smart-card-based architecture which were analyzed using the UMLsec method and tools. Main results of the paper include a report on the employment of the UMLsec method in an industrial health information systems context as well as indications of its benefits and limitations. In particular, two potential security weaknesses were detected and countermeasures discussed. The results indicate that it can be feasible to apply a model-based security analysis using UMLsec to an industrial health information system like the German Health Card architecture, and that doing so can have concrete benefits (such as discovering potential weaknesses, and an increased confidence that no further vulnerabilities of the kind that were considered are present).

  20. Computer-Aided Sensor Development Focused on Security Issues.

    Science.gov (United States)

    Bialas, Andrzej

    2016-05-26

    The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.

  1. A selection that reports on protein-protein interactions within a thermophilic bacterium.

    Science.gov (United States)

    Nguyen, Peter Q; Silberg, Jonathan J

    2010-07-01

    Many proteins can be split into fragments that exhibit enhanced function upon fusion to interacting proteins. While this strategy has been widely used to create protein-fragment complementation assays (PCAs) for discovering protein-protein interactions within mesophilic organisms, similar assays have not yet been developed for studying natural and engineered protein complexes at the temperatures where thermophilic microbes grow. We describe the development of a selection for protein-protein interactions within Thermus thermophilus that is based upon growth complementation by fragments of Thermotoga neapolitana adenylate kinase (AK(Tn)). Complementation studies with an engineered thermophile (PQN1) that is not viable above 75 degrees C because its adk gene has been replaced by a Geobacillus stearothermophilus ortholog revealed that growth could be restored at 78 degrees C by a vector that coexpresses polypeptides corresponding to residues 1-79 and 80-220 of AK(Tn). In contrast, PQN1 growth was not complemented by AK(Tn) fragments harboring a C156A mutation within the zinc-binding tetracysteine motif unless these fragments were fused to Thermotoga maritima chemotaxis proteins that heterodimerize (CheA and CheY) or homodimerize (CheX). This enhanced complementation is interpreted as arising from chemotaxis protein-protein interactions, since AK(Tn)-C156A fragments having only one polypeptide fused to a chemotaxis protein did not complement PQN1 to the same extent. This selection increases the maximum temperature where a PCA can be used to engineer thermostable protein complexes and to map protein-protein interactions.

  2. Genome-Wide Tuning of Protein Expression Levels to Rapidly Engineer Microbial Traits.

    Science.gov (United States)

    Freed, Emily F; Winkler, James D; Weiss, Sophie J; Garst, Andrew D; Mutalik, Vivek K; Arkin, Adam P; Knight, Rob; Gill, Ryan T

    2015-11-20

    The reliable engineering of biological systems requires quantitative mapping of predictable and context-independent expression over a broad range of protein expression levels. However, current techniques for modifying expression levels are cumbersome and are not amenable to high-throughput approaches. Here we present major improvements to current techniques through the design and construction of E. coli genome-wide libraries using synthetic DNA cassettes that can tune expression over a ∼10(4) range. The cassettes also contain molecular barcodes that are optimized for next-generation sequencing, enabling rapid and quantitative tracking of alleles that have the highest fitness advantage. We show these libraries can be used to determine which genes and expression levels confer greater fitness to E. coli under different growth conditions.

  3. Introduction of potential helix-capping residues into an engineered helical protein.

    Science.gov (United States)

    Parker, M H; Hefford, M A

    1998-08-01

    MB-1 is an engineered protein that was designed to incorporate high percentages of four amino acid residues and to fold into a four-alpha-helix bundle motif. Mutations were made in the putative loop I and III regions of this protein with the aim of increasing the stability of the helix ends. Four variants, MB-3, MB-5, MB-11 and MB-13, have replacements intended to promote formation of an 'N-capping box'. The loop I and III sequences of MB-3 (both GDLST) and MB-11 (GGDST) were designed to cause alphaL C-terminal 'capping' motifs to form in helices I and III. MB-5 has a sequence, GPDST, that places proline in a favourable position for forming beta-turns, whereas MB-13 (GLDST) has the potential to form Schellman C-capping motifs. Size-exclusion chromatography suggested that MB-1, MB-3, MB-5, MB-11 and MB-13 all form dimers, or possibly trimers. Free energies for the unfolding of each of these variants were determined by urea denaturation, with the loss of secondary structure followed by CD spectroscopy. Assuming an equilibrium between folded dimer and unfolded monomer, MB-13 had the highest apparent stability (40.5 kJ/mol, with +/-2.5 kJ/mol 95% confidence limits), followed by MB-11 (39.3+/-5.9 kJ/mol), MB-3 (36.4+/-1.7 kJ/mol), MB-5 (34.7+/-2.1 kJ/mol) and MB-1 (29.3+/-1.3 kJ/mol); the same relative stabilities of the variants were found when a folded trimer to unfolded monomer model was used to calculate stabilities. All of the variants were relatively unstable for dimeric proteins, but were significantly more stable than MB-1. These findings suggest that it might be possible to increase the stability of a protein for which the three-dimensional structure is unknown by placing amino acid residues in positions that have the potential to form helix- and turn-stabilizing motifs.

  4. Analysis of protein folds using protein contact networks

    Indian Academy of Sciences (India)

    is a well-recognized classification system of proteins, which is based on manual in- ... can easily correspond to the information in the 2D matrix. ..... [7] U K Muppirala and Zhijun Li, Protein Engineering, Design & Selection 19, 265 (2006).

  5. Health care professionals’ perception of security of personal health devices

    OpenAIRE

    Ondiege,Brian; Clarke,Malcolm

    2017-01-01

    Brian Ondiege, Malcolm Clarke Department of Computer Science, College of Engineering, Design and Physical Sciences, Brunel University London, UK Abstract: With the rapid advances in the capabilities of telehealth devices and their increasing connection to the Internet, security is becoming an issue of major concern. Therefore, the perceptions of the health care professionals regarding security are of interest, as the patients trust them to make informed decisions on issues concerning...

  6. 46 CFR 11.540 - Endorsements for engineers of mobile offshore drilling units.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Endorsements for engineers of mobile offshore drilling units. 11.540 Section 11.540 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE... § 11.540 Endorsements for engineers of mobile offshore drilling units. Endorsements as chief engineer...

  7. Tissue engineering for lateral ridge augmentation with recombinant human bone morphogenetic protein 2 combination therapy: a case report.

    Science.gov (United States)

    Mandelaris, George A; Spagnoli, Daniel B; Rosenfeld, Alan L; McKee, James; Lu, Mei

    2015-01-01

    This case report describes a tissue-engineered reconstruction with recombinant human bone morphogenetic protein 2/acellular collagen sponge (rhBMP-2/ ACS) + cancellous allograft and space maintenance via Medpor Contain mesh in the treatment of a patient requiring maxillary and mandibular horizontal ridge augmentation to enable implant placement. The patient underwent a previously unsuccessful corticocancellous bone graft at these sites. Multiple and contiguous sites in the maxilla and in the mandibular anterior, demonstrating advanced lateral ridge deficiencies, were managed using a tissue engineering approach as an alternative to autogenous bone harvesting. Four maxillary and three mandibular implants were placed 9 and 10 months, respectively, after tissue engineering reconstruction, and all were functioning successfully after 24 months of follow-up. Histomorphometric analysis of a bone core obtained at the time of the maxillary implant placement demonstrated a mean of 76.1% new vital bone formation, 22.2% marrow/cells, and 1.7% residual graft tissue. Tissue engineering for lateral ridge augmentation with combination therapy requires further research to determine predictability and limitations.

  8. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  9. An Engineered Survival-Selection Assay for Extracellular Protein Expression Uncovers Hypersecretory Phenotypes in Escherichia coli.

    Science.gov (United States)

    Natarajan, Aravind; Haitjema, Charles H; Lee, Robert; Boock, Jason T; DeLisa, Matthew P

    2017-05-19

    The extracellular expression of recombinant proteins using laboratory strains of Escherichia coli is now routinely achieved using naturally secreted substrates, such as YebF or the osmotically inducible protein Y (OsmY), as carrier molecules. However, secretion efficiency through these pathways needs to be improved for most synthetic biology and metabolic engineering applications. To address this challenge, we developed a generalizable survival-based selection strategy that effectively couples extracellular protein secretion to antibiotic resistance and enables facile isolation of rare mutants from very large populations (i.e., 10 10-12 clones) based simply on cell growth. Using this strategy in the context of the YebF pathway, a comprehensive library of E. coli single-gene knockout mutants was screened and several gain-of-function mutations were isolated that increased the efficiency of extracellular expression without compromising the integrity of the outer membrane. We anticipate that this user-friendly strategy could be leveraged to better understand the YebF pathway and other secretory mechanisms-enabling the exploration of protein secretion in pathogenesis as well as the creation of designer E. coli strains with greatly expanded secretomes-all without the need for expensive exogenous reagents, assay instruments, or robotic automation.

  10. Password Authentication Scheme with Secured Login Interface

    Directory of Open Access Journals (Sweden)

    AKINWALE A. Taofiki

    2009-12-01

    Full Text Available This paper presents a novel solution to the age long problem of password security at input level. In our solution, each of the various characters from which a password could be composed is encoded with a random single digit integer and presented to the user via an input interface form. A legitimate user entering his password only needs to carefully study the sequence of code that describe his password, and then enter these code in place of his actual password characters. This approach does not require the input code to be hidden from anyone or converted to placeholder characters for security reasons. Our solution engine regenerates new code for each character each time the carriage return key is struck, producing a hardened password that is convincingly more secure than conventional password entry system against both online and offline attackers. Using empirical data and a prototype implementation of our scheme, we give evidence that our approach is viable in practice, in terms of ease of use, improved security, and performance.

  11. Practical and Efficient Searching in Proteomics: A Cross Engine Comparison

    Science.gov (United States)

    Paulo, Joao A.

    2014-01-01

    Background Analysis of large datasets produced by mass spectrometry-based proteomics relies on database search algorithms to sequence peptides and identify proteins. Several such scoring methods are available, each based on different statistical foundations and thereby not producing identical results. Here, the aim is to compare peptide and protein identifications using multiple search engines and examine the additional proteins gained by increasing the number of technical replicate analyses. Methods A HeLa whole cell lysate was analyzed on an Orbitrap mass spectrometer for 10 technical replicates. The data were combined and searched using Mascot, SEQUEST, and Andromeda. Comparisons were made of peptide and protein identifications among the search engines. In addition, searches using each engine were performed with incrementing number of technical replicates. Results The number and identity of peptides and proteins differed across search engines. For all three search engines, the differences in proteins identifications were greater than the differences in peptide identifications indicating that the major source of the disparity may be at the protein inference grouping level. The data also revealed that analysis of 2 technical replicates can increase protein identifications by up to 10-15%, while a third replicate results in an additional 4-5%. Conclusions The data emphasize two practical methods of increasing the robustness of mass spectrometry data analysis. The data show that 1) using multiple search engines can expand the number of identified proteins (union) and validate protein identifications (intersection), and 2) analysis of 2 or 3 technical replicates can substantially expand protein identifications. Moreover, information can be extracted from a dataset by performing database searching with different engines and performing technical repeats, which requires no additional sample preparation and effectively utilizes research time and effort. PMID:25346847

  12. Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Water Security

    Science.gov (United States)

    Hakimdavar, Raha; Wood, Danielle; Eylander, John; Peters-Lidard, Christa; Smith, Jane; Doorn, Brad; Green, David; Hummel, Corey; Moore, Thomas C.

    2018-01-01

    River basins for which transboundary coordination and governance is a factor are of concern to US national security, yet there is often a lack of sufficient data-driven information available at the needed time horizons to inform transboundary water decision-making for the intelligence, defense, and foreign policy communities. To address this need, a two-day workshop entitled Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Global Water Security was held in August 2017 in Maryland. The committee that organized and convened the workshop (the Organizing Committee) included representatives from the National Aeronautics and Space Administration (NASA), the US Army Corps of Engineers Engineer Research and Development Center (ERDC), and the US Air Force. The primary goal of the workshop was to advance knowledge on the current US Government and partners' technical information needs and gaps to support national security interests in relation to transboundary water. The workshop also aimed to identify avenues for greater communication and collaboration among the scientific, intelligence, defense, and foreign policy communities. The discussion around transboundary water was considered in the context of the greater global water challenges facing US national security.

  13. Information security improving blocklist driven firewall implementation

    OpenAIRE

    Kylmänen, J. (Juha)

    2013-01-01

    Abstract The Internet has become a commodity and with it information security and privacy issues have appeared. Common threats against the end users include malware and phishing. Phishing is a social engineering technique used to mimic legit banking or social networking websites in an attempt to gain sensitive information from the user and malware is software with malicious intent. ...

  14. Enhancing the productivity of soluble green fluorescent protein ...

    African Journals Online (AJOL)

    Protein sequences might have been evolved against different environmental pressures, which results in non-optimum properties in their stability, activity and folding efficiency. Directed evolution and consensus-based engineering of proteins are the protein engineering principles for the re-evolution of such natural proteins ...

  15. Coordination and organization of security software process for power information application environment

    Science.gov (United States)

    Wang, Qiang

    2017-09-01

    As an important part of software engineering, the software process decides the success or failure of software product. The design and development feature of security software process is discussed, so is the necessity and the present significance of using such process. Coordinating the function software, the process for security software and its testing are deeply discussed. The process includes requirement analysis, design, coding, debug and testing, submission and maintenance. In each process, the paper proposed the subprocesses to support software security. As an example, the paper introduces the above process into the power information platform.

  16. The Need for Cyber-Informed Engineering Expertise for Nuclear Research Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert Stephen [Idaho National Laboratory

    2015-12-01

    Engineering disciplines may not currently understand or fully embrace cyber security aspects as they apply towards analysis, design, operation, and maintenance of nuclear research reactors. Research reactors include a wide range of diverse co-located facilities and designs necessary to meet specific operational research objectives. Because of the nature of research reactors (reduced thermal energy and fission product inventory), hazards and risks may not have received the same scrutiny as normally associated with power reactors. Similarly, security may not have been emphasized either. However, the lack of sound cybersecurity defenses may lead to both safety and security impacts. Risk management methodologies may not contain the foundational assumptions required to address the intelligent adversary’s capabilities in malevolent cyber attacks. Although most research reactors are old and may not have the same digital footprint as newer facilities, any digital instrument and control function must be considered as a potential attack platform that can lead to sabotage or theft of nuclear material, especially for some research reactors that store highly enriched uranium. This paper will provide a discussion about the need for cyber-informed engineering practices that include the entire engineering lifecycle. Cyber-informed engineering as referenced in this paper is the inclusion of cybersecurity aspects into the engineering process. A discussion will consider several attributes of this process evaluating the long-term goal of developing additional cyber safety basis analysis and trust principles. With a culture of free information sharing exchanges, and potentially a lack of security expertise, new risk analysis and design methodologies need to be developed to address this rapidly evolving (cyber) threatscape.

  17. Biotechnology and genetic engineering in the new drug development. Part I. DNA technology and recombinant proteins.

    Science.gov (United States)

    Stryjewska, Agnieszka; Kiepura, Katarzyna; Librowski, Tadeusz; Lochyński, Stanisław

    2013-01-01

    Pharmaceutical biotechnology has a long tradition and is rooted in the last century, first exemplified by penicillin and streptomycin as low molecular weight biosynthetic compounds. Today, pharmaceutical biotechnology still has its fundamentals in fermentation and bioprocessing, but the paradigmatic change affected by biotechnology and pharmaceutical sciences has led to an updated definition. The biotechnology revolution redrew the research, development, production and even marketing processes of drugs. Powerful new instruments and biotechnology related scientific disciplines (genomics, proteomics) make it possible to examine and exploit the behavior of proteins and molecules. Recombinant DNA (rDNA) technologies (genetic, protein, and metabolic engineering) allow the production of a wide range of peptides, proteins, and biochemicals from naturally nonproducing cells. This technology, now approximately 25 years old, is becoming one of the most important technologies developed in the 20(th) century. Pharmaceutical products and industrial enzymes were the first biotech products on the world market made by means of rDNA. Despite important advances regarding rDNA applications in mammalian cells, yeasts still represent attractive hosts for the production of heterologous proteins. In this review we describe these processes.

  18. Process Control System Cyber Security Standards - An Overview

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

    2005-10-01

    The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

  19. Information security of industrial control systems: possible attack vectors and protection methods

    Directory of Open Access Journals (Sweden)

    Ignatiy A. Grachkov

    2018-03-01

    obtaining unauthorized access to industrial control systems using the Shodan search engine is described and recommendations how to ensure information security of the industrial control system are given.

