Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.
Ko, Wen-Tsai; Chiou, Shin-Yan; Lu, Erl-Huei; Chang, Henry Ker-Chang
2014-09-01
RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.
A False-name-Proof Double Auction Protocol for Arbitrary Evaluation Values
NASA Astrophysics Data System (ADS)
Sakurai, Yuko; Yokoo, Makoto
We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategy-proofness by incorporating the possibility of false-name bids, e.g., bids submitted using multiple e-mail addresses. An existing protocol called TPD protocol is false-name-proof but can handle only the cases where marginal utilities of each agent always decrease, while our new GTPD protocol can handle arbitrary evaluation values. When marginal utilities can increase, some bids cannot be divided into a single unit (e.g., an all-or-nothing bid). Due to the existence of such indivisible bids, meeting supply/demand becomes difficult. Furthermore, a seller/buyer can submit a false-name-bid by pretending to be a potential buyer/seller to manipulate allocations and payments. In the GTPD protocol, the auctioneer is required to absorb the supply-demand imbalance up to a given upper-bound. Also, the GTPD incorporate a new false-name-proof one-sided auction protocol that is guaranteed to sell/buy a certain number of units. Simulation results show that when the threshold price is set appropriately, this protocol can obtain a good social surplus, and the number of absorbed units is much smaller than the given upper-bound.
Security of six-state quantum key distribution protocol with threshold detectors
Kato, Go; Tamaki, Kiyoshi
2016-01-01
The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices. PMID:27443610
NASA Astrophysics Data System (ADS)
Graham, Michelle; Gray, David
As wireless networks become increasingly ubiquitous, the demand for a method of locating a device has increased dramatically. Location Based Services are now commonplace but there are few methods of verifying or guaranteeing a location provided by a user without some specialised hardware, especially in larger scale networks. We propose a system for the verification of location claims, using proof gathered from neighbouring devices. In this paper we introduce a protocol to protect this proof gathering process, protecting the privacy of all involved parties and securing it from intruders and malicious claiming devices. We present the protocol in stages, extending the security of this protocol to allow for flexibility within its application. The Secure Location Verification Proof Gathering Protocol (SLVPGP) has been designed to function within the area of Vehicular Networks, although its application could be extended to any device with wireless & cryptographic capabilities.
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
Nam, Junghyun; Kim, Moonseong
2014-01-01
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863
Bioengineering of Bacteria To Assemble Custom-Made Polyester Affinity Resins
Hay, Iain D.; Du, Jinping; Burr, Natalie
2014-01-01
Proof of concept for the in vivo bacterial production of a polyester resin displaying various customizable affinity protein binding domains is provided. This was achieved by engineering various protein binding domains into a bacterial polyester-synthesizing enzyme. Affinity binding domains based on various structural folds and derived from molecular libraries were used to demonstrate the potential of this technique. Designed ankyrin repeat proteins (DARPins), engineered OB-fold domains (OBodies), and VHH domains from camelid antibodies (nanobodies) were employed. The respective resins were produced in a single bacterial fermentation step, and a simple purification protocol was developed. Purified resins were suitable for most lab-scale affinity chromatography purposes. All of the affinity domains tested produced polyester beads with specific affinity for the target protein. The binding capacity of these affinity resins ranged from 90 to 600 nmol of protein per wet gram of polyester affinity resin, enabling purification of a recombinant protein target from a complex bacterial cell lysate up to a purity level of 96% in one step. The polyester resin was efficiently produced by conventional lab-scale shake flask fermentation, resulting in bacteria accumulating up to 55% of their cellular dry weight as polyester. A further proof of concept demonstrating the practicality of this technique was obtained through the intracellular coproduction of a specific affinity resin and its target. This enables in vivo binding and purification of the coproduced “target protein.” Overall, this study provides evidence for the use of molecular engineering of polyester synthases toward the microbial production of specific bioseparation resins implementing previously selected binding domains. PMID:25344238
Shorter unentangled proofs for ground state connectivity
NASA Astrophysics Data System (ADS)
Caha, Libor; Nagaj, Daniel; Schwarz, Martin
2018-07-01
Can one considerably shorten a proof for a quantum problem by using a protocol with a constant number of unentangled provers? We consider a frustration-free variant of the sf {QCMA}-complete ground state connectivity (GSCON) problem for a system of size n with a proof of superlinear size. We show that we can shorten this proof in sf {QMA}(2): There exists a two-copy, unentangled proof with length of order n, up to logarithmic factors, while the completeness-soundness gap of the new protocol becomes a small inverse polynomial in n.
Mechanical verification of a schematic Byzantine clock synchronization algorithm
NASA Technical Reports Server (NTRS)
Shankar, Natarajan
1991-01-01
Schneider generalizes a number of protocols for Byzantine fault tolerant clock synchronization and presents a uniform proof for their correctness. The authors present a machine checked proof of this schematic protocol that revises some of the details in Schneider's original analysis. The verification was carried out with the EHDM system developed at the SRI Computer Science Laboratory. The mechanically checked proofs include the verification that the egocentric mean function used in Lamport and Melliar-Smith's Interactive Convergence Algorithm satisfies the requirements of Schneider's protocol.
Simple proof of security of the BB84 quantum key distribution protocol
Shor; Preskill
2000-07-10
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement purification based protocol uses Calderbank-Shor-Steane codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.
Efficient multiuser quantum cryptography network based on entanglement.
Xue, Peng; Wang, Kunkun; Wang, Xiaoping
2017-04-04
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.
Efficient multiuser quantum cryptography network based on entanglement
Xue, Peng; Wang, Kunkun; Wang, Xiaoping
2017-01-01
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory. PMID:28374854
Efficient multiuser quantum cryptography network based on entanglement
NASA Astrophysics Data System (ADS)
Xue, Peng; Wang, Kunkun; Wang, Xiaoping
2017-04-01
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, University Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex
2010-06-15
In this article, we give a simple proof of the fact that the optimal collective attacks against continuous-variable quantum key distribution with a Gaussian modulation are Gaussian attacks. Our proof, which makes use of symmetry properties of the protocol in phase space, is particularly relevant for the finite-key analysis of the protocol and therefore for practical applications.
Diagnosing a Failed Proof in Fault-Tolerance: A Disproving Challenge Problem
NASA Technical Reports Server (NTRS)
Pike, Lee; Miner, Paul; Torres-Pomales, Wilfredo
2006-01-01
This paper proposes a challenge problem in disproving. We describe a fault-tolerant distributed protocol designed at NASA for use in a fly-by-wire system for next-generation commercial aircraft. An early design of the protocol contains a subtle bug that is highly unlikely to be caught in fault injection testing. We describe a failed proof of the protocol's correctness in a mechanical theorem prover (PVS) with a complex unfinished proof conjecture. We use a model checking suite (SAL) to generate a concrete counterexample to the unproven conjecture to demonstrate the existence of a bug. However, we argue that the effort required in our approach is too high and propose what conditions a better solution would satisfy. We carefully describe the protocol and bug to provide a challenging but feasible case study for disproving research.
2015-01-01
on AFRL’s small unmanned aerial vehicle (UAV) test bed . 15. SUBJECT TERMS Zero-Knowledge Proof Protocol Testing 16. SECURITY CLASSIFICATION OF...VERIFIER*** edition Version Information: Version 1.1.3 Version Details: Successful ZK authentication between two networked machines. Fixed a bug ...that causes intermittent bignum errors. Fixed a network hang bug and now allows continually authentication at the Verifier. Also now removing
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2011-01-01
This report presents a deductive proof of a self-stabilizing distributed clock synchronization protocol. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present a deductive proof of the correctness of the protocol as it applies to the networks with unidirectional and bidirectional links. We also confirm the claims of determinism and linear convergence.
A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays
2014-07-18
incentive scheme for Tor relying on two novel concepts. We introduce TorCoin, an “altcoin” that uses the Bitcoin protocol to re- ward relays for...or altcoin, based on the Bitcoin protocol [8]. Unlike Bitcoin , its proof-of-work scheme is based on bandwidth rather than computation. To “mine” a...concepts. We introduce TorCoin, an altcoin" that uses the Bitcoin protocol to re- ward relays for contributing bandwidth. Relays mine" TorCoins, then
Continuous-variable protocol for oblivious transfer in the noisy-storage model.
Furrer, Fabian; Gehring, Tobias; Schaffner, Christian; Pacher, Christoph; Schnabel, Roman; Wehner, Stephanie
2018-04-13
Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here a quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced homodyne detection. Our work enables the implementation of arbitrary two-party quantum cryptographic protocols with continuous-variable communication systems.
