ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Publication Date: 2014-03-13
    Description: Natural transformation (NT) in bacteria is a complex process, including binding, uptake, transport and recombination of exogenous DNA into the chromosome, consequently generating genetic diversity and driving evolution. DNA processing protein A (DprA), which is distributed among virtually all bacterial species, is involved in binding to the internalized single-stranded DNA (ssDNA) and promoting the loading of RecA on ssDNA during NTs. Here we present the structures of DNA_processg_A (DprA) domain of the Helicobacter pylori DprA (HpDprA) and its complex with an ssDNA at 2.20 and 1.80 Å resolutions, respectively. The complex structure revealed for the first time how the conserved DprA domain binds to ssDNA. Based on structural comparisons and binding assays, a unique ssDNA-binding mode is proposed: the dimer of HpDprA binds to ssDNA through two small, positively charged binding pockets of the DprA domains with classical Rossmann folds and the key residue Arg52 is re-oriented to ‘open’ the pocket in order to accommodate one of the bases of ssDNA, thus enabling HpDprA to grasp substrate with high affinity. This mode is consistent with the oligomeric composition of the complex as shown by electrophoretic mobility-shift assays and static light scattering measurements, but differs from the direct polymeric complex of Streptococcus pneumoniae DprA–ssDNA.
    Print ISSN: 0305-1048
    Electronic ISSN: 1362-4962
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2013-09-18
    Description: This paper is concerned with the issue of passivity analysis for switched generalized neural networks (SGNNs). Parametric uncertainty is considered and assumed to be time-variant and norm bounded. We first give the passivity condition for SGNNs without uncertainties, and then extend the result to the cases with time-varying parametric uncertainties both in network parameters and output matrices. By using the Lyapunov–Krasovskii functional and some analysis techniques, the passivity criteria are presented in terms of linear matrix inequalities. Two numerical examples are given to show the effectiveness of the theoretical results.
    Print ISSN: 0265-0754
    Electronic ISSN: 1471-6887
    Topics: Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2013-01-17
    Description: The antipredatory responses/attachment behaviour of the green-lipped mussel Perna viridi s were studied under combined stresses of hypoxia and low salinity in the presence/absence of its predator, the swimming crab Thalamita danae . There were two oxygen concentrations (1.5 mg l –1 O 2 = hypoxic and 6.0 mg l –1 O 2 = normoxic) and two salinity levels (15 = low, 30 = normal). Byssus production performances (including byssal-thread number, byssal-thread diameter, byssal-thread length, cumulative byssal-thread length and volume and frequency of stalk-shedding) were evaluated after 48 h. All variables were significantly affected by dissolved oxygen (DO), salinity and predator presence. Interactive effects of these three factors on byssus production were also observed. Byssus production and frequency of stalk-shedding were lowest in hypoxia x low salinity, followed by normoxia x low salinity, hypoxia x normal salinity, while normoxia x normal salinity exhibited the highest values in both predator-presence and non-predator-presence groups. At each treatment of DO and salinity, all parameters in predator-presence groups were significantly higher than in non-predator-presence groups. Our results indicate that the environmental hypoxia and low salinity impair anti-predatory/attachment behaviour and show some synergistic effects. Since reduced byssus production makes the mussels more vulnerable to crab predators, the co-occurrence of hypoxia and low salinity may increase the rates of crab predation on P. viridi s in the field.