  20. The Social Engineering Personality Framework

    NARCIS (Netherlands)

    Uebelacker, Sven; Quiel, Susanne

    We explore ICT security in a socio-technical world and focus in particular on the susceptibility to social engineering attacks. We pursue the question if and how personality traits influence this susceptibility. This allows us to research human factors and their potential impact on the physical and

  1. Security implications and governance of cognitive neuroscience.

    Science.gov (United States)

    Kosal, Margaret E; Huang, Jonathan Y

    2015-01-01

    In recent years, significant efforts have been made toward elucidating the potential of the human brain. Spanning fields as disparate as psychology, biomedicine, computer science, mathematics, electrical engineering, and chemistry, research venturing into the growing domains of cognitive neuroscience and brain research has become fundamentally interdisciplinary. Among the most interesting and consequential applications to international security are the military and defense community's interests in the potential of cognitive neuroscience findings and technologies. In the United States, multiple governmental agencies are actively pursuing such endeavors, including the Department of Defense, which has invested over $3 billion in the last decade to conduct research on defense-related innovations. This study explores governance and security issues surrounding cognitive neuroscience research with regard to potential security-related applications and reports scientists' views on the role of researchers in these areas through a survey of over 200 active cognitive neuroscientists.

  2. Surface engineering on mesoporous silica chips for enriching low molecular weight phosphorylated proteins

    Science.gov (United States)

    Hu, Ye; Peng, Yang; Lin, Kevin; Shen, Haifa; Brousseau, Louis C., III; Sakamoto, Jason; Sun, Tong; Ferrari, Mauro

    2011-02-01

    Phosphorylated peptides and proteins play an important role in normal cellular activities, e.g., gene expression, mitosis, differentiation, proliferation, and apoptosis, as well as tumor initiation, progression and metastasis. However, technical hurdles hinder the use of common fractionation methods to capture phosphopeptides from complex biological fluids such as human sera. Herein, we present the development of a dual strategy material that offers enhanced capture of low molecular weight phosphoproteins: mesoporous silica thin films with precisely engineered pore sizes that sterically select for molecular size combined with chemically selective surface modifications (i.e. Ga3+, Ti4+ and Zr4+) that target phosphoroproteins. These materials provide high reproducibility (CV = 18%) and increase the stability of the captured proteins by excluding degrading enzymes, such as trypsin. The chemical and physical properties of the composite mesoporous thin films were characterized by X-ray diffraction, transmission electron microscopy, X-ray photoelectron spectroscopy, energy dispersive X-ray spectroscopy and ellipsometry. Using mass spectroscopy and biostatistics analysis, the enrichment efficiency of different metal ions immobilized on mesoporous silica chips was investigated. The novel technology reported provides a platform capable of efficiently profiling the serum proteome for biomarker discovery, forensic sampling, and routine diagnostic applications.Phosphorylated peptides and proteins play an important role in normal cellular activities, e.g., gene expression, mitosis, differentiation, proliferation, and apoptosis, as well as tumor initiation, progression and metastasis. However, technical hurdles hinder the use of common fractionation methods to capture phosphopeptides from complex biological fluids such as human sera. Herein, we present the development of a dual strategy material that offers enhanced capture of low molecular weight phosphoproteins: mesoporous

  3. Evaluating protein incorporation and release in electrospun composite scaffolds for bone tissue engineering applications.

    Science.gov (United States)

    Briggs, Tonye; Matos, Jeffrey; Collins, George; Arinzeh, Treena Livingston

    2015-10-01

    Electrospun polymer/ceramic composites have gained interest for use as scaffolds for bone tissue engineering applications. In this study, we investigated methods to incorporate Platelet Derived Growth Factor-BB (PDGF-BB) in electrospun polycaprolactone (PCL) or PCL prepared with polyethylene oxide (PEO), where both contained varying levels (up to 30 wt %) of ceramic composed of biphasic calcium phosphates, hydroxyapatite (HA)/β-tricalcium phosphate (TCP). Using a model protein, lysozyme, we compared two methods of protein incorporation, adsorption and emulsion electrospinning. Adsorption of lysozyme on scaffolds with ceramic resulted in minimal release of lysozyme over time. Using emulsion electrospinning, lysozyme released from scaffolds containing a high concentration of ceramic where the majority of the release occurred at later time points. We investigated the effect of reducing the electrostatic interaction between the protein and the ceramic on protein release with the addition of the cationic surfactant, cetyl trimethylammonium bromide (CTAB). In vitro release studies demonstrated that electrospun scaffolds prepared with CTAB released more lysozyme or PDGF-BB compared with scaffolds without the cationic surfactant. Human mesenchymal stem cells (MSCs) on composite scaffolds containing PDGF-BB incorporated through emulsion electrospinning expressed higher levels of osteogenic markers compared to scaffolds without PDGF-BB, indicating that the bioactivity of the growth factor was maintained. This study revealed methods for incorporating growth factors in polymer/ceramic scaffolds to promote osteoinduction and thereby facilitate bone regeneration. © 2015 Wiley Periodicals, Inc.

  4. The Bacterial Flagellar Type III Export Gate Complex Is a Dual Fuel Engine That Can Use Both H+ and Na+ for Flagellar Protein Export.

    Directory of Open Access Journals (Sweden)

    Tohru Minamino

    2016-03-01

    Full Text Available The bacterial flagellar type III export apparatus utilizes ATP and proton motive force (PMF to transport flagellar proteins to the distal end of the growing flagellar structure for self-assembly. The transmembrane export gate complex is a H+-protein antiporter, of which activity is greatly augmented by an associated cytoplasmic ATPase complex. Here, we report that the export gate complex can use sodium motive force (SMF in addition to PMF across the cytoplasmic membrane to drive protein export. Protein export was considerably reduced in the absence of the ATPase complex and a pH gradient across the membrane, but Na+ increased it dramatically. Phenamil, a blocker of Na+ translocation, inhibited protein export. Overexpression of FlhA increased the intracellular Na+ concentration in the presence of 100 mM NaCl but not in its absence, suggesting that FlhA acts as a Na+ channel. In wild-type cells, however, neither Na+ nor phenamil affected protein export, indicating that the Na+ channel activity of FlhA is suppressed by the ATPase complex. We propose that the export gate by itself is a dual fuel engine that uses both PMF and SMF for protein export and that the ATPase complex switches this dual fuel engine into a PMF-driven export machinery to become much more robust against environmental changes in external pH and Na+ concentration.

  5. The Bacterial Flagellar Type III Export Gate Complex Is a Dual Fuel Engine That Can Use Both H+ and Na+ for Flagellar Protein Export.

    Science.gov (United States)

    Minamino, Tohru; Morimoto, Yusuke V; Hara, Noritaka; Aldridge, Phillip D; Namba, Keiichi

    2016-03-01

    The bacterial flagellar type III export apparatus utilizes ATP and proton motive force (PMF) to transport flagellar proteins to the distal end of the growing flagellar structure for self-assembly. The transmembrane export gate complex is a H+-protein antiporter, of which activity is greatly augmented by an associated cytoplasmic ATPase complex. Here, we report that the export gate complex can use sodium motive force (SMF) in addition to PMF across the cytoplasmic membrane to drive protein export. Protein export was considerably reduced in the absence of the ATPase complex and a pH gradient across the membrane, but Na+ increased it dramatically. Phenamil, a blocker of Na+ translocation, inhibited protein export. Overexpression of FlhA increased the intracellular Na+ concentration in the presence of 100 mM NaCl but not in its absence, suggesting that FlhA acts as a Na+ channel. In wild-type cells, however, neither Na+ nor phenamil affected protein export, indicating that the Na+ channel activity of FlhA is suppressed by the ATPase complex. We propose that the export gate by itself is a dual fuel engine that uses both PMF and SMF for protein export and that the ATPase complex switches this dual fuel engine into a PMF-driven export machinery to become much more robust against environmental changes in external pH and Na+ concentration.

  6. Branched-chain Amino Acid Biosensing Using Fluorescent Modified Engineered Leucine/Isoleucine/Valine Binding Protein

    Directory of Open Access Journals (Sweden)

    Koji Sode

    2007-06-01

    Full Text Available A novel fluorescence sensing system for branched-chain amino acids (BCAAswas developed based on engineered leucine/isoleucine/valine-binding proteins (LIVBPsconjugated with environmentally sensitive fluorescence probes. LIVBP was cloned fromEscherichia coli and Gln149Cys, Gly227Cys, and Gln254Cys mutants were generated bygenetic engineering. The mutant LIVBPs were then modified with environmentallysensitive fluorophores. Based on the fluorescence intensity change observed upon thebinding of the ligands, the MIANS-conjugated Gln149Cys mutant (Gln149Cys-M showedthe highest and most sensitive response. The BCAAs Leu, Ile, and Val can each bemonitored at the sub-micromolar level using Gln149Cys-M. Measurements were alsocarried out on a mixture of BCAFAs and revealed that Gln149Cys-M-based measurementis not significantly affected by the change in the molar ratio of Leu, Ile and Val in thesample. Its high sensitivity and group-specific molecular recognition ability make the newsensing system ideally suited for the measurement of BCAAs and the determination of theFischer ratio, an indicator of hepatic disease involving metabolic dysfunction.

  7. Biocatalysts: application and engineering for industrial purposes.

    Science.gov (United States)

    Jemli, Sonia; Ayadi-Zouari, Dorra; Hlima, Hajer Ben; Bejar, Samir

    2016-01-01

    Enzymes are widely applied in various industrial applications and processes, including the food and beverage, animal feed, textile, detergent and medical industries. Enzymes screened from natural origins are often engineered before entering the market place because their native forms do not meet the requirements for industrial application. Protein engineering is concerned with the design and construction of novel enzymes with tailored functional properties, including stability, catalytic activity, reaction product inhibition and substrate specificity. Two broad approaches have been used for enzyme engineering, namely, rational design and directed evolution. The powerful and revolutionary techniques so far developed for protein engineering provide excellent opportunities for the design of industrial enzymes with specific properties and production of high-value products at lower production costs. The present review seeks to highlight the major fields of enzyme application and to provide an updated overview on previous protein engineering studies wherein natural enzymes were modified to meet the operational conditions required for industrial application.

  8. Engineering Manhattan style: Sandia Laboratories as an example of postwar engineering

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-09-01

    A great deal has been written about the history of science in America since World War II. Much of that work has explored the government`s research and development establishment, focusing on the scientific community immediately after the war. It is generally argued that the apparent triumphs of the huge and expensive wartime research and development projects gave rise to a belief that scientific resources should be nurtured and kept on hand - ready to provide service in an emergency. The Cold War drive for more and better weapons further fed this belief, leading to a massive system of national laboratories, military laboratories, and defense industries. The science of this complex is built on extensive financial support, the central strategy of which is that by steadily, and occasionally even lavishly funding large research programs, you will have a constant stream of scientific ideas that can be applied to national security purposes. What is true of science, is also true, in slightly modified form, of postwar engineering. The story I want to tell you today is, I think, an example of the way Cold War engineering r&d for national security worked. This report describes aspects of the Sandia National Laboratories.

  9. The experience of WNTI with Safety and Security Worldwide

    International Nuclear Information System (INIS)

    Neau, Henry-Jacques

    2016-01-01

    This paper gives an industrial perspective on safety and security issues based on the experience of WNTI members. It describes how safety is invested primarily in the package; not how the package is transported. Transport safety is therefore an engineering challenge, and all necessary technical information is available to enable this to be met. Security in transport involves various measures to guard against intentional malicious acts. The paper describes the international instruments relevant to security in the transport of nuclear fuel cycle materials and how both safety and security regulations must be coordinated and simplified to avoid conflicts. It considers potential risks, which must not be underestimated. However, the assessment of risks must be realistic and quantified, and the requirements placed on the industry appropriate. It is important to dispel exaggerated perceptions of danger in the minds of the public, politicians and regulators. (author)

  10. Development of Control Applications for High-Throughput Protein Crystallography Experiments

    International Nuclear Information System (INIS)

    Gaponov, Yurii A.; Matsugaki, Naohiro; Honda, Nobuo; Sasajima, Kumiko; Igarashi, Noriyuki; Hiraki, Masahiko; Yamada, Yusuke; Wakatsuki, Soichi

    2007-01-01

    An integrated client-server control system (PCCS) with a unified relational database (PCDB) has been developed for high-throughput protein crystallography experiments on synchrotron beamlines. The major steps in protein crystallographic experiments (purification, crystallization, crystal harvesting, data collection, and data processing) are integrated into the software. All information necessary for performing protein crystallography experiments is stored in the PCDB database (except raw X-ray diffraction data, which is stored in the Network File Server). To allow all members of a protein crystallography group to participate in experiments, the system was developed as a multi-user system with secure network access based on TCP/IP secure UNIX sockets. Secure remote access to the system is possible from any operating system with X-terminal and SSH/X11 (Secure Shell with graphical user interface) support. Currently, the system covers the high-throughput X-ray data collection stages and is being commissioned at BL5A and NW12A (PF, PF-AR, KEK, Tsukuba, Japan)

  11. An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies

    Science.gov (United States)

    2012-09-01

    FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security

  12. Computer-Aided Sensor Development Focused on Security Issues

    Directory of Open Access Journals (Sweden)

    Andrzej Bialas

    2016-05-01

    Full Text Available The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.

  13. Shotgun protein sequencing.

    Energy Technology Data Exchange (ETDEWEB)

    Faulon, Jean-Loup Michel; Heffelfinger, Grant S.

    2009-06-01

    A novel experimental and computational technique based on multiple enzymatic digestion of a protein or protein mixture that reconstructs protein sequences from sequences of overlapping peptides is described in this SAND report. This approach, analogous to shotgun sequencing of DNA, is to be used to sequence alternative spliced proteins, to identify post-translational modifications, and to sequence genetically engineered proteins.

  14. Enzymes in lipid modification: From classical biocatalysis with commercial enzymes to advanced protein engineering tools

    Directory of Open Access Journals (Sweden)

    Bornscheuer Uwe T.

    2013-01-01

    Full Text Available In this review, the application of enzymes, especially lipases, for the modification of fats and oils is covered. This includes the lipase-catalyzed selective production of structured triglycerides and the isolation or incorporation of specific fatty acids. Protein engineering methods to modify lipases on a molecular level were used to alter the fatty acid chain-length and ‘‘trans over cis’’ selectivity of lipase A from Candida antarctica. Furthermore, an enzymatic cascade reaction to remove 3-monochloropropanediol and the identification of a phospholipase C for degumming are briefly covered.

  15. EVALUATION OF ECOLOGICAL ENVIRONMENT SECURITY IN CONTIGUOUS POVERTY ALLEVIATION AREA OF SICHUAN PROVINCE

    OpenAIRE

    W. Xian; Y. Chen; J. Chen; X. Luo; H. Shao

    2018-01-01

    According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological securi...

  16. New computer security measures

    CERN Multimedia

    IT Department

    2008-01-01

    As a part of the long-term strategy to improve computer security at CERN, and especially given the attention focused to CERN by the start-up of the LHC, two additional security measures concerning DNS and Tor will shortly be introduced. These are described in the following texts and will affect only a small number of users. "PHISHING" ATTACKS CONTINUE CERN computer users continue to be subjected to attacks by people trying to infect our machines and obtain passwords and other confidential information by social engineering trickery. Recent examples include an e-mail message sent from "La Poste" entitled "Colis Postal" on 21 August, a fake mail sent from web and mail services on 8 September, and an e-mail purporting to come from Hallmark Cards announcing the arrival of an electronic postcard. However, there are many other examples and there are reports of compromised mail accounts being used for more realistic site-specific phishing attempts. Given the increased publicity rela...

  17. Nutrition security under extreme events

    Science.gov (United States)

    Martinez, A.

    2017-12-01

    Nutrition security under extreme events. Zero hunger being one of the Sustainable Development Goal from the United Nations, food security has become a trending research topic. However extreme events impact on global food security is not yet 100% understood and there is a lack of comprehension of the underlying mechanisms of global food trade and nutrition security to improve countries resilience to extreme events. In a globalized world, food is still a highly regulated commodity and a strategic resource. A drought happening in a net food-exporter will have little to no effect on its own population but the repercussion on net food-importers can be extreme. In this project, we propose a methodology to describe and quantify the impact of a local drought to human health at a global scale. For this purpose, nutrition supply and global trade data from FAOSTAT have been used with domestic food production from national agencies and FAOSTAT, global precipitation from the Climate Research Unit and health data from the World Health Organization. A modified Herfindahl-Hirschman Index (HHI) has been developed to measure the level of resilience of one country to a drought happening in another country. This index describes how a country is dependent of importation and how diverse are its importation. Losses of production and exportation due to extreme events have been calculated using yield data and a simple food balance at country scale. Results show that countries the most affected by global droughts are the one with the highest dependency to one exporting country. Changes induced by droughts also disturbed their domestic proteins, fat and calories supply resulting most of the time in a higher intake of calories or fat over proteins.

  18. Academics and National-Security Experts Must Work Together

    Science.gov (United States)

    Gansler, Jacques S.; Gast, Alice P.