Putting time into proof outlines
NASA Technical Reports Server (NTRS)
Schneider, Fred B.; Bloom, Bard; Marzullo, Keith
1991-01-01
A logic for reasoning about timing of concurrent programs is presented. The logic is based on proof outlines and can handle maximal parallelism as well as resource-constrained execution environments. The correctness proof for a mutual exclusion protocol that uses execution timings in a subtle way illustrates the logic in action.
Putting time into proof outlines
NASA Technical Reports Server (NTRS)
Schneider, Fred B.; Bloom, Bard; Marzullo, Keith
1993-01-01
A logic for reasoning about timing properties of concurrent programs is presented. The logic is based on Hoare-style proof outlines and can handle maximal parallelism as well as certain resource-constrained execution environments. The correctness proof for a mutual exclusion protocol that uses execution timings in a subtle way illustrates the logic in action. A soundness proof using structural operational semantics is outlined in the appendix.
Security proof of a three-state quantum-key-distribution protocol without rotational symmetry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fung, C.-H.F.; Lo, H.-K.
2006-10-15
Standard security proofs of quantum-key-distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states |0{sub z}> and |1{sub z}> can contribute to key generation, and the third state |+>=(|0{sub z}>+|1{sub z}>)/{radical}(2) is for channel estimation. This protocol has been proposed and implemented experimentally in some frequency-based QKD systems where the three states can be prepared easily. Thus, by founding on the security of this three-state protocol, we prove that thesemore » QKD schemes are, in fact, unconditionally secure against any attacks allowed by quantum mechanics. The main task in our proof is to upper bound the phase error rate of the qubits given the bit error rates observed. Unconditional security can then be proved not only for the ideal case of a single-photon source and perfect detectors, but also for the realistic case of a phase-randomized weak coherent light source and imperfect threshold detectors. Our result in the phase error rate upper bound is independent of the loss in the channel. Also, we compare the three-state protocol with the Bennett-Brassard 1984 (BB84) protocol. For the single-photon source case, our result proves that the BB84 protocol strictly tolerates a higher quantum bit error rate than the three-state protocol, while for the coherent-source case, the BB84 protocol achieves a higher key generation rate and secure distance than the three-state protocol when a decoy-state method is used.« less
Scada Malware, a Proof of Concept
NASA Astrophysics Data System (ADS)
Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto
Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into such complex critical systems. Of particular interest are the set of vulnerabilities related to the class of communication protocols normally known as “SCADA” protocols, under which fall all the communication protocols used to remotely control the RTU devices of an industrial system. In this paper we present a proof of concept of the potential effects of a set of computer malware specifically designed and created in order to impact, by taking advantage of some vulnerabilities of the ModBUS protocol, on a typical Supervisory Control and Data Acquisition system.
NASA Astrophysics Data System (ADS)
Sasaki, Toshihiko; Koashi, Masato
2017-06-01
The round-robin differential phase shift (RRDPS) quantum key distribution (QKD) protocol is a unique QKD protocol whose security has not been understood through an information-disturbance trade-off relation, and a sufficient amount of privacy amplification was given independently of signal disturbance. Here, we discuss the security of the RRDPS protocol in the asymptotic regime when a good estimate of the bit error rate is available as a measure of signal disturbance. The uniqueness of the RRDPS protocol shows up as a peculiar form of information-disturbance trade-off curve. When the length of a block of pulses used for encoding and the signal disturbance are both small, it provides a significantly better key rate than that from the original security proof. On the other hand, when the block length is large, the use of the signal disturbance makes little improvement in the key rate. Our analysis will bridge a gap between the RRDPS protocol and the conventional QKD protocols.
Design and Verification of a Distributed Communication Protocol
NASA Technical Reports Server (NTRS)
Munoz, Cesar A.; Goodloe, Alwyn E.
2009-01-01
The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.
Könning, Doreen; Zielonka, Stefan; Sellmann, Carolin; Schröter, Christian; Grzeschik, Julius; Becker, Stefan; Kolmar, Harald
2016-04-01
In recent years, engineering of pH-sensitivity into antibodies as well as antibody-derived fragments has become more and more attractive for biomedical and biotechnological applications. Herein, we report the isolation of the first pH-sensitive IgNAR variable domain (vNAR), which was isolated from a yeast-displayed, semi-synthetic master library. This strategy enables the direct identification of pH-dependent binders from a histidine-enriched CDR3 library. Displayed vNAR variants contained two histidine substitutions on average at random positions in their 12-residue CDR3 loop. Upon screening of seven rounds against the proof-of-concept target EpCAM (selection for binding at pH 7.4 and decreased binding at pH 6.0), a single clone was obtained that showed specific and pH-dependent binding as characterized by yeast surface display and biolayer interferometry. Potential applications for such pH-dependent vNAR domains include their employment in tailored affinity chromatography, enabling mild elution protocols. Moreover, utilizing a master library for the isolation of pH-sensitive vNAR variants may be a generic strategy to obtain binding entities with prescribed characteristics for applications in biotechnology, diagnostics, and therapy.
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
NASA Astrophysics Data System (ADS)
Ristenpart, Thomas; Yilek, Scott
Multiparty signature protocols need protection against rogue-key attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, provable security has only been established under the knowledge of secret key (KOSK) assumption where the adversary is required to reveal the secret keys it utilizes. In practice, certifying authorities rarely require the strong proofs of knowledge of secret keys required to substantiate the KOSK assumption. Instead, proofs of possession (POPs) are required and can be as simple as just a signature over the certificate request message. We propose a general registered key model, within which we can model both the KOSK assumption and in-use POP protocols. We show that simple POP protocols yield provable security of Boldyreva's multisignature scheme [11], the LOSSW multisignature scheme [28], and a 2-user ring signature scheme due to Bender, Katz, and Morselli [10]. Our results are the first to provide formal evidence that POPs can stop rogue-key attacks.
Security of a semi-quantum protocol where reflections contribute to the secret key
NASA Astrophysics Data System (ADS)
Krawec, Walter O.
2016-05-01
In this paper, we provide a proof of unconditional security for a semi-quantum key distribution protocol introduced in a previous work. This particular protocol demonstrated the possibility of using X basis states to contribute to the raw key of the two users (as opposed to using only direct measurement results) even though a semi-quantum participant cannot directly manipulate such states. In this work, we provide a complete proof of security by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we are able to find an error threshold value such that for all error rates less than this threshold, it is guaranteed that A and B may distill a secure secret key; for error rates larger than this threshold, A and B should abort. We demonstrate that this error threshold compares favorably to several fully quantum protocols. We also comment on some interesting observations about the behavior of this protocol under certain noise scenarios.
ECC-based grouping-proof RFID for inpatient medication safety.
Lin, Qiping; Zhang, Fangguo
2012-12-01
Several papers were proposed in which symmetric cryptography was used to design RFID grouping-proof for medication safety in the Journal of Medical Systems. However, if we want to ensure privacy, authentication and protection against the tracking of RFID-tags without losing system scalability, we must design an asymmetric cryptography-based RFID. This paper will propose a new ECC-based grouping-proof for RFID. Our ECC-based grouping-proof reduces the computation of tags and prevents timeout problems from occurring in n-party grouping-proof protocol. Based on asymmetric cryptography, the proposed scheme is practical, secure and efficient for medication applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lu Hua; Department of Mathematics and Physics, Hubei University of Technology, Wuhan 430068; Fung, Chi-Hang Fred
2011-10-15
In a deterministic quantum key distribution (DQKD) protocol with a two-way quantum channel, Bob sends a qubit to Alice who then encodes a key bit onto the qubit and sends it back to Bob. After measuring the returned qubit, Bob can obtain Alice's key bit immediately, without basis reconciliation. Since an eavesdropper may attack the qubits traveling on either the Bob-Alice channel or the Alice-Bob channel, the security analysis of DQKD protocol with a two-way quantum channel is complicated and its unconditional security has been controversial. This paper presents a security proof of a single-photon four-state DQKD protocol against generalmore » attacks.« less
A survey of noninteractive zero knowledge proof system and its applications.
Wu, Huixin; Wang, Feng
2014-01-01
Zero knowledge proof system which has received extensive attention since it was proposed is an important branch of cryptography and computational complexity theory. Thereinto, noninteractive zero knowledge proof system contains only one message sent by the prover to the verifier. It is widely used in the construction of various types of cryptographic protocols and cryptographic algorithms because of its good privacy, authentication, and lower interactive complexity. This paper reviews and analyzes the basic principles of noninteractive zero knowledge proof system, and summarizes the research progress achieved by noninteractive zero knowledge proof system on the following aspects: the definition and related models of noninteractive zero knowledge proof system, noninteractive zero knowledge proof system of NP problems, noninteractive statistical and perfect zero knowledge, the connection between noninteractive zero knowledge proof system, interactive zero knowledge proof system, and zap, and the specific applications of noninteractive zero knowledge proof system. This paper also points out the future research directions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Molotkov, S. N., E-mail: sergei.molotkov@gmail.com
2012-12-15
Any key-generation session contains a finite number of quantum-state messages, and it is there-fore important to understand the fundamental restrictions imposed on the minimal length of a string required to obtain a secret key with a specified length. The entropy uncertainty relations for smooth min and max entropies considerably simplify and shorten the proof of security. A proof of security of quantum key distribution with phase-temporal encryption is presented. This protocol provides the maximum critical error compared to other protocols up to which secure key distribution is guaranteed. In addition, unlike other basic protocols (of the BB84 type), which aremore » vulnerable with respect to an attack by 'blinding' of avalanche photodetectors, this protocol is stable with respect to such an attack and guarantees key security.« less
Genome-wide profiling of DNA-binding proteins using barcode-based multiplex Solexa sequencing.
