• Title/Summary/Keyword: key dependent

Search Result 1,085, Processing Time 0.026 seconds

Expression and characterization of RNA-dependent RNA polymerase of Ectropis obliqua virus

  • Lin, Meijuan;Ye, Shan;Xiong, Yi;Cai, Dawei;Zhang, Jiamin;Hu, Yuanyang
    • BMB Reports
    • /
    • v.43 no.4
    • /
    • pp.284-290
    • /
    • 2010
  • Replication of positive-strand RNA virus is mediated by a virus-encoded RNA-dependent RNA polymerase (RdRp). To study the replication of Ectropis obliqua virus (EoV), a newly identified insect virus belonging to the family Iflaviradae, we expressed the RNA polymerase domain in Escherichia coli and purified it on a Ni-chelating HisTrap affinity column. It is demonstrated that EoV RdRp initiated RNA synthesis in a primer and poly (A)-dependent manner in vitro. Furthermore, the effect of primer concentration, temperature, metal ions ($Mg^{2+}$, $Mn^{2+}$, and $K^+$) on enzymatic activity were determined. Our study represented a first step towards understanding the mechanism of EoV replication.

Analysis and Characterization of Glutathione Peroxidases in an Environmental Microbiome and Isolated Bacterial Microorganisms

  • Yun-Juan Bao;Qi Zhou;Xuejing Yu;Xiaolan Yu;Francis J. Castellino
    • Journal of Microbiology and Biotechnology
    • /
    • v.33 no.3
    • /
    • pp.299-309
    • /
    • 2023
  • Glutathione peroxidases (Gpx) are a group of antioxidant enzymes that protect cells or tissues against damage from reactive oxygen species (ROS). The Gpx proteins identified in mammals exhibit high catalytic activity toward glutathione (GSH). In contrast, a variety of non-mammalian Gpx proteins from diverse organisms, including fungi, plants, insects, and rodent parasites, show specificity for thioredoxin (TRX) rather than GSH and are designated as TRX-dependent peroxiredoxins. However, the study of the properties of Gpx in the environmental microbiome or isolated bacteria is limited. In this study, we analyzed the Gpx sequences, identified the characteristics of sequences and structures, and found that the environmental microbiome Gpx proteins should be classified as TRX-dependent, Gpx-like peroxiredoxins. This classification is based on the following three items of evidence: i) the conservation of the peroxidatic Cys residue; ii) the existence and conservation of the resolving Cys residue that forms the disulfide bond with the peroxidatic cysteine; and iii) the absence of dimeric and tetrameric interface domains. The conservation/divergence pattern of all known bacterial Gpx-like proteins in public databases shows that they share common characteristics with that from the environmental microbiome and are also TRX-dependent. Moreover, phylogenetic analysis shows that the bacterial Gpx-like proteins exhibit a star-like radiating phylogenetic structure forming a highly diverse genetic pool of TRX-dependent, Gpx-like peroxidases.

Expression and Characterization of RNA-dependent RNA Polymerase of Dendrolimus punctatus Tetravirus

  • Zhou, Liang;Zhang, Jiamin;Wang, Xiaochun;Jiang, Hong;Yi, Fuming;Hu, Yuanyang
    • BMB Reports
    • /
    • v.39 no.5
    • /
    • pp.571-577
    • /
    • 2006
  • Dendrolimus punctatus tetravirus (DpTV) has been identified as a new member of the genus Omegatetravirus of the family Tetraviridae that may be related serologically to Nudaurelia capensis virus ($N{\omega}V$). To establish the function of DpTV RNA genome and to better understand the mechanism of viral replication, the putative RNA-dependent RNA polymerase (RdRp) domain has been cloned and expressed in Escherichia coli. The recombinant protein was purified on a Ni-chelating HisTrap affinity column and demonstrated to initiate viral RNA synthesis in a primer-independent manner but not by terminal nucleotidyle transferase activity in the presence of $Mg^{2+}$ and RNA template. Mutation of the GDD to GAA interferes with the residues at the polymerase active site and metal ions, and thus renders the polymerase inactive.