    2008-01-01

    In the years since the September 11, 2001, terrorist attacks, the federal government's policies that deal with national security have changed significantly. In an effort to prevent the results of science and engineering research from being misused or falling into the wrong hands, government agencies that support studies are placing restrictions on…

  19. 3rd International Doctoral Symposium on Applied Computation and Security Systems

    CERN Document Server

    Saeed, Khalid; Cortesi, Agostino; Chaki, Nabendu

    2017-01-01

    This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.

  20. Engineering Trade-off Considerations Regarding Design-for-Security, Design-for-Verification, and Design-for-Test

    Science.gov (United States)

    Berg, Melanie; Label, Kenneth

    2018-01-01

    The United States government has identified that application specific integrated circuit (ASIC) and field programmable gate array (FPGA) hardware are at risk from a variety of adversary attacks. This finding affects system security and trust. Consequently, processes are being developed for system mitigation and countermeasure application. The scope of this tutorial pertains to potential vulnerabilities and countermeasures within the ASIC/FPGA design cycle. The presentation demonstrates how design practices can affect the risk for the adversary to: change circuitry, steal intellectual property, and listen to data operations. An important portion of the design cycle is assuring the design is working as specified or as expected. This is accomplished by exhaustive testing of the target design. Alternatively, it has been shown that well established schemes for test coverage enhancement (design-for-verification (DFV) and design-for-test (DFT)) can create conduits for adversary accessibility. As a result, it is essential to perform a trade between robust test coverage versus reliable design implementation. The goal of this tutorial is to explain the evolution of design practices; review adversary accessibility points due to DFV and DFT circuitry insertion (back door circuitry); and to describe common engineering trade-off considerations for test versus adversary threats.

  1. IoT Privacy and Security Challenges for Smart Home Environments

    Directory of Open Access Journals (Sweden)

    Huichen Lin

    2016-07-01

    Full Text Available Often the Internet of Things (IoT is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic environments, human issues may be as important as technical issues. After surveying existing solutions for enhancing IoT security, the paper identifies key future requirements for trusted Smart Home systems. A gateway architecture is selected as the most appropriate for resource-constrained devices, and for high system availability. Two key technologies to assist system auto-management are identified. Firstly, support for system auto-configuration will enhance system security. Secondly, the automatic update of system software and firmware is needed to maintain ongoing secure system operation.

  2. Direct protein quantification in complex sample solutions by surface-engineered nanorod probes

    KAUST Repository

    Schrittwieser, Stefan

    2017-06-30

    Detecting biomarkers from complex sample solutions is the key objective of molecular diagnostics. Being able to do so in a simple approach that does not require laborious sample preparation, sophisticated equipment and trained staff is vital for point-of-care applications. Here, we report on the specific detection of the breast cancer biomarker sHER2 directly from serum and saliva samples by a nanorod-based homogeneous biosensing approach, which is easy to operate as it only requires mixing of the samples with the nanorod probes. By careful nanorod surface engineering and homogeneous assay design, we demonstrate that the formation of a protein corona around the nanoparticles does not limit the applicability of our detection method, but on the contrary enables us to conduct in-situ reference measurements, thus further strengthening the point-of-care applicability of our method. Making use of sandwich assays on top of the nanorods, we obtain a limit of detection of 110 pM and 470 pM in 10-fold diluted spiked saliva and serum samples, respectively. In conclusion, our results open up numerous applications in direct protein biomarker quantification, specifically in point-of-care settings where resources are limited and ease-of-use is of essence.

  3. Direct protein quantification in complex sample solutions by surface-engineered nanorod probes

    KAUST Repository

    Schrittwieser, Stefan; Pelaz, Beatriz; Parak, Wolfgang J.; Lentijo Mozo, Sergio; Soulantica, Katerina; Dieckhoff, Jan; Ludwig, Frank; Schotter, Joerg

    2017-01-01

    Detecting biomarkers from complex sample solutions is the key objective of molecular diagnostics. Being able to do so in a simple approach that does not require laborious sample preparation, sophisticated equipment and trained staff is vital for point-of-care applications. Here, we report on the specific detection of the breast cancer biomarker sHER2 directly from serum and saliva samples by a nanorod-based homogeneous biosensing approach, which is easy to operate as it only requires mixing of the samples with the nanorod probes. By careful nanorod surface engineering and homogeneous assay design, we demonstrate that the formation of a protein corona around the nanoparticles does not limit the applicability of our detection method, but on the contrary enables us to conduct in-situ reference measurements, thus further strengthening the point-of-care applicability of our method. Making use of sandwich assays on top of the nanorods, we obtain a limit of detection of 110 pM and 470 pM in 10-fold diluted spiked saliva and serum samples, respectively. In conclusion, our results open up numerous applications in direct protein biomarker quantification, specifically in point-of-care settings where resources are limited and ease-of-use is of essence.

  4. Role of Reproductive Health Commodity Security on Maternal and ...

    African Journals Online (AJOL)

    Methods: A Medline search and search of other internet search engines for published studies on contraceptive commodity security and maternal and child health in West Africa was done. The journals were accessed online and from public libraries. Results: Contraceptive prevalence rate in West Africa is generally low.

  5. 46 CFR 167.65-60 - Examination of boilers and machinery by engineer.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Examination of boilers and machinery by engineer. 167.65-60 Section 167.65-60 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL... machinery by engineer. It shall be the duty of an engineer when he assumes charge of the boilers and...

  6. A vulnerability-centric requirements engineering framework : Analyzing security attacks, countermeasures, and requirements based on vulnerabilities

    NARCIS (Netherlands)

    Elahi, G.; Yu, E.; Zannone, N.

    2010-01-01

    Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements

  7. Antibody-cytokine fusion proteins for treatment of cancer: engineering cytokines for improved efficacy and safety.

    Science.gov (United States)

    Young, Patricia A; Morrison, Sherie L; Timmerman, John M

    2014-10-01

    The true potential of cytokine therapies in cancer treatment is limited by the inability to deliver optimal concentrations into tumor sites due to dose-limiting systemic toxicities. To maximize the efficacy of cytokine therapy, recombinant antibody-cytokine fusion proteins have been constructed by a number of groups to harness the tumor-targeting ability of monoclonal antibodies. The aim is to guide cytokines specifically to tumor sites where they might stimulate more optimal anti-tumor immune responses while avoiding the systemic toxicities of free cytokine therapy. Antibody-cytokine fusion proteins containing interleukin (IL)-2, IL-12, IL-21, tumor necrosis factor (TNF)α, and interferons (IFNs) α, β, and γ have been constructed and have shown anti-tumor activity in preclinical and early-phase clinical studies. Future priorities for development of this technology include optimization of tumor targeting, bioactivity of the fused cytokine, and choice of appropriate agents for combination therapies. This review is intended to serve as a framework for engineering an ideal antibody-cytokine fusion protein, focusing on previously developed constructs and their clinical trial results. Copyright © 2014 Elsevier Inc. All rights reserved.

  8. Combining Search Engines for Comparative Proteomics

    Science.gov (United States)

    Tabb, David

    2012-01-01

    Many proteomics laboratories have found spectral counting to be an ideal way to recognize biomarkers that differentiate cohorts of samples. This approach assumes that proteins that differ in quantity between samples will generate different numbers of identifiable tandem mass spectra. Increasingly, researchers are employing multiple search engines to maximize the identifications generated from data collections. This talk evaluates four strategies to combine information from multiple search engines in comparative proteomics. The “Count Sum” model pools the spectra across search engines. The “Vote Counting” model combines the judgments from each search engine by protein. Two other models employ parametric and non-parametric analyses of protein-specific p-values from different search engines. We evaluated the four strategies in two different data sets. The ABRF iPRG 2009 study generated five LC-MS/MS analyses of “red” E. coli and five analyses of “yellow” E. coli. NCI CPTAC Study 6 generated five concentrations of Sigma UPS1 spiked into a yeast background. All data were identified with X!Tandem, Sequest, MyriMatch, and TagRecon. For both sample types, “Vote Counting” appeared to manage the diverse identification sets most effectively, yielding heightened discrimination as more search engines were added.

  9. The Search Engine for Multi-Proteoform Complexes: An Online Tool for the Identification and Stoichiometry Determination of Protein Complexes.

    Science.gov (United States)

    Skinner, Owen S; Schachner, Luis F; Kelleher, Neil L

    2016-12-08

    Recent advances in top-down mass spectrometry using native electrospray now enable the analysis of intact protein complexes with relatively small sample amounts in an untargeted mode. Here, we describe how to characterize both homo- and heteropolymeric complexes with high molecular specificity using input data produced by tandem mass spectrometry of whole protein assemblies. The tool described is a "search engine for multi-proteoform complexes," (SEMPC) and is available for free online. The output is a list of candidate multi-proteoform complexes and scoring metrics, which are used to define a distinct set of one or more unique protein subunits, their overall stoichiometry in the intact complex, and their pre- and post-translational modifications. Thus, we present an approach for the identification and characterization of intact protein complexes from native mass spectrometry data. © 2016 by John Wiley & Sons, Inc. Copyright © 2016 John Wiley & Sons, Inc.

  10. Secure Communications with Mobile Devices During In-Field Activities

    International Nuclear Information System (INIS)

    Partee, M.S.; Moser, F.

    2015-01-01

    One of the classic problems in information security is how to exchange confidential information securely in uncontrolled environments. There have been innumerable academic and commercial hours spent resolving this question. In traditional practice, securing communications meant investing in satellites, specialized hardware, rigorous security engineering and testing, and expending a lot of resources. For this reason, smaller organizations have often been unable to secure communications. The widespread adoption of mobile communications and the modern mobile device has brought about unprecedented abilities to stay connected with colleagues during work activities. As connectedness has increased, so have the opportunities for information compromise. The enormous mobile landscape, with competing ecosystems, large research and product development budgets, proliferating devices, and rapidly-shifting technical foundations prove to be a tremendous source of both opportunity and risk. With the reality of shrinking budgets and increasing threats, many organizations, commercial enterprises, and product vendors are looking for new ways to utilize existing resources for secure communications and mobile work capabilities. Keeping communications private and secure using the infrastructure of the world's telecommunications network and standard computing and mobile devices is the challenge. This paper will examine some methods for communicating securely using consumer mobile products and evaluate the risk such tools can present to an organization in the context of inspection work in the field. (author)

  11. Door Security using Face Detection and Raspberry Pi

    Science.gov (United States)

    Bhutra, Venkatesh; Kumar, Harshav; Jangid, Santosh; Solanki, L.

    2018-03-01

    With the world moving towards advanced technologies, security forms a crucial part in daily life. Among the many techniques used for this purpose, Face Recognition stands as effective means of authentication and security. This paper deals with the user of principal component and security. PCA is a statistical approach used to simplify a data set. The minimum Euclidean distance found from the PCA technique is used to recognize the face. Raspberry Pi a low cost ARM based computer on a small circuit board, controls the servo motor and other sensors. The servo-motor is in turn attached to the doors of home and opens up when the face is recognized. The proposed work has been done using a self-made training database of students from B.K. Birla Institute of Engineering and Technology, Pilani, Rajasthan, India.

  12. Protein Engineering by Random Mutagenesis and Structure-Guided Consensus of Geobacillus stearothermophilus Lipase T6 for Enhanced Stability in Methanol

    Science.gov (United States)

    Dror, Adi; Shemesh, Einav; Dayan, Natali

    2014-01-01

    The abilities of enzymes to catalyze reactions in nonnatural environments of organic solvents have opened new opportunities for enzyme-based industrial processes. However, the main drawback of such processes is that most enzymes have a limited stability in polar organic solvents. In this study, we employed protein engineering methods to generate a lipase for enhanced stability in methanol, which is important for biodiesel production. Two protein engineering approaches, random mutagenesis (error-prone PCR) and structure-guided consensus, were applied in parallel on an unexplored lipase gene from Geobacillus stearothermophilus T6. A high-throughput colorimetric screening assay was used to evaluate lipase activity after an incubation period in high methanol concentrations. Both protein engineering approaches were successful in producing variants with elevated half-life values in 70% methanol. The best variant of the random mutagenesis library, Q185L, exhibited 23-fold-improved stability, yet its methanolysis activity was decreased by one-half compared to the wild type. The best variant from the consensus library, H86Y/A269T, exhibited 66-fold-improved stability in methanol along with elevated thermostability (+4.3°C) and a 2-fold-higher fatty acid methyl ester yield from soybean oil. Based on in silico modeling, we suggest that the Q185L substitution facilitates a closed lid conformation that limits access for both the methanol and substrate excess into the active site. The enhanced stability of H86Y/A269T was a result of formation of new hydrogen bonds. These improved characteristics make this variant a potential biocatalyst for biodiesel production. PMID:24362426

  13. Development of a security-by-design handbook

    International Nuclear Information System (INIS)

    Olson, David L.; Snell, Mark Kamerer; Iida, Toru; Ochiai, Kazuya; Tanuma, Koji

    2010-01-01

    There is an increasing awareness that efficient and effective nuclear facility design is best achieved when requirements from the 3S disciplines Safety, Safeguards, and Security - are balanced and intrinsic to the facility design. This can be achieved when policy, processes, methods, and technologies are understood and applied in these areas during all phases of the design process. For the purposes of this paper, Security-by-design will be defined as the system level incorporation of the physical protection system (PPS) into a new or retrofitted nuclear power plant (NPP) or nuclear facility (NF) resulting in intrinsic security. Security-by-design can also be viewed as a framework to achieve robust and durable security systems. This paper reports on work performed to date to create a Security-by-Design Handbook, under a bilateral agreement between the United States and Japan, specifically, a review of physical protection principles and best practices, and a decommissioning to better understand where these principles and practices can be applied. This paper describes physical protection principles and best practices to achieve security-by- design that were gathered from International, Japanese, and U.S. sources. Principles are included for achieving security early in the design process where security requirements are typically less costly and easier to incorporate. The paper then describes a generic design process that covers the entire facility lifecycle from scoping and planning of the project to decommissioning and decontamination. Early design process phases, such as conceptual design, offer opportunities to add security features intrinsic to the facility design itself. Later phases, including design engineering and construction, are important for properly integrating security features into a coherent design and for planning for and assuring the proper performance of the security system during the operation and decommissioning of the facility. The paper also

  14. Status of Social Engineering Awareness in Business Organizations and Colleges/Universities

    Science.gov (United States)

    Hauser, Deanna Mae

    2017-01-01

    Social engineers manipulate individuals into divulging confidential information or compromising personal or organizational security. The purpose of this qualitative case study was to examine the potential lack of social engineering awareness that affects employees at companies in southeastern Michigan. The research method consisted of interviews…

  15. iOS application security analysis

    OpenAIRE

    Βλάχος, Κωνσταντίνος Γ.; Vlachos, Konstantinos G.

    2017-01-01

    The purpose of this research is to explain the nature of the Apple iOS applications and provide all the available Open Source tools for analyzing them, starting from decrypting any application’s binary downloaded from the AppStore to reverse engineering it and even altering the flow of its running process on the actual device. We start introducing the basic theory of the iOS operating system and its applications including the security mechanisms incorporated by Apple that are a...

  16. Water Security in Periurban South Asia : Adapting to Climate ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Chargé(e) de projet. Prof. Ashutosh Kumar Shukla. Institution. Nepal Engineering College. Pays d' institution. Nepal. Site internet. http://www.nec.edu.np. Extrants. Études. Communication strategy in action research on water security in four South Asian peri-urban locations : CCW Asia Regional Partners Meeting, June ...

  17. Neurosecurity: security and privacy for neural devices.

    Science.gov (United States)

    Denning, Tamara; Matsuoka, Yoky; Kohno, Tadayoshi

    2009-07-01

    An increasing number of neural implantable devices will become available in the near future due to advances in neural engineering. This discipline holds the potential to improve many patients' lives dramatically by offering improved-and in some cases entirely new-forms of rehabilitation for conditions ranging from missing limbs to degenerative cognitive diseases. The use of standard engineering practices, medical trials, and neuroethical evaluations during the design process can create systems that are safe and that follow ethical guidelines; unfortunately, none of these disciplines currently ensure that neural devices are robust against adversarial entities trying to exploit these devices to alter, block, or eavesdrop on neural signals. The authors define "neurosecurity"-a version of computer science security principles and methods applied to neural engineering-and discuss why neurosecurity should be a critical consideration in the design of future neural devices.

  18. Bright blue-shifted fluorescent proteins with Cys in the GAF domain engineered from bacterial phytochromes: fluorescence mechanisms and excited-state dynamics

    NARCIS (Netherlands)

    Hontani, Yusaku; Shcherbakova, Daria M.; Baloban, Mikhail; Zhu, Jingyi; Verkhusha, Vladislav V.; Kennis, John T. M.