    Print ISSN: 0260-1230
    Electronic ISSN: 1464-3766
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2013-02-02
    Description: Doubly hidden Markov models (DHMMs) have been widely used to analyze a type of time process whose driving factors are hierarchical and hierarchically correlated. A common issue of these models is that they implicitly assume that the dwell time of any system state is constant or exponentially distributed. This property comes from the standard hidden Markov models and causes the DHMM to limitations in some actual application environment, where an application has latent temporal structure and does not follow the exponential distribution but has the period-like or variable-period feature. Such problems are frequently encountered in practice, e.g. network traffic. In this paper, we remove this limitation by a new structural discrete approach named nested hidden semi-Markov model. The proposed model includes a nested latent semi-Markov chain and one observable discrete stochastic process. The bottom latent semi-Markov chain is the core layer and controls the second-layer semi-Markov chain that generates the observable process. The state duration of both the semi-Markov chains can be variable or explicit. The model makes no assumptions on the distribution of the state-duration and the observable processes. An efficient forward and backward recursion procedure is developed for estimating the generator of the proposed model and inferring the underlying state processes for a given observation sequence. To evaluate the performance of the proposed model, we apply the model to the arrival process of network traffic and compare its simulation traffic and the real traffic. The performance evaluation in the experiments includes time dynamic process, auto-correlation, cross-correlation, statistical distribution and self-similarity.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2011-11-24
    Description: Cloud security is a major concern that may delay its widespread adoption. User access control (UAC) is the core component of security in cloud computing environment, aiming to ensure that stored data are allowed to be accessed only by authenticated/authorized users. As a typical behavioural biometrics, keystroke dynamics provides a promising UAC solution. The most challenging issue that hinders the wide deployment of keystroke is the high verification error rate. Gunetti et al. proposed a classical n -graph-based keystroke verification method (GP method), which can achieve a low False Acceptance Rate (FAR). However, the GP method suffers from a high False Rejection Rate (FRR) and a severe scalability issue. Thus, GP is not a feasible solution for computing cloud application where scalability is a big issue. In this paper, two keystroke verification approaches ( n Gdv-V and n Gdv-C) are proposed to overcome GP's shortcomings. To reduce high FRR, we designed a new correlation measure using n -graph equivalent feature ( n Gdv) that enables more accurate recognition for genuine users. Moreover, correlation-based hierarchical clustering is proposed to address the scalability issue. The experimental results show that the n Gdv-C can produce much lower FRR while achieving almost the same level of FAR as that of the GP method. Furthermore, 1250 times (when using n Gdv-V) and three times (when using n Gdv-C(17,4)) authentication speed gains have been achieved.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2013-12-12
    Description: In this paper, we first establish some new lower bounds for the first eigenvalue of the f -Laplacian on closed Riemannian manifolds with the N -Bakry–Émery Ricci curvature satisfying Ric N f ≥ K ( K R), which not only improve the classical results of lower bounds for the first eigenvalue of the Laplacian, but also are suitable for both smooth metric spaces and quasi-Einstein manifolds. Then we obtain the corresponding lower bounds for closed manifolds with Ric f ≥ K ( K R), which include gradient Ricci solitons. As an application, we derive a universal lower bound for the diameter of compact non-trivial shrinking Ricci solitons, which improves the results of Andrews–Ni [1] and Futaki–Sano [9].
    Print ISSN: 0033-5606
    Electronic ISSN: 1464-3847
    Topics: Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Publication Date: 2014-02-28
    Description: The nucleotide excision repair pathway removes ultraviolet (UV) photoproducts from the human genome in the form of short oligonucleotides ~30 nt in length. Because there are limitations to many of the currently available methods for investigating UV photoproduct repair in vivo , we developed a convenient non-radioisotopic method to directly detect DNA excision repair events in human cells. The approach involves extraction of oligonucleotides from UV-irradiated cells, DNA end-labeling with biotin and streptavidin-mediated chemiluminescent detection of the excised UV photoproduct-containing oligonucleotides that are released from the genome during excision repair. Our novel approach is robust, with essentially no signal in the absence of UV or a functional excision repair system. Furthermore, our non-radioisotopic methodology allows for the sensitive detection of excision products within minutes following UV irradiation and does not require additional enrichment steps such as immunoprecipitation. Finally, this technique allows for quantitative measurements of excision repair in human cells. We suggest that the new techniques presented here will be a useful and powerful approach for studying the mechanism of human nucleotide excision repair in vivo .