Raghav, Sunil Kumar; Deplancke, Bart
2012-01-01
Chromatin immunoprecipitation (ChIP) is a commonly used technique to detect the in vivo binding of proteins to DNA. ChIP is now routinely paired to microarray analysis (ChIP-chip) or next-generation sequencing (ChIP-Seq) to profile the DNA occupancy of proteins of interest on a genome-wide level. Because ChIP-chip introduces several biases, most notably due to the use of a fixed number of probes, ChIP-Seq has quickly become the method of choice as, depending on the sequencing depth, it is more sensitive, quantitative, and provides a greater binding site location resolution. With the ever increasing number of reads that can be generated per sequencing run, it has now become possible to analyze several samples simultaneously while maintaining sufficient sequence coverage, thus significantly reducing the cost per ChIP-Seq experiment. In this chapter, we provide a step-by-step guide on how to perform multiplexed ChIP-Seq analyses. As a proof-of-concept, we focus on the genome-wide profiling of RNA Polymerase II as measuring its DNA occupancy at different stages of any biological process can provide insights into the gene regulatory mechanisms involved. However, the protocol can also be used to perform multiplexed ChIP-Seq analyses of other DNA-binding proteins such as chromatin modifiers and transcription factors.
Zhang, Zhe; Martiny, Virginie; Lagorce, David; Ikeguchi, Yoshihiko; Alexov, Emil; Miteva, Maria A
2014-01-01
Snyder-Robinson Syndrome (SRS) is a rare mental retardation disorder which is caused by the malfunctioning of an enzyme, the spermine synthase (SMS), which functions as a homo-dimer. The malfunctioning of SMS in SRS patients is associated with several identified missense mutations that occur away from the active site. This investigation deals with a particular SRS-causing mutation, the G56S mutation, which was shown computationally and experimentally to destabilize the SMS homo-dimer and thus to abolish SMS enzymatic activity. As a proof-of-concept, we explore the possibility to restore the enzymatic activity of the malfunctioning SMS mutant G56S by stabilizing the dimer through small molecule binding at the mutant homo-dimer interface. For this purpose, we designed an in silico protocol that couples virtual screening and a free binding energy-based approach to identify potential small-molecule binders on the destabilized G56S dimer, with the goal to stabilize it and thus to increase SMS G56S mutant activity. The protocol resulted in extensive list of plausible stabilizers, among which we selected and tested 51 compounds experimentally for their capability to increase SMS G56S mutant enzymatic activity. In silico analysis of the experimentally identified stabilizers suggested five distinctive chemical scaffolds. This investigation suggests that druggable pockets exist in the vicinity of the mutation sites at protein-protein interfaces which can be used to alter the disease-causing effects by small molecule binding. The identified chemical scaffolds are drug-like and can serve as original starting points for development of lead molecules to further rescue the disease-causing effects of the Snyder-Robinson syndrome for which no efficient treatment exists up to now.
NASA Technical Reports Server (NTRS)
Nickle, F. R.; Freeman, Arthur B.
1939-01-01
The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.
A Survey of Noninteractive Zero Knowledge Proof System and Its Applications
Wu, Huixin; Wang, Feng
2014-01-01
Zero knowledge proof system which has received extensive attention since it was proposed is an important branch of cryptography and computational complexity theory. Thereinto, noninteractive zero knowledge proof system contains only one message sent by the prover to the verifier. It is widely used in the construction of various types of cryptographic protocols and cryptographic algorithms because of its good privacy, authentication, and lower interactive complexity. This paper reviews and analyzes the basic principles of noninteractive zero knowledge proof system, and summarizes the research progress achieved by noninteractive zero knowledge proof system on the following aspects: the definition and related models of noninteractive zero knowledge proof system, noninteractive zero knowledge proof system of NP problems, noninteractive statistical and perfect zero knowledge, the connection between noninteractive zero knowledge proof system, interactive zero knowledge proof system, and zap, and the specific applications of noninteractive zero knowledge proof system. This paper also points out the future research directions. PMID:24883407
Security of counterfactual quantum cryptography
NASA Astrophysics Data System (ADS)
Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Han, Zheng-Fu; Guo, Guang-Can
2010-10-01
Recently, a “counterfactual” quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.103.230501 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bit error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.
Security of counterfactual quantum cryptography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yin Zhenqiang; Li Hongwei; Chen Wei
2010-10-15
Recently, a 'counterfactual' quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bitmore » error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.« less
NASA Astrophysics Data System (ADS)
Devetak, Igor; Harrow, Aram W.; Winter, Andreas
2004-12-01
We introduce three new quantum protocols involving noisy quantum channels and entangled states, and relate them operationally and conceptually with four well-known old protocols. Two of the new protocols (the mother and father) can generate the other five “child” protocols by direct application of teleportation and superdense coding, and can be derived in turn by making the old protocols “coherent.” This gives very simple proofs for two famous old protocols (the hashing inequality and quantum channel capacity) and provides the basis for optimal trade-off curves in several quantum information processing tasks.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-23
... commercial products or services of any third-party software providers. Proof of Concept Demonstration for..., protocols, and specifications for the Exchange Network's data exchange services, the software provider shall... demonstration will focus the electronic transmission of NPDES DMRs from a third-party commercial software...
Security proof of continuous-variable quantum key distribution using three coherent states
NASA Astrophysics Data System (ADS)
Brádler, Kamil; Weedbrook, Christian
2018-02-01
We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection. Previous work had considered the binary case of two coherent states and here we nontrivially extend this to three. Our motivation is to leverage the practical benefits of both discrete and continuous (Gaussian) encoding schemes creating a best-of-both-worlds approach; namely, the postprocessing of discrete encodings and the hardware benefits of continuous ones. We present a thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate. We calculate this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing. Finally, we compare the ternary coherent state protocol to other well-known QKD schemes (and fundamental repeaterless limits) in terms of secret key rates and loss.
Refinement for fault-tolerance: An aircraft hand-off protocol
NASA Technical Reports Server (NTRS)
Marzullo, Keith; Schneider, Fred B.; Dehn, Jon
1994-01-01
Part of the Advanced Automation System (AAS) for air-traffic control is a protocol to permit flight hand-off from one air-traffic controller to another. The protocol must be fault-tolerant and, therefore, is subtle -- an ideal candidate for the application of formal methods. This paper describes a formal method for deriving fault-tolerant protocols that is based on refinement and proof outlines. The AAS hand-off protocol was actually derived using this method; that derivation is given.
NASA Astrophysics Data System (ADS)
Wang, Shuang; Yin, Zhen-Qiang; Chau, H. F.; Chen, Wei; Wang, Chao; Guo, Guang-Can; Han, Zheng-Fu
2018-04-01
In comparison to qubit-based protocols, qudit-based quantum key distribution ones generally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based protocol known as the Chau15 (Chau 2015 Phys. Rev. A 92 062324). Remarkably, the state preparation and measurement in this protocol can be done relatively easily since the required states are phase encoded almost like the diagonal basis states of a qubit. Here we report the first proof-of-principle demonstration of the Chau15 protocol. One highlight of our experiment is that its post-processing is based on practical one-way manner, while the original proposal in Chau (2015 Phys. Rev. A 92 062324) relies on complicated two-way post-processing, which is a great challenge in experiment. In addition, by manipulating time-bin qudit and measurement with a variable delay interferometer, our realization is extensible to qudit with high-dimensionality and confirms the experimental feasibility of the Chau15 protocol.
Model Checking Failed Conjectures in Theorem Proving: A Case Study
NASA Technical Reports Server (NTRS)
Pike, Lee; Miner, Paul; Torres-Pomales, Wilfredo
2004-01-01
Interactive mechanical theorem proving can provide high assurance of correct design, but it can also be a slow iterative process. Much time is spent determining why a proof of a conjecture is not forthcoming. In some cases, the conjecture is false and in others, the attempted proof is insufficient. In this case study, we use the SAL family of model checkers to generate a concrete counterexample to an unproven conjecture specified in the mechanical theorem prover, PVS. The focus of our case study is the ROBUS Interactive Consistency Protocol. We combine the use of a mechanical theorem prover and a model checker to expose a subtle flaw in the protocol that occurs under a particular scenario of faults and processor states. Uncovering the flaw allows us to mend the protocol and complete its general verification in PVS.