Luteolin Inhibits Proliferation Induced by IGF-1 Pathway Dependent ERα in Human Breast Cancer MCF-7 Cells

  • Wang, Li-Meng;Xie, Kun-Peng;Huo, Hong-Nan;Shang, Fei;Zou, Wei;Xie, Ming-Jie
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.4
    • /
    • pp.1431-1437
    • /
    • 2012
  • The growth of many breast tumors is stimulated by IGF-1, which activates signal transduction pathways inducing cell proliferation. $ER{\alpha}$ is important in this process. The aim of the study was to investigate relationships in vitro among inhibitory effects of luteolin on the growth of MCF-7 cells, IGF-1 pathway and $ER{\alpha}$. Our results showed that luteolin could effectively block IGF-l-stimulated MCF-7 cell proliferation in a dose- and time-dependent manner and block cell cycle progression and induce apoptosis evidenced by the flow cytometric detection of sub-G1DNA content. Luteolin markedly decreased IGF-l-dependent IGF-IR and Akt phosphorylation without affecting Erk1/2 phosphorylation. Further experiments pointed out that $ER{\alpha}$ was directly involved in IGF-l induced cell growth inhibitory effects of luteolin, which significantly decreased $ER{\alpha}$ expression. Knockdown of $ER{\alpha}$ in MCF-7 cells by an $ER{\alpha}$-specific siRNA decreased the IGF-l induced cell growth inhibitory effects of luteolin. $ER{\alpha}$ is thus a possible target of luteolin. These findings indicate that the inhibitory effect of luteolin on the growth of MCF-7 cells is via inhibiting IGF-l mediated PI3K-Akt pathway dependent of $ER{\alpha}$ expression.

Related-Key Differential Attacks on CHESS-64

  • Luo, Wei;Guo, Jiansheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3266-3285
    • /
    • 2014
  • With limited computing and storage resources, many network applications of encryption algorithms require low power devices and fast computing components. CHESS-64 is designed by employing simple key scheduling and Data-Dependent operations (DDO) as main cryptographic components. Hardware performance for Field Programmable Gate Arrays (FPGA) and for Application Specific Integrated Circuits (ASIC) proves that CHESS-64 is a very flexible and powerful new cipher. In this paper, the security of CHESS-64 block cipher under related-key differential cryptanalysis is studied. Based on the differential properties of DDOs, we construct two types of related-key differential characteristics with one-bit difference in the master key. To recover 74 bits key, two key recovery algorithms are proposed based on the two types of related-key differential characteristics, and the corresponding data complexity is about $2^{42.9}$ chosen-plaintexts, computing complexity is about $2^{42.9}$ CHESS-64 encryptions, storage complexity is about $2^{26.6}$ bits of storage resources. To break the cipher, an exhaustive attack is implemented to recover the rest 54 bits key. These works demonstrate an effective and general way to attack DDO-based ciphers.

A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks

  • Raazi, Syed Muhammad Khaliq-Ur-Rahman;Lee, Sung-Young
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.1
    • /
    • pp.23-51
    • /
    • 2010
  • Wireless Sensor Networks (WSN) have proved to be useful in applications that involve monitoring of real-time data. There is a wide variety of monitoring applications that can employ Wireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend upon the application, for which it is employed. Security requirements in WSN vary according to the application dependent network characteristics and the characteristics of an application itself. Key management is the most important aspect of security as some other security modules depend on it. We discuss application dependent variations in WSN, corresponding changes in the security requirements of WSN and the applicability of existing key management solutions in each scenario.

A Study of Location-based Key Management Using a Grid for Wireless Sensor Networks (무선 센서 네트워크에서 그리드 정보를 활용한 위치 기반 키 관리 연구)

  • Choi, Jaewoo;Kim, Yonghyun;Kim, JuYoub;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.759-766
    • /
    • 2015
  • This paper proposes a location-based key management scheme in wireless sensor networks, and among the existing location-based key management techniques, we focused on the LDK (Location Dependent Key management). In order to improve the problems occurred by communication interference, we introduced the key revision process and the method of key establishment using grid information. According to the simulation of this scheme, it increased connectivity while decreased compromise ratio than those of the previous LDK, futhermore, we confirmed that a hexagon distribution of AN reduces the network cost.