    2016-01-01

    Near-infrared fluorescent proteins (NIR FPs) engineered from bacterial phytochromes (BphPs) are of great interest for in vivo imaging. They utilize biliverdin (BV) as a chromophore, which is a heme degradation product, and therefore they are straightforward to use in mammalian tissues. Here, we

  19. FY10 Engineering Innovations, Research and Technology Report

    Energy Technology Data Exchange (ETDEWEB)

    Lane, M A; Aceves, S M; Paulson, C N; Candy, J V; Bennett, C V; Carlisle, K; Chen, D C; White, D A; Bernier, J V; Puso, M A; Weisgraber, T H; Corey, B; Lin, J I; Wheeler, E K; Conway, A M; Kuntz, J D; Spadaccini, C M; Dehlinger, D A; Kotovsky, J; Nikolic, R; Mariella, R P; Foudray, A K; Tang, V; Guidry, B L; Ng, B M; Lemmond, T D; Chen, B Y; Meyers, C A; Houck, T L

    2011-01-11

    This report summarizes key research, development, and technology advancements in Lawrence Livermore National Laboratory's Engineering Directorate for FY2010. These efforts exemplify Engineering's nearly 60-year history of developing and applying the technology innovations needed for the Laboratory's national security missions, and embody Engineering's mission to ''Enable program success today and ensure the Laboratory's vitality tomorrow.'' Leading off the report is a section featuring compelling engineering innovations. These innovations range from advanced hydrogen storage that enables clean vehicles, to new nuclear material detection technologies, to a landmine detection system using ultra-wideband ground-penetrating radar. Many have been recognized with R&D Magazine's prestigious R&D 100 Award; all are examples of the forward-looking application of innovative engineering to pressing national problems and challenging customer requirements. Engineering's capability development strategy includes both fundamental research and technology development. Engineering research creates the competencies of the future where discovery-class groundwork is required. Our technology development (or reduction to practice) efforts enable many of the research breakthroughs across the Laboratory to translate from the world of basic research to the national security missions of the Laboratory. This portfolio approach produces new and advanced technological capabilities, and is a unique component of the value proposition of the Lawrence Livermore Laboratory. The balance of the report highlights this work in research and technology, organized into thematic technical areas: Computational Engineering; Micro/Nano-Devices and Structures; Measurement Technologies; Engineering Systems for Knowledge Discovery; and Energy Manipulation. Our investments in these areas serve not only known programmatic requirements of today and tomorrow, but

  20. Pathogenesis-related proteins and peptides as promising tools for engineering plants with multiple stress tolerance.

    Science.gov (United States)

    Ali, Sajad; Ganai, Bashir Ahmad; Kamili, Azra N; Bhat, Ajaz Ali; Mir, Zahoor Ahmad; Bhat, Javaid Akhter; Tyagi, Anshika; Islam, Sheikh Tajamul; Mushtaq, Muntazir; Yadav, Prashant; Rawat, Sandhya; Grover, Anita

    Pathogenesis-related (PR) proteins and antimicrobial peptides (AMPs) are a group of diverse molecules that are induced by phytopathogens as well as defense related signaling molecules. They are the key components of plant innate immune system especially systemic acquired resistance (SAR), and are widely used as diagnostic molecular markers of defense signaling pathways. Although, PR proteins and peptides have been isolated much before but their biological function remains largely enigmatic despite the availability of new scientific tools. The earlier studies have demonstrated that PR genes provide enhanced resistance against both biotic and abiotic stresses, which make them one of the most promising candidates for developing multiple stress tolerant crop varieties. In this regard, plant genetic engineering technology is widely accepted as one of the most fascinating approach to develop the disease resistant transgenic crops using different antimicrobial genes like PR genes. Overexpression of PR genes (chitinase, glucanase, thaumatin, defensin and thionin) individually or in combination have greatly uplifted the level of defense response in plants against a wide range of pathogens. However, the detailed knowledge of signaling pathways that regulates the expression of these versatile proteins is critical for improving crop plants to multiple stresses, which is the future theme of plant stress biology. Hence, this review provides an overall overview on the PR proteins like their classification, role in multiple stresses (biotic and abiotic) as well as in various plant defense signaling cascades. We also highlight the success and snags of transgenic plants expressing PR proteins and peptides. Copyright © 2018 Elsevier GmbH. All rights reserved.

  1. Binding of ReO4(-) with an engineered MoO4(2-)-binding protein: towards a new approach in radiopharmaceutical applications.

    Science.gov (United States)

    Aryal, Baikuntha P; Brugarolas, Pedro; He, Chuan

    2012-01-01

    Radiolabeled biomolecules are routinely used for clinical diagnostics. (99m)Tc is the most commonly used radioactive tracer in radiopharmaceuticals. (188)Re and (186)Re are also commonly used as radioactive tracers in medicine. However, currently available methods for radiolabeling are lengthy and involve several steps in bioconjugation processes. In this work we present a strategy to engineer proteins that may selectively recognize the perrhenate (ReO(4)(-)) ion as a new way to label proteins. We found that a molybdate (MoO(4)(2-))-binding protein (ModA) from Escherichia coli can bind perrhenate with high affinity. Using fluorescence and isothermal titration calorimetry measurements, we determined the dissociation constant of ModA for ReO(4)(-) to be 541 nM and we solved a crystal structure of ModA with a bound ReO(4)(-). On the basis of the structure we created a mutant protein containing a disulfide linkage, which exhibited increased affinity for perrhenate (K(d) = 104 nM). High-resolution crystal structures of ModA (1.7 Å) and A11C/R153C mutant (2.0 Å) were solved with bound perrhenate. Both structures show that a perrhenate ion occupies the molybdate binding site using the same amino acid residues that are involved in molybdate binding. The overall structure of the perrhenate-bound ModA is unchanged compared with that of the molybdate-bound form. In the mutant protein, the bound perrhenate is further stabilized by the engineered disulfide bond. © SBIC 2011

  2. Hardware security and trust design and deployment of integrated circuits in a threatened environment

    CERN Document Server

    Chaves, Ricardo; Natale, Giorgio; Regazzoni, Francesco

    2017-01-01

    This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers. Covers all aspects of hardware security including design, manufacturing, testing, reliability, validation and utilization; Describes new methods and algorithms for the identification/detection of hardware trojans; Defines new architectures capable o...

  3. Meet EPA Engineer Shawn Ryan, Ph.D.

    Science.gov (United States)

    Shawn Ryan, Ph.D. is a chemical engineer at EPA's National Homeland Security Research Center. He has worked at EPA for 12 years, nine of which have been devoted to leading research to support decontamination and consequence management.

  4. Alternative Fuels DISI Engine Research ? Autoignition Metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Sjoberg, Carl Magnus Goran [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Vuilleumier, David [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2018-02-01

    Improved engine efficiency is required to comply with future fuel economy standards. Alternative fuels have the potential to enable more efficient engines while addressing concerns about energy security. This project contributes to the science base needed by industry to develop highly efficient direct injection spark igniton (DISI) engines that also beneficially exploit the different properties of alternative fuels. Here, the emphasis is on quantifying autoignition behavior for a range of spark-ignited engine conditions, including directly injected boosted conditions. The efficiency of stoichiometrically operated spark ignition engines is often limited by fuel-oxidizer end-gas autoignition, which can result in engine knock. A fuel’s knock resistance is assessed empirically by the Research Octane Number (RON) and Motor Octane Number (MON) tests. By clarifying how these two tests relate to the autoignition behavior of conventional and alternative fuel formulations, fuel design guidelines for enhanced engine efficiency can be developed.

  5. Generation of a monoclonal antibody against the glycosylphosphatidylinositol-linked protein Rae-1 using genetically engineered tumor cells.

    Science.gov (United States)

    Hu, Jiemiao; Vien, Long T; Xia, Xueqing; Bover, Laura; Li, Shulin

    2014-02-04

    Although genetically engineered cells have been used to generate monoclonal antibodies (mAbs) against numerous proteins, no study has used them to generate mAbs against glycosylphosphatidylinositol (GPI)-anchored proteins. The GPI-linked protein Rae-1, an NKG2D ligand member, is responsible for interacting with immune surveillance cells. However, very few high-quality mAbs against Rae-1 are available for use in multiple analyses, including Western blotting, immunohistochemistry, and flow cytometry. The lack of high-quality mAbs limits the in-depth analysis of Rae-1 fate, such as shedding and internalization, in murine models. Moreover, currently available screening approaches for identifying high-quality mAbs are excessively time-consuming and costly. We used Rae-1-overexpressing CT26 tumor cells to generate 60 hybridomas that secreted mAbs against Rae-1. We also developed a streamlined screening strategy for selecting the best anti-Rae-1 mAb for use in flow cytometry assay, enzyme-linked immunosorbent assay, Western blotting, and immunostaining. Our cell line-based immunization approach can yield mAbs against GPI-anchored proteins, and our streamlined screening strategy can be used to select the ideal hybridoma for producing such mAbs.

  6. Requirements for Secure Logging of Decentralized Cross-Organizational Workflow Executions

    NARCIS (Netherlands)

    Wombacher, Andreas; Wieringa, Roelf J.; Jonker, Willem; Knezevic, P.; Pokraev, S.; meersman, R; Tari, Z; herrero, p; Méndez, G.; Cavedon, L.; Martin, D.; Hinze, A.; Buchanan, G.

    2005-01-01

    The control of actions performed by parties involved in a decentralized cross-organizational workflow is done by several independent workflow engines. Due to the lack of a centralized coordination control, an auditing is required which supports a reliable and secure detection of malicious actions

  7. Security Process Capability Model Based on ISO/IEC 15504 Conformant Enterprise SPICE

    Directory of Open Access Journals (Sweden)

    Mitasiunas Antanas

    2014-07-01

    Full Text Available In the context of modern information systems, security has become one of the most critical quality attributes. The purpose of this paper is to address the problem of quality of information security. An approach to solve this problem is based on the main assumption that security is a process oriented activity. According to this approach, product quality can be achieved by means of process quality - process capability. Introduced in the paper, SPICE conformant information security process capability model is based on process capability modeling elaborated by world-wide software engineering community during the last 25 years, namely ISO/IEC 15504 that defines the capability dimension and the requirements for process definition and domain independent integrated model for enterprise-wide assessment and Enterprise SPICE improvement

  8. Orthogonal dual-modification of proteins for the engineering of multivalent protein scaffolds

    Directory of Open Access Journals (Sweden)

    Michaela Mühlberg

    2015-05-01

    Full Text Available To add new tools to the repertoire of protein-based multivalent scaffold design, we have developed a novel dual-labeling strategy for proteins that combines residue-specific incorporation of unnatural amino acids with chemical oxidative aldehyde formation at the N-terminus of a protein. Our approach relies on the selective introduction of two different functional moieties in a protein by mutually orthogonal copper-catalyzed azide–alkyne cycloaddition (CuAAC and oxime ligation. This method was applied to the conjugation of biotin and β-linked galactose residues to yield an enzymatically active thermophilic lipase, which revealed specific binding to Erythrina cristagalli lectin by SPR binding studies.

  9. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  10. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  11. A Visual Language for Protein Design

    KAUST Repository

    Cox, Robert Sidney

    2017-02-08

    As protein engineering becomes more sophisticated, practitioners increasingly need to share diagrams for communicating protein designs. To this end, we present a draft visual language, Protein Language, that describes the high-level architecture of an engineered protein with easy-to draw glyphs, intended to be compatible with other biological diagram languages such as SBOL Visual and SBGN. Protein Language consists of glyphs for representing important features (e.g., globular domains, recognition and localization sequences, sites of covalent modification, cleavage and catalysis), rules for composing these glyphs to represent complex architectures, and rules constraining the scaling and styling of diagrams. To support Protein Language we have implemented an extensible web-based software diagram tool, Protein Designer, that uses Protein Language in a

  12. A Visual Language for Protein Design

    KAUST Repository

    Cox, Robert Sidney; McLaughlin, James Alastair; Grunberg, Raik; Beal, Jacob; Wipat, Anil; Sauro, Herbert M.

    2017-01-01

    As protein engineering becomes more sophisticated, practitioners increasingly need to share diagrams for communicating protein designs. To this end, we present a draft visual language, Protein Language, that describes the high-level architecture of an engineered protein with easy-to draw glyphs, intended to be compatible with other biological diagram languages such as SBOL Visual and SBGN. Protein Language consists of glyphs for representing important features (e.g., globular domains, recognition and localization sequences, sites of covalent modification, cleavage and catalysis), rules for composing these glyphs to represent complex architectures, and rules constraining the scaling and styling of diagrams. To support Protein Language we have implemented an extensible web-based software diagram tool, Protein Designer, that uses Protein Language in a

  13. In silico engineering of aggregation-prone recombinant proteins for substrate recognition by the chaperonin GroEL.

    Science.gov (United States)

    Kumar, Vipul; Punetha, Ankita; Sundar, Durai; Chaudhuri, Tapan K

    2012-01-01

    Molecular chaperones appear to have been evolved to facilitate protein folding in the cell through entrapment of folding intermediates on the interior of a large cavity formed between GroEL and its co-chaperonin GroES. They bind newly synthesized or non-native polypeptides through hydrophobic interactions and prevent their aggregation. Some proteins do not interact with GroEL, hence even though they are aggregation prone, cannot be assisted by GroEL for their folding. In this study, we have attempted to engineer these non-substrate proteins to convert them as the substrate for GroEL, without compromising on their function. We have used a computational biology approach to generate mutants of the selected proteins by selectively mutating residues in the hydrophobic patch, similar to GroES mobile loop region that are responsible for interaction with GroEL, and compared with the wild counterparts for calculation of their instability and aggregation propensities. The energies of the newly designed mutants were computed through molecular dynamics simulations. We observed increased aggregation propensity of some of the mutants formed after replacing charged amino acid residues with hydrophobic ones in the well defined hydrophobic patch, raising the possibility of their binding ability to GroEL. The newly generated mutants may provide potential substrates for Chaperonin GroEL, which can be experimentally generated and tested for their tendency of aggregation, interactions with GroEL and the possibility of chaperone-assisted folding to produce functional proteins.

  14. Piping engineering for nuclear power plant

    International Nuclear Information System (INIS)

    Curto, N.; Schmidt, H.; Muller, R.

    1988-01-01

    In order to develop piping engineering, an adequate dimensioning and correct selection of materials must be secured. A correct selection of materials together with calculations and stress analysis must be carried out with a view to minimizing or avoiding possible failures or damages in piping assembling, which could be caused by internal pressure, weight, temperature, oscillation, etc. The piping project for a nuclear power plant is divided into the following three phases. Phase I: Basic piping design. Phase II: Final piping design. Phase III: Detail engineering. (Author)

  15. World Congress on Medical Physics and Biomedical Engineering

    CERN Document Server

    2015-01-01

    This book presents the proceedings of the IUPESM World Biomedical Engineering and Medical Physics, a tri-annual high-level policy meeting dedicated exclusively to furthering the role of biomedical engineering and medical physics in medicine. The book offers papers about emerging issues related to the development and sustainability of the role and impact of medical physicists and biomedical engineers in medicine and healthcare. It provides a unique and important forum to secure a coordinated, multileveled global response to the need, demand, and importance of creating and supporting strong academic and clinical teams of biomedical engineers and medical physicists for the benefit of human health.

  16. Structure-guided design of an engineered streptavidin with reusability to purify streptavidin-binding peptide tagged proteins or biotinylated proteins.

    Directory of Open Access Journals (Sweden)

    Sau-Ching Wu

    Full Text Available Development of a high-affinity streptavidin-binding peptide (SBP tag allows the tagged recombinant proteins to be affinity purified using the streptavidin matrix without the need of biotinylation. The major limitation of this powerful technology is the requirement to use biotin to elute the SBP-tagged proteins from the streptavidin matrix. Tight biotin binding by streptavidin essentially allows the matrix to be used only once. To address this problem, differences in interactions of biotin and SBP with streptavidin were explored. Loop3-4 which serves as a mobile lid for the biotin binding pocket in streptavidin is in the closed state with biotin binding. In contrast, this loop is in the open state with SBP binding. Replacement of glycine-48 with a bulkier residue (threonine in this loop selectively reduces the biotin binding affinity (Kd from 4 × 10(-14 M to 4.45 × 10(-10 M without affecting the SBP binding affinity. Introduction of a second mutation (S27A to the first mutein (G48T results in the development of a novel engineered streptavidin SAVSBPM18 which could be recombinantly produced in the functional form from Bacillus subtilis via secretion. To form an intact binding pocket for tight binding of SBP, two diagonally oriented subunits in a tetrameric streptavidin are required. It is vital for SAVSBPM18 to be stably in the tetrameric state in solution. This was confirmed using an HPLC/Laser light scattering system. SAVSBPM18 retains high binding affinity to SBP but has reversible biotin binding capability. The SAVSBPM18 matrix can be applied to affinity purify SBP-tagged proteins or biotinylated molecules to homogeneity with high recovery in a reusable manner. A mild washing step is sufficient to regenerate the matrix which can be reused for multiple rounds. Other applications including development of automated protein purification systems, lab-on-a-chip micro-devices, reusable biosensors, bioreactors and microarrays, and strippable

  17. Structure-guided design of an engineered streptavidin with reusability to purify streptavidin-binding peptide tagged proteins or biotinylated proteins.