A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2011-01-01
This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.
Coloured Petri Net Refinement Specification and Correctness Proof with Coq
NASA Technical Reports Server (NTRS)
Choppy, Christine; Mayero, Micaela; Petrucci, Laure
2009-01-01
In this work, we address the formalisation of symmetric nets, a subclass of coloured Petri nets, refinement in COQ. We first provide a formalisation of the net models, and of their type refinement in COQ. Then the COQ proof assistant is used to prove the refinement correctness lemma. An example adapted from a protocol example illustrates our work.
Localized Chemical Remodeling for Live Cell Imaging of Protein-Specific Glycoform.
Hui, Jingjing; Bao, Lei; Li, Siqiao; Zhang, Yi; Feng, Yimei; Ding, Lin; Ju, Huangxian
2017-07-03
Live cell imaging of protein-specific glycoforms is important for the elucidation of glycosylation mechanisms and identification of disease states. The currently used metabolic oligosaccharide engineering (MOE) technology permits routinely global chemical remodeling (GCM) for carbohydrate site of interest, but can exert unnecessary whole-cell scale perturbation and generate unpredictable metabolic efficiency issue. A localized chemical remodeling (LCM) strategy for efficient and reliable access to protein-specific glycoform information is reported. The proof-of-concept protocol developed for MUC1-specific terminal galactose/N-acetylgalactosamine (Gal/GalNAc) combines affinity binding, off-on switchable catalytic activity, and proximity catalysis to create a reactive handle for bioorthogonal labeling and imaging. Noteworthy assay features associated with LCM as compared with MOE include minimum target cell perturbation, short reaction timeframe, effectiveness as a molecular ruler, and quantitative analysis capability. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
Counterfactual Quantum Deterministic Key Distribution
NASA Astrophysics Data System (ADS)
Zhang, Sheng; Wang, Jian; Tang, Chao-Jing
2013-01-01
We propose a new counterfactual quantum cryptography protocol concerning about distributing a deterministic key. By adding a controlled blocking operation module to the original protocol [T.G. Noh, Phys. Rev. Lett. 103 (2009) 230501], the correlation between the polarizations of the two parties, Alice and Bob, is extended, therefore, one can distribute both deterministic keys and random ones using our protocol. We have also given a simple proof of the security of our protocol using the technique we ever applied to the original protocol. Most importantly, our analysis produces a bound tighter than the existing ones.
A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2011-01-01
This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.
NASA Astrophysics Data System (ADS)
Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu
2014-07-01
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
Reexamination of quantum bit commitment: The possible and the impossible
DOE Office of Scientific and Technical Information (OSTI.GOV)
D'Ariano, Giacomo Mauro; Kretschmann, Dennis; Institut fuer Mathematische Physik, Technische Universitaet Braunschweig, Mendelssohnstrasse 3, 38106 Braunschweig
2007-09-15
Bit commitment protocols whose security is based on the laws of quantum mechanics alone are generally held to be impossible. We give a strengthened and explicit proof of this result. We extend its scope to a much larger variety of protocols, which may have an arbitrary number of rounds, in which both classical and quantum information is exchanged, and which may include aborts and resets. Moreover, we do not consider the receiver to be bound to a fixed 'honest' strategy, so that 'anonymous state protocols', which were recently suggested as a possible way to beat the known no-go results, aremore » also covered. We show that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver. Moreover, if the concealing property holds only approximately, the cheat goes undetected with a high probability, which we explicitly estimate. The proof uses an explicit formalization of general two-party protocols, which is applicable to more general situations, and an estimate about the continuity of the Stinespring dilation of a general quantum channel. The result also provides a natural characterization of protocols that fall outside the standard setting of unlimited available technology and thus may allow secure bit commitment. We present such a protocol whose security, perhaps surprisingly, relies on decoherence in the receiver's laboratory.« less
A Combinatorial Auction among Versatile Experts and Amateurs
NASA Astrophysics Data System (ADS)
Ito, Takayuki; Yokoo, Makoto; Matsubara, Shigeo
Auctions have become an integral part of electronic commerce and a promising field for applying multi-agent technologies. Correctly judging the quality of auctioned goods is often difficult for amateurs, in particular, in Internet auctions. However, experts can correctly judge the quality of goods. In this situation, it is difficult to make experts tell the truth and attain an efficient allocation, since experts have a clear advantage over amateurs and they would not reveal their valuable information without some reward. In our previous work, we have succeeded in developing such auction protocols under the following two cases: (1) the case of a single-unit auction among experts and amateurs, and (2) the case of a combinatorial auction among single-skilled experts and amateurs. In this paper, we focus on versatile experts. Versatile experts have an interest in, and expert knowledge on the qualities of several goods. In the case of versatile experts, there would be several problems, e.g., free riding problems, if we simply extended the previous VCG-style auction protocol. Thus, in this paper, we employ PORF (price-oriented, rationing-free) protocol for designing our new protocol to realize a strategy-proof auction protocol for experts. In the protocol, the dominant strategy for experts is truth-telling. Also, for amateurs, truth-telling is the best response when two or more experts select the dominant strategy. Furthermore, the protocol is false-name-proof.
Leverrier, Anthony; Grangier, Philippe
2009-05-08
We present a continuous-variable quantum key distribution protocol combining a discrete modulation and reverse reconciliation. This protocol is proven unconditionally secure and allows the distribution of secret keys over long distances, thanks to a reverse reconciliation scheme efficient at very low signal-to-noise ratio.
Zhang, Zheshen; Voss, Paul L
2009-07-06
We propose a continuous variable based quantum key distribution protocol that makes use of discretely signaled coherent light and reverse error reconciliation. We present a rigorous security proof against collective attacks with realistic lossy, noisy quantum channels, imperfect detector efficiency, and detector electronic noise. This protocol is promising for convenient, high-speed operation at link distances up to 50 km with the use of post-selection.
Liu, Chao; Liu, Jinhong; Zhang, Junxiang; Zhu, Shiyao
2017-09-07
We present an interaction-free measurement with quantum Zeno effect and a high efficiency η = 74.6% ± 0.15%. As a proof-of-principle demonstration, this measurement can be used to implement a quantum counterfactual-like communication protocol. Instead of a single photon state, we use a coherent light as the input source and show that the output agrees with the proposed quantum counterfactual communication protocol according to Salih et al. Although the counterfactuality is not achieved due to the presence of a few photons in the public channel, we show that the signal light is nearly absent in the public channel, which exhibits a proof-of-principle quantum counterfactual-like property of communication.
NASA Astrophysics Data System (ADS)
Jiang, Dong-Huan; Xu, Guang-Bao
2018-07-01
Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.
A new quantum sealed-bid auction protocol with secret order in post-confirmation
NASA Astrophysics Data System (ADS)
Wang, Jing-Tao; Chen, Xiu-Bo; Xu, Gang; Meng, Xiang-Hua; Yang, Yi-Xian
2015-10-01
A new security protocol for quantum sealed-bid auction is proposed to resist the collusion attack from some malicious bidders. The most significant feature of this protocol is that bidders prepare their particles with secret order in post-confirmation for encoding bids. In addition, a new theorem and its proof are given based on the theory of combinatorial mathematics, which can be used as evaluation criteria for the collusion attack. It is shown that the new protocol is immune to the collusion attack and meets the demand for a secure auction. Compared with those previous protocols, the security, efficiency and availability of the proposed protocol are largely improved.
A Unified Fault-Tolerance Protocol
NASA Technical Reports Server (NTRS)
Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey
2004-01-01
Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.
Lipowska-Bhalla, Grazyna; Gilham, David E; Hawkins, Robert E; Rothwell, Dominic G
2013-12-01
The clinical potential of chimeric antigen receptors in adoptive cellular therapy is beginning to be realized with several recent clinical trials targeting CD19 showing promising results in advanced B cell malignancies. This increased efficacy corresponds with improved engineering of the chimeric receptors with the latest-generation receptors eliciting greater signaling and proliferation potential. However, the antigen-binding single-chain variable fragment (scFv) domain of the receptors is critical in determining the activity of the chimeric receptor-expressing T cells, as this determines specificity and affinity to the tumor antigen. In this study, we describe a mammalian T cell line screening protocol employing a 2A-based bicistronic retroviral vector to isolate functional scFvs. This approach involves expression of the scFv library in a chimeric antigen receptor, and is based on selection of clones capable of stimulating CD69 upregulation in a T cell line and has a number of advantages over previously described methods in that the use of a 2A cassette ensures the exclusion of nonexpressing scFvs and the screening using a chimeric receptor in a mammalian T cell line ensures selection in the optimum context for therapeutic use. Proof-of-principle experiments show that the protocol was capable of a 10(5)-fold enrichment of positive clones after three rounds of selection. Furthermore, an antigen-specific clone was successfully isolated from a partially enriched scFv library, confirming the strength of the protocol. This approach has the potential to identify novel scFvs of use in adoptive T cell therapy and, potentially, wider antibody-based applications.