Long-term deflection prediction in steel-concrete composite beams

  • Lou, Tiejiong;Wu, Sishun;Karavasilis, Theodore L.;Chen, Bo
    • Steel and Composite Structures
    • /
    • v.39 no.1
    • /
    • pp.21-33
    • /
    • 2021
  • This paper aims to improve the current state-of-the-art in long-term deflection prediction in steel-concrete composite beams. The efficiency of a time-dependent finite element model based on linear creep theory is verified with available experimental data. A parametric numerical study is then carried out, which focuses on the effects of concrete creep and/or shrinkage, ultimate shrinkage strain and reinforcing bars in the slab. The study shows that the long-term deformations in composite beams are dominated by concrete shrinkage and that a higher area of reinforcing bars leads to lower long-term deformations and steel stresses. The AISC model appears to overestimate the shrinkage-induced deflection. A modified ACI equation is proposed to quantify time-dependent deflections in composite beams. In particular, a modified reduction factor reflecting the influence of reinforcing bars and a coefficient reflecting the influence of ultimate shrinkage are introduced in the proposed equation. The long-term deflections predicted by this equation and the results of extensive numerical analyses are found to be in good agreement.

Experimental investigation of amplitude-dependent self-excited aerodynamic forces on a 5:1 rectangular cylinder

  • Wang, Qi;Wu, Bo;Liao, Hai-li;Mei, Hanyu
    • Wind and Structures
    • /
    • v.34 no.1
    • /
    • pp.73-80
    • /
    • 2022
  • This paper presents a study on amplitude-dependent self-excited aerodynamic forces of a 5:1 rectangular cylinder through free vibration wind tunnel test. The sectional model was spring-supported in a single degree of freedom (SDOF) in torsion, and it is found that the amplitude of the free vibration cylinder model was not divergent in the post-flutter stage and was instead of various stable amplitudes varying with the wind speed. The amplitude-dependent aerodynamic damping is determined using Hilbert Transform of response time histories at different wind speeds in a smooth flow. An approach is proposed to extract aerodynamic derivatives as nonlinear functions of the amplitude of torsional motion at various reduced wind speeds. The results show that the magnitude of A2*, which is related to the negative aerodynamic damping, increases with increasing wind speed but decreases with vibration amplitude, and the magnitude of A3* also increases with increasing wind speed but keeps stable with the changing amplitude. The amplitude-dependent aerodynamic derivatives derived from the tests can also be used to estimate the post-flutter response of 5:1 rectangular cylinders with different dynamic parameters via traditional flutter analysis.

Whole-genome sequence association study identifies cyclin dependent kinase 8 as a key gene for the number of mummified piglets

  • Pingxian, Wu;Dejuan, Chen;Kai, Wang;Shujie, Wang;Yihui, Liu;Anan, Jiang;Weihang, Xiao;Yanzhi, Jiang;Li, Zhu;Xu, Xu;Xiaotian, Qiu;Xuewei, Li;Guoqing, Tang
    • Animal Bioscience
    • /
    • v.36 no.1
    • /
    • pp.29-42
    • /
    • 2023
  • Objective: Pigs, an ideal biomedical model for human diseases, suffer from about 50% early embryonic and fetal death, a major cause of fertility loss worldwide. However, identifying the causal variant remains a huge challenge. This study aimed to detect single nucleotide polymorphisms (SNPs) and candidate genes for the number of mummified (NM) piglets using the imputed whole-genome sequence (WGS) and validate the potential candidate genes. Methods: The imputed WGS was introduced from genotyping-by-sequencing (GBS) using a multi-breed reference population. We performed genome-wide association studies (GWAS) for NM piglets at birth from a Landrace pig populatiGWAS peak located on SSC11: 0.10 to 7.11 Mbp (Top SNP, SSC11:1,889,658 bp; p = 9.98E-13) was identified in cyclin dependent kinase on. A total of 300 Landrace pigs were genotyped by GBS. The whole-genome variants were imputed, and 4,252,858 SNPs were obtained. Various molecular experiments were conducted to determine how the genes affected NM in pigs. Results: A strong GWAS peak located on SSC11: 0.10 to 7.11 Mbp (Top SNP, SSC11:1,889,658 bp; p = 9.98E-13) was identified in cyclin dependent kinase 8 (CDK8) gene, which plays a crucial role in embryonic retardation and lethality. Based on the molecular experiments, we found that Y-box binding protein 1 (YBX1) was a crucial transcription factor for CDK8, which mediated the effect of CDK8 in the proliferation of porcine ovarian granulosa cells via transforming growth factor beta/small mother against decapentaplegic signaling pathway, and, as a consequence, affected embryo quality, indicating that this pathway may be contributing to mummified fetal in pigs. Conclusion: A powerful imputation-based association study was performed to identify genes associated with NM in pigs. CDK8 was suggested as a functional gene for the proliferation of porcine ovarian granulosa cells, but further studies are required to determine causative mutations and the effect of loci on NM in pigs.