    Science.gov (United States)

    Wu, Sau-Ching; Wong, Sui-Lam

    2013-01-01

    Development of a high-affinity streptavidin-binding peptide (SBP) tag allows the tagged recombinant proteins to be affinity purified using the streptavidin matrix without the need of biotinylation. The major limitation of this powerful technology is the requirement to use biotin to elute the SBP-tagged proteins from the streptavidin matrix. Tight biotin binding by streptavidin essentially allows the matrix to be used only once. To address this problem, differences in interactions of biotin and SBP with streptavidin were explored. Loop3-4 which serves as a mobile lid for the biotin binding pocket in streptavidin is in the closed state with biotin binding. In contrast, this loop is in the open state with SBP binding. Replacement of glycine-48 with a bulkier residue (threonine) in this loop selectively reduces the biotin binding affinity (Kd) from 4 × 10(-14) M to 4.45 × 10(-10) M without affecting the SBP binding affinity. Introduction of a second mutation (S27A) to the first mutein (G48T) results in the development of a novel engineered streptavidin SAVSBPM18 which could be recombinantly produced in the functional form from Bacillus subtilis via secretion. To form an intact binding pocket for tight binding of SBP, two diagonally oriented subunits in a tetrameric streptavidin are required. It is vital for SAVSBPM18 to be stably in the tetrameric state in solution. This was confirmed using an HPLC/Laser light scattering system. SAVSBPM18 retains high binding affinity to SBP but has reversible biotin binding capability. The SAVSBPM18 matrix can be applied to affinity purify SBP-tagged proteins or biotinylated molecules to homogeneity with high recovery in a reusable manner. A mild washing step is sufficient to regenerate the matrix which can be reused for multiple rounds. Other applications including development of automated protein purification systems, lab-on-a-chip micro-devices, reusable biosensors, bioreactors and microarrays, and strippable detection agents for

  18. Task team approach to safeguards and security designs

    International Nuclear Information System (INIS)

    Zack, N.R.; Wilkey, D.D.

    1991-01-01

    In 1987, a U.S. department of Energy (DOE) supported task team was organized at the request of the DOE Idaho Field Office (DOE-ID) to provide support for safeguards and security (S and S) designs of the Special Isotope Separation (SIS) facility. Prior to deferral of the project, the SIS facility was to be constructed at the Idaho National Engineering Laboratory (INEL) to produce weapons grade plutonium from DOE owned fuel grade plutonium. The task team was assembled to provide the resources necessary to assure that S and S considerations were included as an integral part of the design of the facility, and that SIS designs would take advantage of available technology in the areas of physical security, measurements, accountability, and material and personnel tracking. The task team included personnel from DOE/Office of Safeguards and Security (DOE-OSS), DOE-ID, DOE contractors, and the national laboratories providing a wide range of expertise and experience. This paper reports that the team reviewed proposed designs and provided recommendations for safeguards and security features in each stage of the design process. The value of this approach to safeguards and security designs will be discussed with respect to benefits, lessons learned, and recommendations for future applications

  19. Best Practices for the Security of Radioactive Materials

    Energy Technology Data Exchange (ETDEWEB)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

  20. Best Practices for the Security of Radioactive Materials

    International Nuclear Information System (INIS)

    Coulter, D.T.; Musolino, S.

    2009-01-01

    both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

  1. miRNA engineering of CHO cells facilitates production of difficult-to-express proteins and increases success in cell line development.

    Science.gov (United States)

    Fischer, Simon; Marquart, Kim F; Pieper, Lisa A; Fieder, Juergen; Gamer, Martin; Gorr, Ingo; Schulz, Patrick; Bradl, Harald

    2017-07-01

    In recent years, coherent with growing biologics portfolios also the number of complex and thus difficult-to-express (DTE) therapeutic proteins has increased considerably. DTE proteins challenge bioprocess development and can include various therapeutic protein formats such as monoclonal antibodies (mAbs), multi-specific affinity scaffolds (e.g., bispecific antibodies), cytokines, or fusion proteins. Hence, the availability of robust and versatile Chinese hamster ovary (CHO) host cell factories is fundamental for high-yielding bioprocesses. MicroRNAs (miRNAs) have emerged as potent cell engineering tools to improve process performance of CHO manufacturing cell lines. However, there has not been any report demonstrating the impact of beneficial miRNAs on industrial cell line development (CLD) yet. To address this question, we established novel CHO host cells constitutively expressing a pro-productive miRNA: miR-557. Novel host cells were tested in two independent CLD campaigns using two different mAb candidates including a normal as well as a DTE antibody. Presence of miR-557 significantly enhanced each process step during CLD in a product independent manner. Stable expression of miR-557 increased the probability to identify high-producing cell clones. Furthermore, production cell lines derived from miR-557 expressing host cells exhibited significantly increased final product yields in fed-batch cultivation processes without compromising product quality. Strikingly, cells co-expressing miR-557 and a DTE antibody achieved a twofold increase in product titer compared to clones co-expressing a negative control miRNA. Thus, host cell engineering using miRNAs represents a promising tool to overcome limitations in industrial CLD especially with regard to DTE proteins. Biotechnol. Bioeng. 2017;114: 1495-1510. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  2. Health care professionals’ perception of security of personal health devices

    Directory of Open Access Journals (Sweden)

    Ondiege B

    2017-04-01

    Full Text Available Brian Ondiege, Malcolm Clarke Department of Computer Science, College of Engineering, Design and Physical Sciences, Brunel University London, UK Abstract: With the rapid advances in the capabilities of telehealth devices and their increasing connection to the Internet, security is becoming an issue of major concern. Therefore, the perceptions of the health care professionals regarding security are of interest, as the patients trust them to make informed decisions on issues concerning their privacy, data, and health. Eight health care professionals were interviewed to determine their perceptions and knowledge of security in health care. The research further examines one specific aspect of security which is considered of significant concern: the authenticity of a device being from the actual manufacturer and not a counterfeit. This research proposes device registration together with digital signatures and one-time passwords to address the issue of counterfeit remote patient-monitoring devices and identify and authenticate the user of the device. Keywords: telehealth security, health care professionals’ perception, personal health device, authentication

  3. Selection application for platforms and security protocols suitable for wireless sensor networks

    International Nuclear Information System (INIS)

    Moeller, S; Newe, T; Lochmann, S

    2009-01-01

    There is a great number of platforms and security protocols which can be used for wireless sensor networks (WSN). All these platforms and protocols have different properties with certain advantages and disadvantages. For a good choice of platform and an associated protocol, these advantages and disadvantages should be compared and the best for the appropriate WSN chosen. To select a Security protocol and a wireless platform suitable for a specific application a software tool will be developed. That tool will enable wireless network deployment engineers to easily select a suitable wireless platform for their application based on their network needs and application security requirements.

  4. Genetically engineered nanocarriers for drug delivery

    Directory of Open Access Journals (Sweden)

    Shi P

    2014-03-01

    Full Text Available Pu Shi, Joshua A Gustafson, J Andrew MacKayDepartment of Pharmacology and Pharmaceutical Sciences, University of Southern California, Los Angeles, CA, USAAbstract: Cytotoxicity, low water solubility, rapid clearance from circulation, and off-target side-effects are common drawbacks of conventional small-molecule drugs. To overcome these shortcomings, many multifunctional nanocarriers have been proposed to enhance drug delivery. In concept, multifunctional nanoparticles might carry multiple agents, control release rate, biodegrade, and utilize target-mediated drug delivery; however, the design of these particles presents many challenges at the stage of pharmaceutical development. An emerging solution to improve control over these particles is to turn to genetic engineering. Genetically engineered nanocarriers are precisely controlled in size and structure and can provide specific control over sites for chemical attachment of drugs. Genetically engineered drug carriers that assemble nanostructures including nanoparticles and nanofibers can be polymeric or non-polymeric. This review summarizes the recent development of applications in drug and gene delivery utilizing nanostructures of polymeric genetically engineered drug carriers such as elastin-like polypeptides, silk-like polypeptides, and silk-elastin-like protein polymers, and non-polymeric genetically engineered drug carriers such as vault proteins and viral proteins.Keywords: polymeric drug carrier, non-polymeric drug carrier, gene delivery, GE drug carriers

  5. Efficiently engineered cell sheet using a complex of polyethylenimine–alginate nanocomposites plus bone morphogenetic protein 2 gene to promote new bone formation

    Science.gov (United States)

    Jin, Han; Zhang, Kai; Qiao, Chunyan; Yuan, Anliang; Li, Daowei; Zhao, Liang; Shi, Ce; Xu, Xiaowei; Ni, Shilei; Zheng, Changyu; Liu, Xiaohua; Yang, Bai; Sun, Hongchen

    2014-01-01

    Regeneration of large bone defects is a common clinical problem. Recently, stem cell sheet has been an emerging strategy in bone tissue engineering. To enhance the osteogenic potential of stem cell sheet, we fabricated bone morphogenetic protein 2 (BMP-2) gene-engineered cell sheet using a complex of polyethylenimine–alginate (PEI–al) nanocomposites plus human BMP-2 complementary(c)DNA plasmid, and studied its osteogenesis in vitro and in vivo. PEI–al nanocomposites carrying BMP-2 gene could efficiently transfect bone marrow mesenchymal stem cells. The cell sheet was made by culturing the cells in medium containing vitamin C for 10 days. Assays on the cell culture showed that the genetically engineered cells released the BMP-2 for at least 14 days. The expression of osteogenesis-related gene was increased, which demonstrated that released BMP-2 could effectively induce the cell sheet osteogenic differentiation in vitro. To further test the osteogenic potential of the cell sheet in vivo, enhanced green fluorescent protein or BMP-2-producing cell sheets were treated on the cranial bone defects. The results indicated that the BMP-2-producing cell sheet group was more efficient than other groups in promoting bone formation in the defect area. Our results suggested that PEI–al nanocomposites efficiently deliver the BMP-2 gene to bone marrow mesenchymal stem cells and that BMP-2 gene-engineered cell sheet is an effective way for promoting bone regeneration. PMID:24855355

  6. Neoproteoglycans in tissue engineering

    Science.gov (United States)

    Weyers, Amanda; Linhardt, Robert J.

    2014-01-01

    Proteoglycans, comprised of a core protein to which glycosaminoglycan chains are covalently linked, are an important structural and functional family of macromolecules found in the extracellular matrix. Advances in our understanding of biological interactions have lead to a greater appreciation for the need to design tissue engineering scaffolds that incorporate mimetics of key extracellular matrix components. A variety of synthetic and semisynthetic molecules and polymers have been examined by tissue engineers that serve as structural, chemical and biological replacements for proteoglycans. These proteoglycan mimetics have been referred to as neoproteoglycans and serve as functional and therapeutic replacements for natural proteoglycans that are often unavailable for tissue engineering studies. Although neoproteoglycans have important limitations, such as limited signaling ability and biocompatibility, they have shown promise in replacing the natural activity of proteoglycans through cell and protein binding interactions. This review focuses on the recent in vivo and in vitro tissue engineering applications of three basic types of neoproteoglycan structures, protein–glycosaminoglycan conjugates, nano-glycosaminoglycan composites and polymer–glycosaminoglycan complexes. PMID:23399318

  7. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  8. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  9. Cyber Security Risk Assessment for the KNICS Safety Systems

    International Nuclear Information System (INIS)

    Lee, C. K.; Park, G. Y.; Lee, Y. J.; Choi, J. G.; Kim, D. H.; Lee, D. Y.; Kwon, K. C.

    2008-01-01

    In the Korea Nuclear I and C Systems Development (KNICS) project the platforms for plant protection systems are developed, which function as a reactor shutdown, actuation of engineered safety features and a control of the related equipment. Those are fully digitalized through the use of safety-grade programmable logic controllers (PLCs) and communication networks. In 2006 the Regulatory Guide 1.152 (Rev. 02) was published by the U.S. NRC and it describes the application of a cyber security to the safety systems in the Nuclear Power Plant (NPP). Therefore it is required that the new requirements are incorporated into the developed platforms to apply to NPP, and a cyber security risk assessment is performed. The results of the assessment were input for establishing the cyber security policies and planning the work breakdown to incorporate them

  10. Efficiently engineered cell sheet using a complex of polyethylenimine–alginate nanocomposites plus bone morphogenetic protein 2 gene to promote new bone formation

    Directory of Open Access Journals (Sweden)

    Jin H

    2014-05-01

    Full Text Available Han Jin,1 Kai Zhang,2 Chunyan Qiao,1 Anliang Yuan,1 Daowei Li,1 Liang Zhao,1 Ce Shi,1 Xiaowei Xu,1 Shilei Ni,1 Changyu Zheng,3 Xiaohua Liu,4 Bai Yang,2 Hongchen Sun11Department of Pathology, School of Stomatology, Jilin University, Changchun, People’s Republic of China; 2State Key Laboratory of Supramolecular Structure and Materials, College of Chemistry, Jilin University, Changchun, People’s Republic of China; 3Molecular Physiology and Therapeutics Branch, National Institute of Dental and Craniofacial Research, National Institutes of Health, Bethesda, MD, USA; 4Department of Biomedical Sciences, Texas A&M University Baylor College of Dentistry, Dallas, TX, USAAbstract: Regeneration of large bone defects is a common clinical problem. Recently, stem cell sheet has been an emerging strategy in bone tissue engineering. To enhance the osteogenic potential of stem cell sheet, we fabricated bone morphogenetic protein 2 (BMP-2 gene-engineered cell sheet using a complex of polyethylenimine–alginate (PEI–al nanocomposites plus human BMP-2 complementary(cDNA plasmid, and studied its osteogenesis in vitro and in vivo. PEI–al nanocomposites carrying BMP-2 gene could efficiently transfect bone marrow mesenchymal stem cells. The cell sheet was made by culturing the cells in medium containing vitamin C for 10 days. Assays on the cell culture showed that the genetically engineered cells released the BMP-2 for at least 14 days. The expression of osteogenesis-related gene was increased, which demonstrated that released BMP-2 could effectively induce the cell sheet osteogenic differentiation in vitro. To further test the osteogenic potential of the cell sheet in vivo, enhanced green fluorescent protein or BMP-2-producing cell sheets were treated on the cranial bone defects. The results indicated that the BMP-2-producing cell sheet group was more efficient than other groups in promoting bone formation in the defect area. Our results suggested that PEI

  11. Nuclear Engineering Education in Support of Thailand’s Nuclear Power Programme

    International Nuclear Information System (INIS)

    Chanyotha, S.; Pengvanich, P.; Nilsuwankosit, S.

    2015-01-01

    This paper aims to introduce the nuclear engineering education at the Department of Nuclear Engineering, Chulalongkon University, Bangkok Thailand. The department has been offering curriculum in nuclear engineering to support the national nuclear power programme since 1970s. It is the oldest established nuclear engineering educational programme in the South East Asia region. Nevertheless, since the nuclear power programme has been postponed several times due to various reasons, the educational programme at the department has been continuously adapted to meet the nation’s needs. Several areas of study have been introduced, including nuclear power engineering, industrial applications of radioisotope, nuclear instrumentation, radioisotope production, radiation processing, environment and safety, nuclear materials, as well as the newly created nuclear security and non-proliferation. With the renewed interest in using nuclear power in Thailand in 2007, the department has been actively assisting both the government and the electric utility in preparing human resources to support the nuclear power programme through various educational and training modules. Realizing the importance of establishing and balancing all 3 aspects of the nuclear 3S (safety, security and safeguard) in Thailand and in the Southeast Asian region. The new curriculum of nuclear security and safeguard programme has been offered since 2013. Since the establishment, the department has produced hundreds of graduates (Diploma, Master’s, and Ph.D. levels) to feed the continuously expanding Thai nuclear industry. The full paper will provide detailed information of the curriculum, the challenges and obstacles that the department has encountered, as well as the national and international linkages which have been established over the years. (author)

  12. An engineered genetic selection for ternary protein complexes inspired by a natural three-component hitchhiker mechanism.

    Science.gov (United States)

    Lee, Hyeon-Cheol; Portnoff, Alyse D; Rocco, Mark A; DeLisa, Matthew P

    2014-12-22

    The bacterial twin-arginine translocation (Tat) pathway is well known to translocate correctly folded monomeric and dimeric proteins across the tightly sealed cytoplasmic membrane. We identified a naturally occurring heterotrimer, the Escherichia coli aldehyde oxidoreductase PaoABC, that is co-translocated by the Tat translocase according to a ternary "hitchhiker" mechanism. Specifically, the PaoB and PaoC subunits, each devoid of export signals, are escorted to the periplasm in a piggyback fashion by the Tat signal peptide-containing subunit PaoA. Moreover, export of PaoA was blocked when either PaoB or PaoC was absent, revealing a surprising interdependence for export that is not seen for classical secretory proteins. Inspired by this observation, we created a bacterial three-hybrid selection system that links the formation of ternary protein complexes with antibiotic resistance. As proof-of-concept, a bispecific antibody was employed as an adaptor that physically crosslinked one antigen fused to a Tat export signal with a second antigen fused to TEM-1 β-lactamase (Bla). The resulting non-covalent heterotrimer was exported in a Tat-dependent manner, delivering Bla to the periplasm where it hydrolyzed β-lactam antibiotics. Collectively, these results highlight the remarkable flexibility of the Tat system and its potential for studying and engineering ternary protein interactions in living bacteria.