Security of a single-state semi-quantum key distribution protocol
NASA Astrophysics Data System (ADS)
Zhang, Wei; Qiu, Daowen; Mateus, Paulo
2018-06-01
Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.
Roussis, Ioannis M; Guille, Matthew; Myers, Fiona A; Scarlett, Garry P
2016-01-01
Techniques for studying RNA-protein interactions have lagged behind those for DNA-protein complexes as a consequence of the complexities associated with working with RNA. Here we present a method for the modification of the existing In Situ Hybridisation-Proximity Ligation Assay (ISH-PLA) protocol to adapt it to the study of RNA regulation (rISH-PLA). As proof of principle we used the well-characterised interaction of the Xenopus laevis Staufen RNA binding protein with Vg1 mRNA, the complex of which co-localises to the vegetal pole of Xenopus oocytes. The applicability of both the Stau1 antibody and the Locked Nucleic Acid probe (LNA) recognising Vg1 mRNA were independently validated by whole-mount Immunohistochemistry and whole-mount in situ hybridisation assays respectively prior to combining them in the rISH-PLA assay. The rISH-PLA assay allows the identification of a given RNA-protein complex at subcellular and single cell resolution, thus avoiding the lack of spatial resolution and sensitivity associated with assaying heterogenous cell populations from which conventional RNA-protein interaction detection techniques suffer. This technique will be particularly usefully for studying the activity of RNA binding proteins (RBPs) in complex mixtures of cells, for example tissue sections or whole embryos.
Khilnani, Jasmin C; Wing, Helen J
2015-10-01
Paenibacillus larvae is the causal agent of the honey bee disease American Foulbrood. Two enhanced protocols that allow the activity of antimicrobial peptides to be tested against P. larvae are presented. Proof of principle experiments demonstrate that the honey bee antimicrobial peptide defensin 1 is active in both assays. Copyright © 2015 Elsevier B.V. All rights reserved.
Analysis of practical backoff protocols for contention resolution with multiple servers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Goldberg, L.A.; MacKenzie, P.D.
Backoff protocols are probably the most widely used protocols for contention resolution in multiple access channels. In this paper, we analyze the stochastic behavior of backoff protocols for contention resolution among a set of clients and servers, each server being a multiple access channel that deals with contention like an Ethernet channel. We use the standard model in which each client generates requests for a given server according to a Bemoulli distribution with a specified mean. The client-server request rate of a system is the maximum over all client-server pairs (i, j) of the sum of all request rates associatedmore » with either client i or server j. Our main result is that any superlinear polynomial backoff protocol is stable for any multiple-server system with a sub-unit client-server request rate. We confirm the practical relevance of our result by demonstrating experimentally that the average waiting time of requests is very small when such a system is run with reasonably few clients and reasonably small request rates such as those that occur in actual ethernets. Our result is the first proof of stability for any backoff protocol for contention resolution with multiple servers. Our result is also the first proof that any weakly acknowledgment based protocol is stable for contention resolution with multiple servers and such high request rates. Two special cases of our result are of interest. Hastad, Leighton and Rogoff have shown that for a single-server system with a sub-unit client-server request rate any modified superlinear polynomial backoff protocol is stable. These modified backoff protocols are similar to standard backoff protocols but require more random bits to implement. The special case of our result in which there is only one server extends the result of Hastad, Leighton and Rogoff to standard (practical) backoff protocols. Finally, our result applies to dynamic routing in optical networks.« less
Security of continuous-variable quantum key distribution against general attacks.
Leverrier, Anthony; García-Patrón, Raúl; Renner, Renato; Cerf, Nicolas J
2013-01-18
We prove the security of Gaussian continuous-variable quantum key distribution with coherent states against arbitrary attacks in the finite-size regime. In contrast to previously known proofs of principle (based on the de Finetti theorem), our result is applicable in the practically relevant finite-size regime. This is achieved using a novel proof approach, which exploits phase-space symmetries of the protocols as well as the postselection technique introduced by Christandl, Koenig, and Renner [Phys. Rev. Lett. 102, 020504 (2009)].
E-novo: an automated workflow for efficient structure-based lead optimization.
Pearce, Bradley C; Langley, David R; Kang, Jia; Huang, Hongwei; Kulkarni, Amit
2009-07-01
An automated E-Novo protocol designed as a structure-based lead optimization tool was prepared through Pipeline Pilot with existing CHARMm components in Discovery Studio. A scaffold core having 3D binding coordinates of interest is generated from a ligand-bound protein structural model. Ligands of interest are generated from the scaffold using an R-group fragmentation/enumeration tool within E-Novo, with their cores aligned. The ligand side chains are conformationally sampled and are subjected to core-constrained protein docking, using a modified CHARMm-based CDOCKER method to generate top poses along with CDOCKER energies. In the final stage of E-Novo, a physics-based binding energy scoring function ranks the top ligand CDOCKER poses using a more accurate Molecular Mechanics-Generalized Born with Surface Area method. Correlation of the calculated ligand binding energies with experimental binding affinities were used to validate protocol performance. Inhibitors of Src tyrosine kinase, CDK2 kinase, beta-secretase, factor Xa, HIV protease, and thrombin were used to test the protocol using published ligand crystal structure data within reasonably defined binding sites. In-house Respiratory Syncytial Virus inhibitor data were used as a more challenging test set using a hand-built binding model. Least squares fits for all data sets suggested reasonable validation of the protocol within the context of observed ligand binding poses. The E-Novo protocol provides a convenient all-in-one structure-based design process for rapid assessment and scoring of lead optimization libraries.
Dong, Feng; Vijayakumar, M; Zhou, Huan-Xiang
2003-07-01
The contributions of electrostatic interactions to the binding stability of barnase and barstar were studied by the Poisson-Boltzmann model with three different protocols: a), the dielectric boundary specified as the van der Waals (vdW) surface of the protein along with a protein dielectric constant (epsilon (p)) of 4; b), the dielectric boundary specified as the molecular (i.e., solvent-exclusion (SE)) surface along with epsilon (p) = 4; and c), "SE + epsilon (p) = 20." The "vdW + epsilon (p) = 4" and "SE + epsilon (p) = 20" protocols predicted an overall electrostatic stabilization whereas the "SE + epsilon (p) = 4" protocol predicted an overall electrostatic destabilization. The "vdW + epsilon (p) = 4" protocol was most consistent with experiment. It quantitatively reproduced the observed effects of 17 mutations neutralizing charged residues lining the binding interface and the measured coupling energies of six charge pairs across the interface and reasonably rationalized the experimental ionic strength and pH dependences of the binding constant. In contrast, the "SE + epsilon (p) = 4" protocol predicted significantly larger coupling energies of charge pairs whereas the "SE + epsilon (p) = 20" protocol did not predict any pH dependence. This study calls for further scrutiny of the different Poisson-Boltzmann protocols and demonstrates potential danger in drawing conclusions on electrostatic contributions based on a particular calculation protocol.
Moore, J A; Nemat-Gorgani, M; Madison, A C; Sandahl, M A; Punnamaraju, S; Eckhardt, A E; Pollack, M G; Vigneault, F; Church, G M; Fair, R B; Horowitz, M A; Griffin, P B
2017-01-01
This paper reports on the use of a digital microfluidic platform to perform multiplex automated genetic engineering (MAGE) cycles on droplets containing Escherichia coli cells. Bioactivated magnetic beads were employed for cell binding, washing, and media exchange in the preparation of electrocompetent cells in the electrowetting-on-dieletric (EWoD) platform. On-cartridge electroporation was used to deliver oligonucleotides into the cells. In addition to the optimization of a magnetic bead-based benchtop protocol for generating and transforming electrocompetent E. coli cells, we report on the implementation of this protocol in a fully automated digital microfluidic platform. Bead-based media exchange and electroporation pulse conditions were optimized on benchtop for transformation frequency to provide initial parameters for microfluidic device trials. Benchtop experiments comparing electrotransformation of free and bead-bound cells are presented. Our results suggest that dielectric shielding intrinsic to bead-bound cells significantly reduces electroporation field exposure efficiency. However, high transformation frequency can be maintained in the presence of magnetic beads through the application of more intense electroporation pulses. As a proof of concept, MAGE cycles were successfully performed on a commercial EWoD cartridge using variations of the optimal magnetic bead-based preparation procedure and pulse conditions determined by the benchtop results. Transformation frequencies up to 22% were achieved on benchtop; this frequency was matched within 1% (21%) by MAGE cycles on the microfluidic device. However, typical frequencies on the device remain lower, averaging 9% with a standard deviation of 9%. The presented results demonstrate the potential of digital microfluidics to perform complex and automated genetic engineering protocols.