    Keywords: Repair
    Print ISSN: 0305-1048
    Electronic ISSN: 1362-4962
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Publication Date: 2014-12-17
    Description: Numerous eukaryotic genes are alternatively spliced. Recently, deep transcriptome sequencing has skyrocketed proportion of alternatively spliced genes; over 95% human multi-exon genes are alternatively spliced. One fundamental question is: are all these alternative splicing (AS) events functional? To look into this issue, we studied the most common form of alternative 5' splice sites—GYNNGYs (Y = C/T), where both GYs can function as splice sites. Global analyses suggest that splicing noise (due to stochasticity of splicing process) can cause AS at GYNNGYs, evidenced by higher AS frequency in non-coding than in coding regions, in non-conserved than in conserved genes and in lowly expressed than in highly expressed genes. However, ~20% AS GYNNGYs in humans and ~3% in mice exhibit tissue-dependent regulation. Consistent with being functional, regulated GYNNGYs are more conserved than unregulated ones. And regulated GYNNGYs have distinctive sequence features which may confer regulation. Particularly, each regulated GYNNGY comprises two splice sites more resembling each other than unregulated GYNNGYs, and has more conserved downstream flanking intron. Intriguingly, most regulated GYNNGYs may tune gene expression through coupling with nonsense-mediated mRNA decay, rather than encode different proteins. In summary, AS at GYNNGY 5' splice sites is primarily splicing noise, and secondarily a way of regulation.
    Print ISSN: 0305-1048
    Electronic ISSN: 1362-4962
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Publication Date: 2013-11-27
    Description: In female mammals most X-linked genes are subject to X-inactivation. However, in humans some X-linked genes escape silencing, these escapees being candidates for the phenotypic aberrations seen in polyX karyotypes. These escape genes have been reported to be under stronger purifying selection than other X-linked genes. Although it is known that escape from X-inactivation is much more common in humans than in mice, systematic assays of escape in humans have to date employed only interspecies somatic cell hybrids. Here we provide the first systematic next-generation sequencing analysis of escape in a human cell line. We analyzed RNA and genotype sequencing data obtained from B lymphocyte cell lines derived from Europeans (CEU) and Yorubans (YRI). By replicated detection of heterozygosis in the transcriptome, we identified 114 escaping genes, including 76 not previously known to be escapees. The newly described escape genes cluster on the X chromosome in the same chromosomal regions as the previously known escapees. There is an excess of escaping genes associated with mental retardation, consistent with this being a common phenotype of polyX phenotypes. We find both differences between populations and between individuals in the propensity to escape. Indeed, we provide the first evidence for there being both hyper- and hypo-escapee females in the human population, consistent with the highly variable phenotypic presentation of polyX karyotypes. Considering also prior data, we reclassify genes as being always, never, and sometimes escape genes. We fail to replicate the prior claim that genes that escape X-inactivation are under stronger purifying selection than others.
    Print ISSN: 0737-4038
    Electronic ISSN: 1537-1719
    Topics: Biology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Publication Date: 2013-08-22
    Description: We present measurements of the number density of voids in the dark matter distribution from a series of N -body simulations of a cold dark matter cosmology. We define voids as spherical regions of v  = 0.2 m around density minima in order to relate our results to the predicted abundances using the excursion set formalism. Using a linear underdensity of v  = –2.7, from a spherical evolution model, we find that a volume-conserving model, which does not conserve number density in the mapping from the linear to non-linear regime, matches the measured abundance to within 16 per cent for a range of void radii 1 〈 r ( h –1 Mpc) 〈 15. This model fixes the volume fraction of the universe which is in voids and assumes that voids of a similar size merge as they expand by a factor of 1.7 to achieve a non-linear density of v  = 0.2 m today. We find that the model of Sheth and van de Weygaert for the number density of voids greatly overpredicts the abundances over the same range of scales. We find that the volume-conserving model works well at matching the number density of voids measured from the simulations at higher redshifts, z  = 0.5 and 1, as well as correctly predicting the abundances to within 25 per cent in a simulation of a matter dominated m  = 1 universe. We examine the abundance of voids in the halo distribution and find fewer small, r  〈 10 h –1 Mpc, voids and many more large, r  〉 10 h –1 Mpc, voids compared to the dark matter. These results indicate that voids identified in the halo or galaxy distribution are related to the underlying void distribution in the dark matter in a complicated way which merits further study if voids are to be used as a precision probe of cosmology.
    Print ISSN: 0035-8711
    Electronic ISSN: 1365-2966
    Topics: Physics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...