  13. Engineering of bispecific affinity proteins with high affinity for ERBB2 and adaptable binding to albumin.

    Directory of Open Access Journals (Sweden)

    Johan Nilvebrant

    Full Text Available The epidermal growth factor receptor 2, ERBB2, is a well-validated target for cancer diagnostics and therapy. Recent studies suggest that the over-expression of this receptor in various cancers might also be exploited for antibody-based payload delivery, e.g. antibody drug conjugates. In such strategies, the full-length antibody format is probably not required for therapeutic effect and smaller tumor-specific affinity proteins might be an alternative. However, small proteins and peptides generally suffer from fast excretion through the kidneys, and thereby require frequent administration in order to maintain a therapeutic concentration. In an attempt aimed at combining ERBB2-targeting with antibody-like pharmacokinetic properties in a small protein format, we have engineered bispecific ERBB2-binding proteins that are based on a small albumin-binding domain. Phage display selection against ERBB2 was used for identification of a lead candidate, followed by affinity maturation using second-generation libraries. Cell surface display and flow-cytometric sorting allowed stringent selection of top candidates from pools pre-enriched by phage display. Several affinity-matured molecules were shown to bind human ERBB2 with sub-nanomolar affinity while retaining the interaction with human serum albumin. Moreover, parallel selections against ERBB2 in the presence of human serum albumin identified several amino acid substitutions that dramatically modulate the albumin affinity, which could provide a convenient means to control the pharmacokinetics. The new affinity proteins competed for ERBB2-binding with the monoclonal antibody trastuzumab and recognized the native receptor on a human cancer cell line. Hence, high affinity tumor targeting and tunable albumin binding were combined in one small adaptable protein.

  14. The Technique of Binary Code Decompilation and Its Application in Information Security Sphere

    Directory of Open Access Journals (Sweden)

    M. O. Shudrak

    2012-12-01

    Full Text Available The authors describes a new technique of binary code decompilation and its application possibility in information security such as software protection against reverse engineering and code obfuscation analyze in malware.

  15. A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application

    Science.gov (United States)

    Compagna, Luca; El Khoury, Paul; Massacci, Fabio; Saidane, Ayda

    Providing context-dependent security services is an important challenge for ambient intelligent systems. The complexity and the unbounded nature of such systems make it difficult even for the most experienced and knowledgeable security engineers, to foresee all possible situations and interactions when developing the system. In order to solve this problem context based self- diagnosis and reconfiguration at runtime should be provided.

  16. Integrated Proteomic Pipeline Using Multiple Search Engines for a Proteogenomic Study with a Controlled Protein False Discovery Rate.

    Science.gov (United States)

    Park, Gun Wook; Hwang, Heeyoun; Kim, Kwang Hoe; Lee, Ju Yeon; Lee, Hyun Kyoung; Park, Ji Yeong; Ji, Eun Sun; Park, Sung-Kyu Robin; Yates, John R; Kwon, Kyung-Hoon; Park, Young Mok; Lee, Hyoung-Joo; Paik, Young-Ki; Kim, Jin Young; Yoo, Jong Shin

    2016-11-04

    In the Chromosome-Centric Human Proteome Project (C-HPP), false-positive identification by peptide spectrum matches (PSMs) after database searches is a major issue for proteogenomic studies using liquid-chromatography and mass-spectrometry-based large proteomic profiling. Here we developed a simple strategy for protein identification, with a controlled false discovery rate (FDR) at the protein level, using an integrated proteomic pipeline (IPP) that consists of four engrailed steps as follows. First, using three different search engines, SEQUEST, MASCOT, and MS-GF+, individual proteomic searches were performed against the neXtProt database. Second, the search results from the PSMs were combined using statistical evaluation tools including DTASelect and Percolator. Third, the peptide search scores were converted into E-scores normalized using an in-house program. Last, ProteinInferencer was used to filter the proteins containing two or more peptides with a controlled FDR of 1.0% at the protein level. Finally, we compared the performance of the IPP to a conventional proteomic pipeline (CPP) for protein identification using a controlled FDR of <1% at the protein level. Using the IPP, a total of 5756 proteins (vs 4453 using the CPP) including 477 alternative splicing variants (vs 182 using the CPP) were identified from human hippocampal tissue. In addition, a total of 10 missing proteins (vs 7 using the CPP) were identified with two or more unique peptides, and their tryptic peptides were validated using MS/MS spectral pattern from a repository database or their corresponding synthetic peptides. This study shows that the IPP effectively improved the identification of proteins, including alternative splicing variants and missing proteins, in human hippocampal tissues for the C-HPP. All RAW files used in this study were deposited in ProteomeXchange (PXD000395).

  17. Cross Kingdom Glyco Protein Engineering

    DEFF Research Database (Denmark)

    Möller, Svenning Rune

    delivered CRISPR/Cas9’, describes the use of viral replicons to deliver the CRISPR/Cas9 components to leaves of Nicotiana benthamiana, which we have optimized by fusing a Gfp marker to the Cas9 protein combined with FACS mediated cell sorting of Cas9-Gfp expressing protoplast cells....

  18. Educating the next generation of nuclear safeguards and security experts at TAMU

    International Nuclear Information System (INIS)

    Charlton, William S.; Boyle, David; Chirayath, Sunil; Ford, David G.; Gariazzo, Claudio A.; Marianno, Craig; Ragusa, Kelley; Solodov, Alexander

    2011-01-01

    The Nuclear Security Science and Policy Institute (NSSPI) has established a Nuclear Nonproliferation specialization for the Master of Science degree within the Nuclear Engineering Department at Texas A and M University (TAMU). Since 2004, twenty-eight students have received MS degrees in this area and over 200 (technical and policy) students have taken classes offered by NSSPI at TAMU. The model for educating safeguards and security experts is being changed at TAMU. Beyond conventional classroom lectures, NSSPI has developed alternative educational models based on practical experience, asynchronous learning portals, and virtual courses in both nuclear safeguards and nuclear security. Due to the experimental and practical past experiences of NSSPI staff and faculty, a heavy hands-on component has been implemented for TAMU nuclear engineering graduate students: hands-on education at Oak Ridge National Laboratory, visiting nuclear installations in other countries to discuss applied safeguards, and summer internships at several national laboratories. In an effort to disseminate basic nuclear education for professionals and students around the globe, NSSPI has developed a publically-available online resource that offers self-paced, independent course modules in basic safeguards and security education: the Nuclear Safeguards Education Portal. Another venture utilized by NSSPI is using a virtual TAMU campus to hold classes for students at a distance. NSSPI is building upon a successful academic program by embracing new educational means. This paper describes the current efforts NSSPI and TAMU have undertaken in strengthening the nuclear nonproliferation, safeguards and security human resource capacity domestically and internationally and the lessons learned from these efforts. (author)

  19. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    Science.gov (United States)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  20. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    secure authorization is pushed into the database engine will eliminate inefficient data transfer bottlenecks. Furthermore, traditionally separated database and security layers provide an extra vulnerability, leaving a weak clear-text password authorization as the only protection on the database core systems. Due to the legacy limitations of the systems’ security models, the allowed passwords often can not even comply with the DOE password guideline requirements. We see an opportunity for the tight integration of the secure authorization layer with the database server engine resulting in both improved performance and improved security. Phase I has focused on the development of a proof-of-concept prototype using Argonne National Laboratory’s (ANL) Argonne Tandem-Linac Accelerator System (ATLAS) project as a test scenario. By developing a grid-security enabled version of the ATLAS project’s current relation database solution, MySQL, PIOCON Technologies aims to offer a more efficient solution to secure database access.

  1. High-Performance Secure Database Access Technologies for HEP Grids

    International Nuclear Information System (INIS)

    Vranicar, Matthew; Weicher, John

    2006-01-01

    authorization is pushed into the database engine will eliminate inefficient data transfer bottlenecks. Furthermore, traditionally separated database and security layers provide an extra vulnerability, leaving a weak clear-text password authorization as the only protection on the database core systems. Due to the legacy limitations of the systems security models, the allowed passwords often can not even comply with the DOE password guideline requirements. We see an opportunity for the tight integration of the secure authorization layer with the database server engine resulting in both improved performance and improved security. Phase I has focused on the development of a proof-of-concept prototype using Argonne National Laboratory's (ANL) Argonne Tandem-Linac Accelerator System (ATLAS) project as a test scenario. By developing a grid-security enabled version of the ATLAS project's current relation database solution, MySQL, PIOCON Technologies aims to offer a more efficient solution to secure database access

  2. Multidisciplinary systems engineering architecting the design process

    CERN Document Server

    Crowder, James A; Demijohn, Russell

    2016-01-01

    This book presents Systems Engineering from a modern, multidisciplinary engineering approach, providing the understanding that all aspects of systems design, systems, software, test, security, maintenance and the full life-cycle must be factored in to any large-scale system design; up front, not factored in later. It lays out a step-by-step approach to systems-of-systems architectural design, describing in detail the documentation flow throughout the systems engineering design process. It provides a straightforward look and the entire systems engineering process, providing realistic case studies, examples, and design problems that will enable students to gain a firm grasp on the fundamentals of modern systems engineering.  Included is a comprehensive design problem that weaves throughout the entire text book, concluding with a complete top-level systems architecture for a real-world design problem.

  3. Engineering in translational medicine

    CERN Document Server

    2014-01-01

    This book covers a broad area of engineering research in translational medicine. Leaders in academic institutions around the world contributed focused chapters on a broad array of topics such as: cell and tissue engineering (6 chapters), genetic and protein engineering (10 chapters), nanoengineering (10 chapters), biomedical instrumentation (4 chapters), and theranostics and other novel approaches (4 chapters). Each chapter is a stand-alone review that summarizes the state-of-the-art of the specific research area. Engineering in Translational Medicine gives readers a comprehensive and in-depth overview of a broad array of related research areas, making this an excellent reference book for scientists and students both new to engineering/translational medicine and currently working in this area.

  4. Generating Southern Africa Precipitation Forecast Using the FEWS Engine, a New Application for the Google Earth Engine

    Science.gov (United States)

    Landsfeld, M. F.; Hegewisch, K.; Daudert, B.; Morton, C.; Husak, G. J.; Friedrichs, M.; Funk, C. C.; Huntington, J. L.; Abatzoglou, J. T.; Verdin, J. P.

    2016-12-01

    The Famine Early Warning Systems Network (FEWS NET) focuses on food insecurity in developing nations and provides objective, evidence-based analysis to help government decision-makers and relief agencies plan for and respond to humanitarian emergencies. The network of FEWS NET analysts and scientists require flexible, interactive tools to aid in their monitoring and research efforts. Because they often work in bandwidth-limited regions, lightweight Internet tools and services that bypass the need for downloading massive datasets are preferred for their work. To support food security analysis FEWS NET developed a custom interface for the Google Earth Engine (GEE). GEE is a platform developed by Google to support scientific analysis of environmental data in their cloud computing environment. This platform allows scientists and independent researchers to mine massive collections of environmental data, leveraging Google's vast computational resources for purposes of detecting changes and monitoring the Earth's surface and climate. GEE hosts an enormous amount of satellite imagery and climate archives, one of which is the Climate Hazards Group Infrared Precipitation with Stations dataset (CHIRPS). CHIRPS precipitation dataset is a key input for FEWS NET monitoring and forecasting efforts. In this talk we introduce the FEWS Engine interface. We present an application that highlights the utility of FEWS Engine for forecasting the upcoming seasonal precipitation of southern Africa. Specifically, the current state of ENSO is assessed and used to identify similar historical seasons. The FEWS Engine compositing tool is used to examine rainfall and other environmental data for these analog seasons. The application illustrates the unique benefits of using FEWS Engine for on-the-fly food security scenario development.

  5. Ligand-directed tosyl chemistry for in situ native protein labeling and engineering in living systems: from basic properties to applications.

    Science.gov (United States)

    Tsukiji, Shinya; Hamachi, Itaru

    2014-08-01

    The ability to introduce any chemical probe to any endogenous target protein in its native environment, that is in cells and in vivo, is anticipated to provide various new exciting tools for biological and biomedical research. Although still at the prototype stage, the ligand-directed tosyl (LDT) chemistry is a novel type of affinity labeling technique that we developed for such a dream. This chemistry allows for modifying native proteins by various chemical probes with high specificity in various biological settings ranging from in vitro (in test tubes) to in living cells and in vivo. Since the first report, the list of proteins that are successfully labeled by the LDT chemistry has been increasing. A growing number of studies have demonstrated its utility to create semisynthetic proteins directly in cellular contexts. The in situ generated semisynthetic proteins are applicable for various types of analysis and imaging of intracellular biological processes. In this review, we summarize the basic properties of the LDT chemistry and its applications toward in situ engineering and analysis of native proteins in living systems. Current limitations and future challenges of this area are also described. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. OpenDBDDAS Toolkit: Secure MapReduce and Hadoop-like Systems

    KAUST Repository

    Fabiano, Enrico

    2015-06-01

    The OpenDBDDAS Toolkit is a software framework to provide support for more easily creating and expanding dynamic big data-driven application systems (DBDDAS) that are common in environmental systems, many engineering applications, disaster management, traffic management, and manufacturing. In this paper, we describe key features needed to implement a secure MapReduce and Hadoop-like system for high performance clusters that guarantees a certain level of privacy of data from other concurrent users of the system. We also provide examples of a secure MapReduce prototype and compare it to another high performance MapReduce, MR-MPI.

  7. Structure of anti-FLAG M2 Fab domain and its use in the stabilization of engineered membrane proteins

    International Nuclear Information System (INIS)

    Roosild, Tarmo P.; Castronovo, Samantha; Choe, Senyon

    2006-01-01

    The X-ray crystallographic analysis of anti-FLAG M2 Fab is reported and the implications of the structure on FLAG epitope binding are described as a first step in the development of a tool for the structural and biophysical study of membrane proteins. The inherent difficulties of stabilizing detergent-solubilized integral membrane proteins for biophysical or structural analysis demand the development of new methodologies to improve success rates. One proven strategy is the use of antibody fragments to increase the ‘soluble’ portion of any membrane protein, but this approach is limited by the difficulties and expense associated with producing monoclonal antibodies to an appropriate exposed epitope on the target protein. Here, the stabilization of a detergent-solubilized K + channel protein, KvPae, by engineering a FLAG-binding epitope into a known loop region of the protein and creating a complex with Fab fragments from commercially available anti-FLAG M2 monoclonal antibodies is reported. Although well diffracting crystals of the complex have not yet been obtained, during the course of crystallization trials the structure of the anti-FLAG M2 Fab domain was solved to 1.86 Å resolution. This structure, which should aid future structure-determination efforts using this approach by facilitating molecular-replacement phasing, reveals that the binding pocket appears to be specific only for the first four amino acids of the traditional FLAG epitope, namely DYKD. Thus, the use of antibody fragments for improving the stability of target proteins can be rapidly applied to the study of membrane-protein structure by placing the short DKYD motif within a predicted peripheral loop of that protein and utilizing commercially available anti-FLAG M2 antibody fragments

  8. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  9. Engineering a de Novo Transport Tunnel

    Czech Academy of Sciences Publication Activity Database

    Březovský, J.; Babková, P.; Degtjarik, O.; Fořtová, A.; Gora, A.; Iermak, I.; Řezáčová, Pavlína; Dvořák, P.; Kutá Smatanová, I.; Prokop, Z.; Chaloupková, R.; Damborský, J.

    2016-01-01

    Roč. 6, č. 11 (2016), s. 7597-7610 ISSN 2155-5435 Institutional support: RVO:61388963 Keywords : transport tunnel * protein engineering * protein design * activity * specificity Subject RIV: CE - Biochemistry Impact factor: 10.614, year: 2016

  10. Engineered mammalian cells for production of recombinant proteins

    DEFF Research Database (Denmark)

    2017-01-01

    The present invention relates to mammalian cells modified to provide for improved expression of a recombinant protein of interest. In particular, the invention relates to CHO cells and other host cells in which the expression of one or more endogenous secreted proteins has been disrupted, as well...... as to the preparation, identification and use of such cells in the production of recombinant proteins....