Moore, J. A.; Nemat-Gorgani, M.; Madison, A. C.; Punnamaraju, S.; Eckhardt, A. E.; Pollack, M. G.; Church, G. M.; Fair, R. B.; Horowitz, M. A.; Griffin, P. B.
2017-01-01
This paper reports on the use of a digital microfluidic platform to perform multiplex automated genetic engineering (MAGE) cycles on droplets containing Escherichia coli cells. Bioactivated magnetic beads were employed for cell binding, washing, and media exchange in the preparation of electrocompetent cells in the electrowetting-on-dieletric (EWoD) platform. On-cartridge electroporation was used to deliver oligonucleotides into the cells. In addition to the optimization of a magnetic bead-based benchtop protocol for generating and transforming electrocompetent E. coli cells, we report on the implementation of this protocol in a fully automated digital microfluidic platform. Bead-based media exchange and electroporation pulse conditions were optimized on benchtop for transformation frequency to provide initial parameters for microfluidic device trials. Benchtop experiments comparing electrotransformation of free and bead-bound cells are presented. Our results suggest that dielectric shielding intrinsic to bead-bound cells significantly reduces electroporation field exposure efficiency. However, high transformation frequency can be maintained in the presence of magnetic beads through the application of more intense electroporation pulses. As a proof of concept, MAGE cycles were successfully performed on a commercial EWoD cartridge using variations of the optimal magnetic bead-based preparation procedure and pulse conditions determined by the benchtop results. Transformation frequencies up to 22% were achieved on benchtop; this frequency was matched within 1% (21%) by MAGE cycles on the microfluidic device. However, typical frequencies on the device remain lower, averaging 9% with a standard deviation of 9%. The presented results demonstrate the potential of digital microfluidics to perform complex and automated genetic engineering protocols. PMID:28191268
Reply to 'Comment on 'Quantum dense key distribution''
DOE Office of Scientific and Technical Information (OSTI.GOV)
Degiovanni, I.P.; Berchera, I. Ruo; Castelletto, S.
2005-01-01
In this Reply we propose a modified security proof of the quantum dense key distribution protocol, detecting also the eavesdropping attack proposed by Wojcik in his Comment [Wojcik, Phys. Rev. A 71, 016301 (2005)].
Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schaffner, Christian
2010-09-15
We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters.more » Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.« less
Tenten-Diepenmaat, Marloes; Dekker, Joost; Steenbergen, Menno; Huybrechts, Elleke; Roorda, Leo D; van Schaardenburg, Dirkjan; Bus, Sicco A; van der Leeden, Marike
2016-03-01
Improving foot orthoses (FOs) in patients with rheumatoid arthritis (RA) by using in-shoe plantar pressure measurements seems promising. The objectives of this study were to evaluate (1) the outcome on plantar pressure distribution of FOs that were adapted using in-shoe plantar pressure measurements according to a protocol and (2) the protocol feasibility. Forty-five RA patients with foot problems were included in this observational proof-of concept study. FOs were custom-made by a podiatrist according to usual care. Regions of Interest (ROIs) for plantar pressure reduction were selected. According to a protocol, usual care FOs were evaluated using in-shoe plantar pressure measurements and, if necessary, adapted. Plantar pressure-time integrals at the ROIs were compared between the following conditions: (1) no-FO versus usual care FO and (2) usual care FO versus adapted FO. Semi-structured interviews were held with patients and podiatrists to evaluate the feasibility of the protocol. Adapted FOs were developed in 70% of the patients. In these patients, usual care FOs showed a mean 9% reduction in pressure-time integral at forefoot ROIs compared to no-FOs (p=0.01). FO adaptation led to an additional mean 3% reduction in pressure-time integral (p=0.05). The protocol was considered feasible by patients. Podiatrists considered the protocol more useful to achieve individual rather than general treatment goals. A final protocol was proposed. Using in-shoe plantar pressure measurements for adapting foot orthoses for patients with RA leads to a small additional plantar pressure reduction in the forefoot. Further research on the clinical relevance of this outcome is required. Copyright © 2016. Published by Elsevier B.V.
Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle
NASA Technical Reports Server (NTRS)
Goodloe, Alwyn E.; Munoz, Cesar A.
2009-01-01
This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.
Tight finite-key analysis for quantum cryptography
Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato
2012-01-01
Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies. PMID:22252558
Tight finite-key analysis for quantum cryptography.
Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato
2012-01-17
Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.
Composable security proof for continuous-variable quantum key distribution with coherent States.
Leverrier, Anthony
2015-02-20
We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the postselection technique then shows the security of the protocol against general attacks, thereby confirming the long-standing conjecture that Gaussian attacks are optimal asymptotically in the composable security framework. We expect that our parameter estimation procedure, which does not rely on any assumption about the quantum state being measured, will find applications elsewhere, for instance, for the reliable quantification of continuous-variable entanglement in finite-size settings.
In Situ Protein Binding Assay Using Fc-Fusion Proteins.
Padmanabhan, Nirmala; Siddiqui, Tabrez J
2017-01-01
This protocol describes an in situ protein-protein interaction assay between tagged recombinant proteins and cell-surface expressed synaptic proteins. The assay is arguably more sensitive than other traditional protein binding assays such as co-immunoprecipitation and pull-downs and provides a visual readout for binding. This assay has been widely used to determine the dissociation constant of binding of trans-synaptic adhesion proteins. The step-wise description in the protocol should facilitate the adoption of this method in other laboratories.
Random Visitor: Defense against Identity Attacks in P2P Networks
NASA Astrophysics Data System (ADS)
Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun
Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.
Scarani, Valerio; Renner, Renato
2008-05-23
We derive a bound for the security of quantum key distribution with finite resources under one-way postprocessing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, unconditional security follows immediately for standard protocols such as Bennett-Brassard 1984 and six-states protocol. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least N approximately 10(5) signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates.
Orain, Arnaud; Laubé, Sylvain
In line with studies that question the conventional dichotomies between "head" and "hand," this article analyzes the emergence of a mixed naval culture, between science and technology, during the French Enlightenment. The case at issue is that of the circuitous development of an anchor proof testing protocol, an important method in the competition for maritime supremacy used at least until the first third of the nineteenth century. The story begins in the dockyard of Brest with a humble boatswain, and continues with the dissemination of his experiments thanks to prominent figures of the Naval Academy of Brest and of the Royal Academy of Sciences of Paris. The article suggests that if the findings of the latter were rather inconclusive, nevertheless, over time, a collaboration between practitioners and scientists did eventually generate a regular protocol for testing anchors.
NASA Astrophysics Data System (ADS)
Fung, Chi-Hang Fred; Ma, Xiongfeng; Chau, H. F.; Cai, Qing-Yu
2012-03-01
Privacy amplification (PA) is an essential postprocessing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of the final key after its use in one-time pad encryption and prove its security. We prove that the security and the key generation rate are not affected by delaying PA. Delaying PA has two applications: it serves as a tool for significantly simplifying the security proof of QKD with a two-way quantum channel, and also it is useful in QKD networks with trusted relays. To illustrate the power of the delayed PA idea, we use it to prove the security of a qubit-based two-way deterministic QKD protocol which uses four states and four encoding operations.
Protocols Utilizing Constant pH Molecular Dynamics to Compute pH-Dependent Binding Free Energies
2015-01-01
In protein–ligand binding, the electrostatic environments of the two binding partners may vary significantly in bound and unbound states, which may lead to protonation changes upon binding. In cases where ligand binding results in a net uptake or release of protons, the free energy of binding is pH-dependent. Nevertheless, conventional free energy calculations and molecular docking protocols typically do not rigorously account for changes in protonation that may occur upon ligand binding. To address these shortcomings, we present a simple methodology based on Wyman’s binding polynomial formalism to account for the pH dependence of binding free energies and demonstrate its use on cucurbit[7]uril (CB[7]) host–guest systems. Using constant pH molecular dynamics and a reference binding free energy that is taken either from experiment or from thermodynamic integration computations, the pH-dependent binding free energy is determined. This computational protocol accurately captures the large pKa shifts observed experimentally upon CB[7]:guest association and reproduces experimental binding free energies at different levels of pH. We show that incorrect assignment of fixed protonation states in free energy computations can give errors of >2 kcal/mol in these host–guest systems. Use of the methods presented here avoids such errors, thus suggesting their utility in computing proton-linked binding free energies for protein–ligand complexes. PMID:25134690
Dong, Feng; Vijayakumar, M.; Zhou, Huan-Xiang
2003-01-01
The contributions of electrostatic interactions to the binding stability of barnase and barstar were studied by the Poisson-Boltzmann model with three different protocols: a), the dielectric boundary specified as the van der Waals (vdW) surface of the protein along with a protein dielectric constant (ɛp) of 4; b), the dielectric boundary specified as the molecular (i.e., solvent-exclusion (SE)) surface along with ɛp = 4; and c), “SE + ɛp = 20.” The “vdW + ɛp = 4” and “SE + ɛp = 20” protocols predicted an overall electrostatic stabilization whereas the “SE + ɛp = 4” protocol predicted an overall electrostatic destabilization. The “vdW + ɛp = 4” protocol was most consistent with experiment. It quantitatively reproduced the observed effects of 17 mutations neutralizing charged residues lining the binding interface and the measured coupling energies of six charge pairs across the interface and reasonably rationalized the experimental ionic strength and pH dependences of the binding constant. In contrast, the “SE + ɛp = 4” protocol predicted significantly larger coupling energies of charge pairs whereas the “SE + ɛp = 20” protocol did not predict any pH dependence. This study calls for further scrutiny of the different Poisson-Boltzmann protocols and demonstrates potential danger in drawing conclusions on electrostatic contributions based on a particular calculation protocol. PMID:12829463
2008-03-01
Machine [29]. OC4J applications support Java Servlets , Web services, and the following J2EE specific standards: Extensible Markup Language (XML...IMAP Internet Message Access Protocol IP Internet Protocol IT Information Technology xviii J2EE Java Enterprise Environment JSR 168 Java ...LDAP), World Wide Web Distributed Authoring and Versioning (WebDav), Java Specification Request 168 (JSR 168), and Web Services for Remote
Process membership in asynchronous environments
NASA Technical Reports Server (NTRS)
Ricciardi, Aleta M.; Birman, Kenneth P.
1993-01-01
The development of reliable distributed software is simplified by the ability to assume a fail-stop failure model. The emulation of such a model in an asynchronous distributed environment is discussed. The solution proposed, called Strong-GMP, can be supported through a highly efficient protocol, and was implemented as part of a distributed systems software project at Cornell University. The precise definition of the problem, the protocol, correctness proofs, and an analysis of costs are addressed.
He, Qiye; Johnston, Jeff; Zeitlinger, Julia
2014-01-01
Understanding how eukaryotic enhancers are bound and regulated by specific combinations of transcription factors is still a major challenge. To better map transcription factor binding genome-wide at nucleotide resolution in vivo, we have developed a robust ChIP-exo protocol called ChIP experiments with nucleotide resolution through exonuclease, unique barcode and single ligation (ChIP-nexus), which utilizes an efficient DNA self-circularization step during library preparation. Application of ChIP-nexus to four proteins—human TBP and Drosophila NFkB, Twist and Max— demonstrates that it outperforms existing ChIP protocols in resolution and specificity, pinpoints relevant binding sites within enhancers containing multiple binding motifs and allows the analysis of in vivo binding specificities. Notably, we show that Max frequently interacts with DNA sequences next to its motif, and that this binding pattern correlates with local DNA sequence features such as DNA shape. ChIP-nexus will be broadly applicable to studying in vivo transcription factor binding specificity and its relationship to cis-regulatory changes in humans and model organisms. PMID:25751057
2016-02-01
from the tools being used. For example, while Coq proves properties it does not dump an explanation of the proofs in any currently supported form. The...Distribution Unlimited 5 Hotel room locks and card keys use a simple protocol to manage the transition of rooms from one guest to the next. The lock...retains that guest key’s code. A new guest checks in and gets a card with a new current code, and the previous code set to the previous guest’s current
How blockchain-timestamped protocols could improve the trustworthiness of medical science
Irving, Greg; Holden, John
2017-01-01
Trust in scientific research is diminished by evidence that data are being manipulated. Outcome switching, data dredging and selective publication are some of the problems that undermine the integrity of published research. Methods for using blockchain to provide proof of pre-specified endpoints in clinical trial protocols were first reported by Carlisle. We wished to empirically test such an approach using a clinical trial protocol where outcome switching has previously been reported. Here we confirm the use of blockchain as a low cost, independently verifiable method to audit and confirm the reliability of scientific studies. PMID:27239273
How blockchain-timestamped protocols could improve the trustworthiness of medical science.
Irving, Greg; Holden, John
2016-01-01
Trust in scientific research is diminished by evidence that data are being manipulated. Outcome switching, data dredging and selective publication are some of the problems that undermine the integrity of published research. Methods for using blockchain to provide proof of pre-specified endpoints in clinical trial protocols were first reported by Carlisle. We wished to empirically test such an approach using a clinical trial protocol where outcome switching has previously been reported. Here we confirm the use of blockchain as a low cost, independently verifiable method to audit and confirm the reliability of scientific studies.
Unconditional security of a three state quantum key distribution protocol.
Boileau, J-C; Tamaki, K; Batuwantudawe, J; Laflamme, R; Renes, J M
2005-02-04
Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the Bennett-Brassard 1984 and Bennett 1992 protocols that use four and two quantum states, respectively. In 2000, Phoenix et al. proposed a new family of three-state protocols that offers advantages over the previous schemes. Until now, an error rate threshold for security of the symmetric trine spherical code QKD protocol has been shown only for the trivial intercept-resend eavesdropping strategy. In this Letter, we prove the unconditional security of the trine spherical code QKD protocol, demonstrating its security up to a bit error rate of 9.81%. We also discuss how this proof applies to a version of the trine spherical code QKD protocol where the error rate is evaluated from the number of inconclusive events.
A Mutual Authentication Framework for Wireless Medical Sensor Networks.
Srinivas, Jangirala; Mishra, Dheerendra; Mukhopadhyay, Sourav
2017-05-01
Wireless medical sensor networks (WMSN) comprise of distributed sensors, which can sense human physiological signs and monitor the health condition of the patient. It is observed that providing privacy to the patient's data is an important issue and can be challenging. The information passing is done via the public channel in WMSN. Thus, the patient, sensitive information can be obtained by eavesdropping or by unauthorized use of handheld devices which the health professionals use in monitoring the patient. Therefore, there is an essential need of restricting the unauthorized access to the patient's medical information. Hence, the efficient authentication scheme for the healthcare applications is needed to preserve the privacy of the patients' vital signs. To ensure secure and authorized communication in WMSN, we design a symmetric key based authentication protocol for WMSN environment. The proposed protocol uses only computationally efficient operations to achieve lightweight attribute. We analyze the security of the proposed protocol. We use a formal security proof algorithm to show the scheme security against known attacks. We also use the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator to show protocol secure against man-in-the-middle attack and replay attack. Additionally, we adopt an informal analysis to discuss the key attributes of the proposed scheme. From the formal proof of security, we can see that an attacker has a negligible probability of breaking the protocol security. AVISPA simulator also demonstrates the proposed scheme security against active attacks, namely, man-in-the-middle attack and replay attack. Additionally, through the comparison of computational efficiency and security attributes with several recent results, proposed scheme seems to be battered.