  11. ICT security curriculum or how to respond to current global challenges

    Directory of Open Access Journals (Sweden)

    Marian Silviu Poboroniuc

    2017-01-01

    Full Text Available The paper presents some results obtained through the implementation of the Erasmus LLP “SALEIE” (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions. The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and Information Engineering (EIE education within Europe, especially in relation to modern global technical challenges and to provide higher education models in a few EIE fields in accordance with these challenges. One of the outcomes of the project was a new ICT (Information and Computer Technology Security curriculum for bachelor and master levels. The research methodology comprised such stages as: identifying the most important current global challenges, conducting a survey related to existing EIE programs in order to establish the top-level criteria for an EIE curriculum, analyzing the results of the survey, obtaining the industry feedback related to technical and non-technical skills required for the specific field, and proposing a new curriculum for ICT Security programmes to respond to the modern technical challenges and to meet the needs of the industry, students, academics and graduates. As future work we will focus on stakeholder assessment in the EIE field and, based on the resulting feedback, on improving the ICT Security curriculum.

  12. Engineering a de Novo Transport Tunnel

    Czech Academy of Sciences Publication Activity Database

    Březovský, J.; Babková, P.; Degtjarik, Oksana; Fořtová, A.; Gora, A.; Iermak, Iuliia; Řezáčová, Pavlína; Dvořák, P.; Kutá Smatanová, Ivana; Prokop, Z.; Chaloupková, R.; Damborský, J.

    2016-01-01

    Roč. 6, č. 11 (2016), s. 7597-7610 ISSN 2155-5435 Institutional support: RVO:61388971 ; RVO:68378050 Keywords : transport tunnel * protein engineering * protein design Subject RIV: EE - Microbiology, Virology Impact factor: 10.614, year: 2016

  13. Quantifying resilience for resilience engineering of socio technical systems

    OpenAIRE

    Häring, Ivo; Ebenhöch, Stefan; Stolz, Alexander

    2016-01-01

    Resilience engineering can be defined to comprise originally technical, engineering and natural science approaches to improve the resilience and sustainability of socio technical cyber-physical systems of various complexities with respect to disruptive events. It is argued how this emerging interdisciplinary technical and societal science approach may contribute to civil and societal security research. In this context, the article lists expected benefits of quantifying resilience. Along the r...

  14. Secure vendor environment (SVE) for PACS

    Science.gov (United States)

    Honeyman-Buck, Janice; Frost, Meryll

    2005-04-01

    A Secure Vendor Environment (SVE) was created to protect radiology modalities from network intrusion, worms, viruses, and other forms of damaging attacks. Many vendors do not attempt any form of network security and if an institution demands a non-standard and secure installation, a future system upgrade could and frequently does eliminate any security measures installed during the initial installation. The SVE isolates the vendor equipment behind a virtual firewall on a private network that is invisible to the outside world. All interactions must go though a device containing two network interface cards called an Application Processor that acts as a store-and forward router, performs DICOM repair, proxies modality worklist, and isolates the vendor modalities. A small VPN appliance can open the device temporarily for remote access by vendor engineers. Prior to the routine installation of the SVE, vendor equipment was often attacked by hostile network intruders and viruses or worms, sometimes rendering the equipment unusable until the vendor could reload the system. The resulted in considerable clinical downtime and loss of revenue. Since the relatively low cost SVE solution has routinely been installed with all new equipment, no intrusions have occurred, although our network sniffers and intrusion detectors indicate that we are constantly being scanned for vulnerability. Purpose: To provide a secure network for vendor equipment in a PACS environment while allowing vendor access for upgrades and system repairs. Method: The network administrators at our university believe that network security should be implemented at the machine level rather than relying on a firewall. A firewall solution could conceivably block unwanted intrusion from outside the university network, but would still allow literally thousands of potential network users to get through to the PACS network. All the PACS archive, display and routing systems are individually protected from intrusion, but

  15. Security and privacy in cyber-physical systems foundations, principles, and applications

    CERN Document Server

    Song, Houbing; Jeschke, Sabina

    2017-01-01

    Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today's simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovat...

  16. 3rd International Conference on Nanotechnologies and Biomedical Engineering

    CERN Document Server

    Tiginyanu, Ion

    2016-01-01

    This volume presents the proceedings of the 3rd International Conference on Nanotechnologies and Biomedical Engineering which was held on September 23-26, 2015 in Chisinau, Republic of Moldova. ICNBME-2015 continues the series of International Conferences in the field of nanotechnologies and biomedical engineering. It aims at bringing together scientists and engineers dealing with fundamental and applied research for reporting on the latest theoretical developments and applications involved in the fields. Topics include Nanotechnologies and nanomaterials Plasmonics and metamaterials Bio-micro/nano technologies Biomaterials Biosensors and sensors systems Biomedical instrumentation Biomedical signal processing Biomedical imaging and image processing Molecular, cellular and tissue engineering Clinical engineering, health technology management and assessment; Health informatics, e-health and telemedicine Biomedical engineering education Nuclear and radiation safety and security Innovations and technology transfer...

  17. [Health security--GMOs in therapeutics].

    Science.gov (United States)

    Trouvin, J-H

    2003-03-01

    The recent progress in human therapeutics has been made possible thanks to molecular biology and its use in producing proteins having the same sequence and structure as that of human proteins. The use of GMOs allows production of proteins with high added value in therapeutics, which are of satisfactory quality. GMOs may also be directly administered to patients as gene therapy vectors. However, the use of GMOs in therapeutics must take into consideration some risks, particularly those of microbiological contamination, of neo-antigenicity as well as environmental risks with regard to the way of use of the GMO. Nevertheless, those risks are taken in due consideration in the development of these new medicinal products; solutions have been found to allow their use in therapeutics with a very positive benefit/risk ratio. Medicinal products from biotechnology have enabled considerable therapeutic progress without compromising health security.

  18. Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace

    Science.gov (United States)

    2014-05-01

    towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer

  19. 9th Annual Systems Engineering Conference: Volume 4 Thursday

    Science.gov (United States)

    2006-10-26

    ISO /IEC 27000 series – Information Security Management System (ISMS) – ISO /IEC 17799:2005 – Code of Practice for Information Security Management...October 2006, Track 2 Standards Organizations Supporting Assurance ISO IEC JTC1TC176 SC1 SC22 Terminology Software Engineering Language, OS SC7...Information Assurance IEEE CS ISO IEC IEEE CS NIST FISMA Projects U.S. Gov’t DoD MIL-STDsPolicy Memos OMG Knowledge Discovery Models OMG 259th Annual

  20. Comparative proteomics analysis of engineered Saccharomyces cerevisiae with enhanced biofuel precursor production.

    Directory of Open Access Journals (Sweden)

    Xiaoling Tang

    Full Text Available The yeast Saccharomyces cerevisiae was metabolically modified for enhanced biofuel precursor production by knocking out genes encoding mitochondrial isocitrate dehydrogenase and over-expression of a heterologous ATP-citrate lyase. A comparative iTRAQ-coupled 2D LC-MS/MS analysis was performed to obtain a global overview of ubiquitous protein expression changes in S. cerevisiae engineered strains. More than 300 proteins were identified. Among these proteins, 37 were found differentially expressed in engineered strains and they were classified into specific categories based on their enzyme functions. Most of the proteins involved in glycolytic and pyruvate branch-point pathways were found to be up-regulated and the proteins involved in respiration and glyoxylate pathway were however found to be down-regulated in engineered strains. Moreover, the metabolic modification of S. cerevisiae cells resulted in a number of up-regulated proteins involved in stress response and differentially expressed proteins involved in amino acid metabolism and protein biosynthesis pathways. These LC-MS/MS based proteomics analysis results not only offered extensive information in identifying potential protein-protein interactions, signal pathways and ubiquitous cellular changes elicited by the engineered pathways, but also provided a meaningful biological information platform serving further modification of yeast cells for enhanced biofuel production.

  1. L-Band Digital Aeronautical Communications System Engineering - Initial Safety and Security Risk Assessment and Mitigation

    Science.gov (United States)

    Zelkin, Natalie; Henriksen, Stephen

    2011-01-01

    This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.

  2. Anatomy of a Security Operations Center

    Science.gov (United States)

    Wang, John

    2010-01-01

    Many agencies and corporations are either contemplating or in the process of building a cyber Security Operations Center (SOC). Those Agencies that have established SOCs are most likely working on major revisions or enhancements to existing capabilities. As principle developers of the NASA SOC; this Presenters' goals are to provide the GFIRST community with examples of some of the key building blocks of an Agency scale cyber Security Operations Center. This presentation viII include the inputs and outputs, the facilities or shell, as well as the internal components and the processes necessary to maintain the SOC's subsistence - in other words, the anatomy of a SOC. Details to be presented include the SOC architecture and its key components: Tier 1 Call Center, data entry, and incident triage; Tier 2 monitoring, incident handling and tracking; Tier 3 computer forensics, malware analysis, and reverse engineering; Incident Management System; Threat Management System; SOC Portal; Log Aggregation and Security Incident Management (SIM) systems; flow monitoring; IDS; etc. Specific processes and methodologies discussed include Incident States and associated Work Elements; the Incident Management Workflow Process; Cyber Threat Risk Assessment methodology; and Incident Taxonomy. The Evolution of the Cyber Security Operations Center viII be discussed; starting from reactive, to proactive, and finally to proactive. Finally, the resources necessary to establish an Agency scale SOC as well as the lessons learned in the process of standing up a SOC viII be presented.

  3. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  4. Proceedings of the second biennial international conference on nascent technologies in engineering: souvenir

    International Nuclear Information System (INIS)

    2017-01-01

    This conference touches upon the different aspects of engineering and related technologies. The topics covered are: structural control, dynamics and health monitoring; manufacturing and management strategies; thermal engineering and fluid dynamics; power systems; electrical machines and drives; power electronics and energy conversion; signal processing; embedded system; communication engineering; networking/ analysis and design of algorithms; security and information and computer technologies. Papers relevant to INIS are indexed separately

  5. An assessment system for the system safety engineering capability maturity model in the case of spent fuel reprocessing

    International Nuclear Information System (INIS)

    Yang Xiaohua; Liu Zhenghai; Liu Zhiming; Wan Yaping; Bai Xiaofeng

    2012-01-01

    We can improve the processing, the evaluation of capability and promote the user's trust by using system security engineering capability maturity model (SSE-CMM). SSE-CMM is the common method for organizing and implementing safety engineering, and it is a mature method for system safety engineering. Combining capability maturity model (CMM) with total quality management and statistic theory, SSE-CMM turns systems security engineering into a well-defined, mature, measurable, advanced engineering discipline. Lack of domain knowledge, the size of data, the diversity of evidences, the cumbersomeness of processes, and the complexity of matching evidences with problems are the main issues that SSE-CMM assessment has to face. To improve effectively the efficiency of assessment of spent fuel reprocessing system security engineering capability maturity model (SFR-SSE-CMM), in this paper we de- signed an intelligent assessment software based on domain ontology and that uses methods such as ontology, evidence theory, semantic web, intelligent information retrieval and intelligent auto-matching techniques. This software includes four subsystems, which are domain ontology creation and management system, evidence auto collection system, and a problem and evidence matching system. The architecture of the software is divided into five layers: a data layer, an oncology layer, a knowledge layer, a service layer arid a presentation layer. (authors)

  6. Engineering research, development and technology

    International Nuclear Information System (INIS)

    1994-05-01

    The mission of the Engineering Research, Development, and Technology Program at Lawrence Livermore National Laboratory (LLNL) is to develop the technical staff, tools, and facilities needed to support current and future LLNL programs. The efforts are guided by a dual-benefit research and development strategy that supports Department of Energy missions, such as national security through nuclear deterrence and economic competitiveness through partnerships with U.S. industry. This annual report, organized by thrust area, describes the activities for the fiscal year 1993. The report provides timely summaries of objectives, methods, and results from nine thrust areas for this fiscal year: Computational Electronics and Electromagnetics; Computational Mechanics; Diagnostics and Microelectronics; Fabrication Technology; Materials Science and Engineering; Power Conversion Technologies; Nondestructive Evaluation; Remote Sensing, Imaging, and Signal Engineering; and Emerging Technologies. Separate abstracts were prepared for 47 papers in this report

  7. Nuclear material facilities - security systems and technology R and D trends

    International Nuclear Information System (INIS)

    Ellis, D.; Steele, B.

    2002-01-01

    Full text: In the US, physical security research and development (R and D) during the 1970s and 1980s created a body of technology and systems engineering that largely defined the industry for several decades. However, despite today's terrorists threats and risks, the overall funding of new and innovative physical security solutions is relatively very small. Such factors constraining physical security R and D include the expansion of overall security responsibilities, the emphasis on programmatic and business performance, in addition to evolving (mis)perceptions that 'the problem has been solved' or that 'anyone can do security'. Underlying these factors, the lack of robust standards and certifications has limited the development and application of physical security products, systems, and services. The research and development of new security technologies must be evaluated against very demanding constraints - including costs/benefits, emerging threats, and policies. Going forward, the goal will be to create a more comprehensive approach to physical security of nuclear material facilities that matches evolving threats and that will complement the transition to an integrated security/operations management environment. Such a management model evaluates the additional value of increasing security alternatives in addition to determining trade-offs between the programmatic mission and security issues. Correspondingly, more explicit and strategically useful measures must be developed to determine importance that, in turn, will influence security-related R and D efforts. The research and development of security technologies should be based upon identified needs and requirements resulting from a systematic analysis of the threat and other conditions. In particular, security technologies and systems must be evaluated in terms of current and long-term impacts. Such needs are (will be) diverse and will depend upon sustained research investments in a broad range of technologies

  8. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  9. The persuasion and security awareness experiment: reducing the success of social engineering attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    Objectives: The aim of the current study is to explore to what extent an intervention reduces the effects of social engineering (e.g. the obtaining of access by persuasion) in an office environment. In particular, we study the effect of authority during a `social engineering' attack. Methods: 31

  10. Designing proteins for therapeutic applications.

    Science.gov (United States)

    Lazar, Greg A; Marshall, Shannon A; Plecs, Joseph J; Mayo, Stephen L; Desjarlais, John R

    2003-08-01

    Protein design is becoming an increasingly useful tool for optimizing protein drugs and creating novel biotherapeutics. Recent progress includes the engineering of monoclonal antibodies, cytokines, enzymes and viral fusion inhibitors.

  11. Interactive Synthesis of Code Level Security Rules

    Science.gov (United States)

    2017-04-01

    Proceedings of the 9th ACM conference on Computer and communications security, pages 235–244. ACM, 2002. [19] J. Davis. Hacking of government computers...Inductive programming meets the real world. Communications of the ACM, 58(11):90–99, 2015. [24] S. Hallem, B. Chelf, Y. Xie, and D. Engler. A system and...Software Engineering, pages 462–473. ACM, 2015. [37] S. H. Muggleton, D. Lin, and A. Tamaddoni-Nezhad. Meta-interpretive learning of higher- order dyadic

  12. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    Public key infrastructure (PKI) technology is at a primitive stage characterized by deployment of PKIs that are engineered to support the provision of security services within individual enterprises, and are not able to support...

  13. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  14. Rationally designed synthetic protein hydrogels with predictable mechanical properties.

    Science.gov (United States)

    Wu, Junhua; Li, Pengfei; Dong, Chenling; Jiang, Heting; Bin Xue; Gao, Xiang; Qin, Meng; Wang, Wei; Bin Chen; Cao, Yi

    2018-02-12

    Designing synthetic protein hydrogels with tailored mechanical properties similar to naturally occurring tissues is an eternal pursuit in tissue engineering and stem cell and cancer research. However, it remains challenging to correlate the mechanical properties of protein hydrogels with the nanomechanics of individual building blocks. Here we use single-molecule force spectroscopy, protein engineering and theoretical modeling to prove that the mechanical properties of protein hydrogels are predictable based on the mechanical hierarchy of the cross-linkers and the load-bearing modules at the molecular level. These findings provide a framework for rationally designing protein hydrogels with independently tunable elasticity, extensibility, toughness and self-healing. Using this principle, we demonstrate the engineering of self-healable muscle-mimicking hydrogels that can significantly dissipate energy through protein unfolding. We expect that this principle can be generalized for the construction of protein hydrogels with customized mechanical properties for biomedical applications.

  15. Remote secure observing for the Faulkes Telescopes

    Science.gov (United States)

    Smith, Robert J.; Steele, Iain A.; Marchant, Jonathan M.; Fraser, Stephen N.; Mucke-Herzberg, Dorothea

    2004-09-01

    Since the Faulkes Telescopes are to be used by a wide variety of audiences, both powerful engineering level and simple graphical interfaces exist giving complete remote and robotic control of the telescope over the internet. Security is extremely important to protect the health of both humans and equipment. Data integrity must also be carefully guarded for images being delivered directly into the classroom. The adopted network architecture is described along with the variety of security and intrusion detection software. We use a combination of SSL, proxies, IPSec, and both Linux iptables and Cisco IOS firewalls to ensure only authenticated and safe commands are sent to the telescopes. With an eye to a possible future global network of robotic telescopes, the system implemented is capable of scaling linearly to any moderate (of order ten) number of telescopes.

  16. Development and validation of A quasi-dimensional model for (M)Ethanol-Fuelled SI engines

    OpenAIRE

    Vancoillie, Jeroen; Verhelst, Sebastian; Sileghem, Louis; Demuynck, Joachim; Galle, Jonas

    2012-01-01

    RESEARCH OBJECTIVE - The use of methanol and ethanol in spark-ignition engines forms an interesting approach to decarbonizing transport and securing domestic energy supply. Experimental work has produced promising results, however, the full potential of light alcohols in modern engine technology remains to be explored. Today, this can be addressed at low cost using system simulations of the whole engine, provided that the employed models account for the effect of the fuel on engine operation....

  17. Molecular, cellular, and tissue engineering

    CERN Document Server

    Bronzino, Joseph D

    2015-01-01

    Known as the bible of biomedical engineering, The Biomedical Engineering Handbook, Fourth Edition, sets the standard against which all other references of this nature are measured. As such, it has served as a major resource for both skilled professionals and novices to biomedical engineering. Molecular, Cellular, and Tissue Engineering, the fourth volume of the handbook, presents material from respected scientists with diverse backgrounds in molecular biology, transport phenomena, physiological modeling, tissue engineering, stem cells, drug delivery systems, artificial organs, and personalized medicine. More than three dozen specific topics are examined, including DNA vaccines, biomimetic systems, cardiovascular dynamics, biomaterial scaffolds, cell mechanobiology, synthetic biomaterials, pluripotent stem cells, hematopoietic stem cells, mesenchymal stem cells, nanobiomaterials for tissue engineering, biomedical imaging of engineered tissues, gene therapy, noninvasive targeted protein and peptide drug deliver...

  18. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  19. A Secured Cognitive Agent based Multi-strategic Intelligent Search System

    Directory of Open Access Journals (Sweden)

    Neha Gulati

    2018-04-01

    Full Text Available Search Engine (SE is the most preferred information retrieval tool ubiquitously used. In spite of vast scale involvement of users in SE’s, their limited capabilities to understand the user/searcher context and emotions places high cognitive, perceptual and learning load on the user to maintain the search momentum. In this regard, the present work discusses a Cognitive Agent (CA based approach to support the user in Web-based search process. The work suggests a framework called Secured Cognitive Agent based Multi-strategic Intelligent Search System (CAbMsISS to assist the user in search process. It helps to reduce the contextual and emotional mismatch between the SE’s and user. After implementation of the proposed framework, performance analysis shows that CAbMsISS framework improves Query Retrieval Time (QRT and effectiveness for retrieving relevant results as compared to Present Search Engine (PSE. Supplementary to this, it also provides search suggestions when user accesses a resource previously tagged with negative emotions. Overall, the goal of the system is to enhance the search experience for keeping the user motivated. The framework provides suggestions through the search log that tracks the queries searched, resources accessed and emotions experienced during the search. The implemented framework also considers user security. Keywords: BDI model, Cognitive Agent, Emotion, Information retrieval, Intelligent search, Search Engine

  20. Structural and biophysical characterization of an epitope-specific engineered Fab fragment and complexation with membrane proteins: implications for co-crystallization.

    Science.gov (United States)

    Johnson, Jennifer L; Entzminger, Kevin C; Hyun, Jeongmin; Kalyoncu, Sibel; Heaner, David P; Morales, Ivan A; Sheppard, Aly; Gumbart, James C; Maynard, Jennifer A; Lieberman, Raquel L

    2015-04-01

    Crystallization chaperones are attracting increasing interest as a route to crystal growth and structure elucidation of difficult targets such as membrane proteins. While strategies to date have typically employed protein-specific chaperones, a peptide-specific chaperone to crystallize multiple cognate peptide epitope-containing client proteins is envisioned. This would eliminate the target-specific chaperone-production step and streamline the co-crystallization process. Previously, protein engineering and directed evolution were used to generate a single-chain variable (scFv) antibody fragment with affinity for the peptide sequence EYMPME (scFv/EE). This report details the conversion of scFv/EE to an anti-EE Fab format (Fab/EE) followed by its biophysical characterization. The addition of constant chains increased the overall stability and had a negligible impact on the antigen affinity. The 2.0 Å resolution crystal structure of Fab/EE reveals contacts with larger surface areas than those of scFv/EE. Surface plasmon resonance, an enzyme-linked immunosorbent assay, and size-exclusion chromatography were used to assess Fab/EE binding to EE-tagged soluble and membrane test proteins: namely, the β-barrel outer membrane protein intimin and α-helical A2a G protein-coupled receptor (A2aR). Molecular-dynamics simulation of the intimin constructs with and without Fab/EE provides insight into the energetic complexities of the co-crystallization approach.

  1. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    Science.gov (United States)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  2. Areva attracted to Slovakia by engineers

    International Nuclear Information System (INIS)

    Slovak, K.

    2006-01-01

    The expected growth of demand in nuclear power stations and technologies compelled the French-German company Areva NP to look for other possibilities for expansion. The company belongs to the French energy concern, Areva, which employs almost sixty thousand people worldwide and which last year achieved revenues of ten billion EUR. A joint venture between the French company and the German company Siemens - Areva NP - designs and manufactures software and hardware for security and automation technologies in nuclear power stations. Areva NP Controls, a subsidiary of the company, has been operating in Bratislava from 1 July. The plan is that Slovak engineers will design hardware and software to be used in nuclear power station security systems around the world. The decision to open an engineering office in Bratislava was made after the management at the German head office realised the need for three hundred new engineers. T his many quality people are not available in Germany right now , said Franz Hilbert, the boss of the Slovak subsidiary. The company decided between the Czech Republic, Russia and India. In the end, Bratislava was chosen. F. Hilbert added that Slovakia has many quality people, but that lower labour costs also played a role in the decision-making process. The company plans to employ half of the required three hundred engineers in Bratislava and the remainder in Erlangen. About a dozen engineers are currently working in this Slovak company, some of whom are currently borrowed from partners. The view is that within five years about one hundred engineers will work in Slovakia under domestic management. According to F. Hilbert, the meeting of the Slovak and German cultures is trouble free, even though some differences can still be seen. 'We are better in planning and in fulfilling those plans, while the Slovaks are great at improvising. We are able to complement and learn from each other', said F. Hilbert. (authors)

  3. Improving the success and impact of the metabolic engineering design, build, test, learn cycle by addressing proteins of unknown function.

    Science.gov (United States)

    Jarboe, Laura R

    2018-01-04

    Rational, predictive metabolic engineering of organisms requires an ability to associate biological activity to the corresponding gene(s). Despite extensive advances in the 20 years since the Escherichia coli genome was published, there are still gaps in our knowledge of protein function. The substantial amount of data that has been published, such as: omics-level characterization in a myriad of conditions; genome-scale libraries; and evolution and genome sequencing, provide means of identifying and prioritizing proteins for characterization. This review describes the scale of this knowledge gap, demonstrates the benefit of addressing the knowledge gap, and demonstrates the availability of interesting candidates for characterization. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Engineered phages for electronics.

    Science.gov (United States)

    Cui, Yue

    2016-11-15

    Phages are traditionally widely studied in biology and chemistry. In recent years, engineered phages have attracted significant attentions for functionalization or construction of electronic devices, due to their specific binding, catalytic, nucleating or electronic properties. To apply the engineered phages in electronics, these are a number of interesting questions: how to engineer phages for electronics? How are the engineered phages characterized? How to assemble materials with engineered phages? How are the engineered phages micro or nanopatterned? What are the strategies to construct electronics devices with engineered phages? This review will highlight the early attempts to address these questions and explore the fundamental and practical aspects of engineered phages in electronics, including the approaches for selection or expression of specific peptides on phage coat proteins, characterization of engineered phages in electronics, assembly of electronic materials, patterning of engineered phages, and construction of electronic devices. It provides the methodologies and opens up ex-cit-ing op-por-tu-ni-ties for the development of a variety of new electronic materials and devices based on engineered phages for future applications. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

    Directory of Open Access Journals (Sweden)

    Jinsoo Shin

    2017-04-01

    Full Text Available Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

  6. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  7. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  8. Complex Adaptive Systems of Systems (CASOS) engineering environment.

    Energy Technology Data Exchange (ETDEWEB)

    Detry, Richard Joseph; Linebarger, John Michael; Finley, Patrick D.; Maffitt, S. Louise; Glass, Robert John, Jr.; Beyeler, Walter Eugene; Ames, Arlo Leroy

    2012-02-01

    Complex Adaptive Systems of Systems, or CASoS, are vastly complex physical-socio-technical systems which we must understand to design a secure future for the nation. The Phoenix initiative implements CASoS Engineering principles combining the bottom up Complex Systems and Complex Adaptive Systems view with the top down Systems Engineering and System-of-Systems view. CASoS Engineering theory and practice must be conducted together to develop a discipline that is grounded in reality, extends our understanding of how CASoS behave and allows us to better control the outcomes. The pull of applications (real world problems) is critical to this effort, as is the articulation of a CASoS Engineering Framework that grounds an engineering approach in the theory of complex adaptive systems of systems. Successful application of the CASoS Engineering Framework requires modeling, simulation and analysis (MS and A) capabilities and the cultivation of a CASoS Engineering Community of Practice through knowledge sharing and facilitation. The CASoS Engineering Environment, itself a complex adaptive system of systems, constitutes the two platforms that provide these capabilities.

  9. Integrated cell and process engineering for improved transient production of a "difficult-to-express" fusion protein by CHO cells.

    Science.gov (United States)

    Johari, Yusuf B; Estes, Scott D; Alves, Christina S; Sinacore, Marty S; James, David C

    2015-12-01

    Based on an optimized electroporation protocol, we designed a rapid, milliliter-scale diagnostic transient production assay to identify limitations in the ability of Chinese hamster ovary (CHO) cells to produce a model "difficult-to-express" homodimeric Fc-fusion protein, Sp35Fc, that exhibited very low volumetric titer and intracellular formation of disulfide-bonded oligomeric aggregates post-transfection. As expression of Sp35Fc induced an unfolded protein response in transfected host cells, we utilized the transient assay to compare, in parallel, multiple functionally diverse strategies to engineer intracellular processing of Sp35Fc in order to increase production and reduce aggregation as two discrete design objectives. Specifically, we compared the effect of (i) co-expression of ER-resident molecular chaperones (BiP, PDI, CypB) or active forms of UPR transactivators (ATF6c, XBP1s) at varying recombinant gene load, (ii) addition of small molecules known to act as chemical chaperones (PBA, DMSO, glycerol, betaine, TMAO) or modulate UPR signaling (PERK inhibitor GSK2606414) at varying concentration, (iii) a reduction in culture temperature to 32°C. Using this information, we designed a biphasic, Sp35Fc-specific transient manufacturing process mediated by lipofection that utilized CypB co-expression at an optimal Sp35Fc:CypB gene ratio of 5:1 to initially maximize transfected cell proliferation, followed by addition of a combination of PBA (0.5 mM) and glycerol (1% v/v) at the onset of stationary phase to maximize cell specific production and eliminate Sp35Fc aggregation. Using this optimal, engineered process transient Sp35Fc production was significantly increased sixfold over a 12 day production process with no evidence of disulfide-bonded aggregates. Finally, transient production in clonally derived sub-populations (derived from parental CHO host) screened for a heritably improved capability to produce Sp35Fc was also significantly improved by the optimized

  10. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  11. Enhanced Massive Visualization of Engines Performance

    International Nuclear Information System (INIS)

    Rostand, N D; Eglantine, H; Jerôme, L

    2012-01-01

    Today, we are witnessing an increasing complexity of transport in order to deal with requirements of safety, security, reliability and efficiency. Such transport is generally equipped with drive systems; it is nevertheless for engine manufacturers to overcome the performance requirements of energy efficiency throughout their operations. To this end, this article proposes a performance monitoring solution for a large fleet of engines in operation. It uses a pre-calibrated physical model developed by the engine manufacturer regarding the performance objectives as reference. The physical model is firstly decomposed into critical performance modules, and is secondly updated on current observations extracted at specific predefined operating conditions in order to derive residual errors status of each engine tested. Through a process of standardization of those contextual differences remaining, the solution offers a synthesis mapping to visualize the evolution of performance of each engine throughout its operations. This article describes the theoretical methodology of implementation mainly based on universal mathematical foundations, and vindicates the interests of its industrialization in the light of the proactive findings.

  12. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  13. Development and Evaluation of Secure Socket Layer Visualization Tool with Packet Capturing Function

    Directory of Open Access Journals (Sweden)

    Arai Masayuki

    2015-01-01

    Full Text Available Secure Socket Layer (SSL has become a fundamental technology that secures browser-processed personal details sent to the server. As a result, communication and computer engineers are advised to learn the protocol. However, understanding SSL is very difficult because of its intricate communication procedure. To solve this problem, we developed a visualization tool for understanding SSL. This paper describes the design, implementation methods, and evaluation of the tool. The evaluation results show that the visualization tool is effective for learning SSL.

  14. A Comparison of the mechanical engineering and safety engineering student’s ICT attitudes at the Obuda University

    Directory of Open Access Journals (Sweden)

    Kiss Gabor

    2016-01-01

    Full Text Available Communication and technology are critical to education. However, using technology in education is not an easy task as communication barriers emerge. The aim of this research is to analyze the ICT attitudes from different faculties at the Obuda University that is between the mechanical engineering students and safety engineering students from the Donát Bánki Mechanical Safety Engineer Faculty. The students from these two groups will use different ICT tool at work after their graduation; the mechanical engineering students will work mostly with designer ICT tools, the safety engineering students will use security systems. It would be important to know whether instructors, when using ICT, have to follow different teaching methods and approaches in these two different groups or not. We measured the ICT attitude with a tool consisting of 23 items (Likert scaled. We worked with 361 students. The data analysis was performed with SPSS software using descriptive statistics and Mann-Whitney test. The results show both groups having the same positive ICT attitude however with one difference.

  15. Engineering and Characterization of a Superfolder Green Fluorescent Protein

    International Nuclear Information System (INIS)

    Pedelacq, J.; Cabantous, S.; Tran, T.; Terwilliger, T.; Waldo, G.

    2006-01-01

    Existing variants of green fluorescent protein (GFP) often misfold when expressed as fusions with other proteins. We have generated a robustly folded version of GFP, called 'superfolder' GFP, that folds well even when fused to poorly folded polypeptides. Compared to 'folding reporter' GFP, a folding-enhanced GFP containing the 'cycle-3' mutations and the 'enhanced GFP' mutations F64L and S65T, superfolder GFP shows improved tolerance of circular permutation, greater resistance to chemical denaturants and improved folding kinetics. The fluorescence of Escherichia coli cells expressing each of eighteen proteins from Pyrobaculum aerophilum as fusions with superfolder GFP was proportional to total protein expression. In contrast, fluorescence of folding reporter GFP fusion proteins was strongly correlated with the productive folding yield of the passenger protein. X-ray crystallographic structural analyses helped explain the enhanced folding of superfolder GFP relative to folding reporter GFP

  16. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  17. Aminotryptophan-containing barstar: structure--function tradeoff in protein design and engineering with an expanded genetic code.

    Science.gov (United States)

    Rubini, Marina; Lepthien, Sandra; Golbik, Ralph; Budisa, Nediljko

    2006-07-01

    The indole ring of the canonical amino acid tryptophan (Trp) possesses distinguished features, such as sterical bulk, hydrophobicity and the nitrogen atom which is capable of acting as a hydrogen bond donor. The introduction of an amino group into the indole moiety of Trp yields the structural analogs 4-aminotryptophan ((4-NH(2))Trp) and 5-aminotryptophan ((5-NH(2))Trp). Their hydrophobicity and spectral properties are substantially different when compared to those of Trp. They resemble the purine bases of DNA and share their capacity for pH-sensitive intramolecular charge transfer. The Trp --> aminotryptophan substitution in proteins during ribosomal translation is expected to result in related protein variants that acquire these features. These expectations have been fulfilled by incorporating (4-NH(2))Trp and (5-NH(2))Trp into barstar, an intracellular inhibitor of the ribonuclease barnase from Bacillus amyloliquefaciens. The crystal structure of (4-NH(2))Trp-barstar is similar to that of the parent protein, whereas its spectral and thermodynamic behavior is found to be remarkably different. The T(m) value of (4-NH(2))Trp- and (5-NH(2))Trp-barstar is lowered by about 20 degrees Celsius, and they exhibit a strongly reduced unfolding cooperativity and substantial loss of free energy in folding. Furthermore, folding kinetic study of (4-NH(2))Trp-barstar revealed that the denatured state is even preferred over native one. The combination of structural and thermodynamic analyses clearly shows how structures of substituted barstar display a typical structure-function tradeoff: the acquirement of unique pH-sensitive charge transfer as a novel function is achieved at the expense of protein stability. These findings provide a new insight into the evolution of the amino acid repertoire of the universal genetic code and highlight possible problems regarding protein engineering and design by using an expanded genetic code.

  18. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  19. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  20. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...