Vezzulli, Luigi; Stauder, Monica; Grande, Chiara; Pezzati, Elisabetta; Verheye, Hans M.; Owens, Nicholas J. P.; Pruzzo, Carla
2015-01-01
The Vibrio cholerae N-acetyl glucosamine-binding protein A (GbpA) is a chitin-binding protein involved in V. cholerae attachment to environmental chitin surfaces and human intestinal cells. We previously investigated the distribution and genetic variations of gbpA in a large collection of V. cholerae strains and found that the gene is consistently present and highly conserved in this species. Primers and probe were designed from the gbpA sequence of V. cholerae and a new Taq-based qPCR protocol was developed for diagnostic detection and quantification of the bacterium in environmental and stool samples. In addition, the positions of primers targeting the gbpA gene region were selected to obtain a short amplified fragment of 206 bp and the protocol was optimized for the analysis of formalin-fixed samples, such as historical Continuous Plankton Recorder (CPR) samples. Overall, the method is sensitive (50 gene copies), highly specific for V. cholerae and failed to amplify strains of the closely-related species Vibrio mimicus. The sensitivity of the assay applied to environmental and stool samples spiked with V. cholerae ATCC 39315 was comparable to that of pure cultures and was of 102 genomic units/l for drinking and seawater samples, 101 genomic units/g for sediment and 102 genomic units/g for bivalve and stool samples. The method also performs well when tested on artificially formalin-fixed and degraded genomic samples and was able to amplify V. cholerae DNA in historical CPR samples, the earliest of which date back to August 1966. The detection of V. cholerae in CPR samples collected in cholera endemic areas such as the Benguela Current Large Marine Ecosystem (BCLME) is of particular significance and represents a proof of concept for the possible use of the CPR technology and the developed qPCR assay in cholera studies. PMID:25915771
Vezzulli, Luigi; Stauder, Monica; Grande, Chiara; Pezzati, Elisabetta; Verheye, Hans M; Owens, Nicholas J P; Pruzzo, Carla
2015-01-01
The Vibrio cholerae N-acetyl glucosamine-binding protein A (GbpA) is a chitin-binding protein involved in V. cholerae attachment to environmental chitin surfaces and human intestinal cells. We previously investigated the distribution and genetic variations of gbpA in a large collection of V. cholerae strains and found that the gene is consistently present and highly conserved in this species. Primers and probe were designed from the gbpA sequence of V. cholerae and a new Taq-based qPCR protocol was developed for diagnostic detection and quantification of the bacterium in environmental and stool samples. In addition, the positions of primers targeting the gbpA gene region were selected to obtain a short amplified fragment of 206 bp and the protocol was optimized for the analysis of formalin-fixed samples, such as historical Continuous Plankton Recorder (CPR) samples. Overall, the method is sensitive (50 gene copies), highly specific for V. cholerae and failed to amplify strains of the closely-related species Vibrio mimicus. The sensitivity of the assay applied to environmental and stool samples spiked with V. cholerae ATCC 39315 was comparable to that of pure cultures and was of 102 genomic units/l for drinking and seawater samples, 101 genomic units/g for sediment and 102 genomic units/g for bivalve and stool samples. The method also performs well when tested on artificially formalin-fixed and degraded genomic samples and was able to amplify V. cholerae DNA in historical CPR samples, the earliest of which date back to August 1966. The detection of V. cholerae in CPR samples collected in cholera endemic areas such as the Benguela Current Large Marine Ecosystem (BCLME) is of particular significance and represents a proof of concept for the possible use of the CPR technology and the developed qPCR assay in cholera studies.
Time-domain diffuse optics using bioresorbable fibers: a proof-of-principle study
NASA Astrophysics Data System (ADS)
Di Sieno, Laura; Boetti, Nadia G.; Dalla Mora, Alberto; Pugliese, Diego; Farina, Andrea; Konugolu Venkata Sekar, Sanathana; Ceci-Ginistrelli, Edoardo; Janner, Davide; Pifferi, Antonio; Milanese, Daniel
2017-07-01
We show for the first time the aptness of Calcium Phosphate Glass-based bioresorbable fibers for time-domain diffuse optics using tests described by a standardized protocol and we also present a spectroscopic measurement on a chicken breast.
A New On-Line Diagnosis Protocol for the SPIDER Family of Byzantine Fault Tolerant Architectures
NASA Technical Reports Server (NTRS)
Geser, Alfons; Miner, Paul S.
2004-01-01
This paper presents the formal verification of a new protocol for online distributed diagnosis for the SPIDER family of architectures. An instance of the Scalable Processor-Independent Design for Electromagnetic Resilience (SPIDER) architecture consists of a collection of processing elements communicating over a Reliable Optical Bus (ROBUS). The ROBUS is a specialized fault-tolerant device that guarantees Interactive Consistency, Distributed Diagnosis (Group Membership), and Synchronization in the presence of a bounded number of physical faults. Formal verification of the original SPIDER diagnosis protocol provided a detailed understanding that led to the discovery of a significantly more efficient protocol. The original protocol was adapted from the formally verified protocol used in the MAFT architecture. It required O(N) message exchanges per defendant to correctly diagnose failures in a system with N nodes. The new protocol achieves the same diagnostic fidelity, but only requires O(1) exchanges per defendant. This paper presents this new diagnosis protocol and a formal proof of its correctness using PVS.
Proposal for founding mistrustful quantum cryptography on coin tossing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kent, Adrian; Hewlett-Packard Laboratories, Filton Road, Stoke Gifford, Bristol BS34 8QZ,
2003-07-01
A significant branch of classical cryptography deals with the problems which arise when mistrustful parties need to generate, process, or exchange information. As Kilian showed a while ago, mistrustful classical cryptography can be founded on a single protocol, oblivious transfer, from which general secure multiparty computations can be built. The scope of mistrustful quantum cryptography is limited by no-go theorems, which rule out, inter alia, unconditionally secure quantum protocols for oblivious transfer or general secure two-party computations. These theorems apply even to protocols which take relativistic signaling constraints into account. The best that can be hoped for, in general, aremore » quantum protocols which are computationally secure against quantum attack. Here a method is described for building a classically certified bit commitment, and hence every other mistrustful cryptographic task, from a secure coin-tossing protocol. No security proof is attempted, but reasons are sketched why these protocols might resist quantum computational attack.« less
Strong and uniform convergence in the teleportation simulation of bosonic Gaussian channels
NASA Astrophysics Data System (ADS)
Wilde, Mark M.
2018-06-01
In the literature on the continuous-variable bosonic teleportation protocol due to Braunstein and Kimble [Phys. Rev. Lett. 80, 869 (1998), 10.1103/PhysRevLett.80.869], it is often loosely stated that this protocol converges to a perfect teleportation of an input state in the limit of ideal squeezing and ideal detection, but the exact form of this convergence is typically not clarified. In this paper, I explicitly clarify that the convergence is in the strong sense, and not the uniform sense, and furthermore that the convergence occurs for any input state to the protocol, including the infinite-energy Basel states defined and discussed here. I also prove, in contrast to the above result, that the teleportation simulations of pure-loss, thermal, pure-amplifier, amplifier, and additive-noise channels converge both strongly and uniformly to the original channels, in the limit of ideal squeezing and detection for the simulations. For these channels, I give explicit uniform bounds on the accuracy of their teleportation simulations. I then extend these uniform convergence results to particular multimode bosonic Gaussian channels. These convergence statements have important implications for mathematical proofs that make use of the teleportation simulation of bosonic Gaussian channels, some of which have to do with bounding their nonasymptotic secret-key-agreement capacities. As a by-product of the discussion given here, I confirm the correctness of the proof of such bounds from my joint work with Berta and Tomamichel from [Wilde, Tomamichel, and Berta, IEEE Trans. Inf. Theory 63, 1792 (2017), 10.1109/TIT.2017.2648825]. Furthermore, I show that it is not necessary to invoke the energy-constrained diamond distance in order to confirm the correctness of this proof.
Noisy processing and distillation of private quantum States.
Renes, Joseph M; Smith, Graeme
2007-01-12
We provide a simple security proof for prepare and measure quantum key distribution protocols employing noisy processing and one-way postprocessing of the key. This is achieved by showing that the security of such a protocol is equivalent to that of an associated key distribution protocol in which, instead of the usual maximally entangled states, a more general private state is distilled. In addition to a more general target state, the usual entanglement distillation tools are employed (in particular, Calderbank-Shor-Steane-like codes), with the crucial difference that noisy processing allows some phase errors to be left uncorrected without compromising the privacy of the key.
Collective attacks and unconditional security in continuous variable quantum key distribution.
Grosshans, Frédéric
2005-01-21
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states. These attacks, overlooked in previous security studies, give a finite advantage to the eavesdropper in the experimentally relevant lossy channel, but are not powerful enough to reduce the range of the reverse reconciliation protocols. Secret key rates are given for the ideal case where Bob performs optimal collective measurements, as well as for the realistic cases where he performs homodyne or heterodyne measurements. We also apply the generic security proof of Christiandl et al. to obtain unconditionally secure rates for these protocols.
A mechanized process algebra for verification of device synchronization protocols
NASA Technical Reports Server (NTRS)
Schubert, E. Thomas
1992-01-01
We describe the formalization of a process algebra based on CCS within the Higher Order Logic (HOL) theorem-proving system. The representation of four types of device interactions and a correctness proof of the communication between a microprocessor and MMU is presented.
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
NASA Astrophysics Data System (ADS)
Lee, Adam J.; Winslett, Marianne; Perano, Kenneth J.
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. These theoretical works and proofs of concept have been quite successful from a research perspective, and thus researchers must now begin to address the systems constraints that act as barriers to the deployment of these systems. To this end, we present TrustBuilder2, a fully-configurable and extensible framework for prototyping and evaluating trust negotiation systems. TrustBuilder2 leverages a plug-in based architecture, extensible data type hierarchy, and flexible communication protocol to provide a framework within which numerous trust negotiation protocols and system configurations can be quantitatively analyzed. In this paper, we discuss the design and implementation of TrustBuilder2, study its performance, examine the costs associated with flexible authorization systems, and leverage this knowledge to identify potential topics for future research, as well as a novel method for attacking trust negotiation systems.
Preatoni, E; Cazzola, D; Stokes, K A; England, M; Trewartha, G
2016-12-01
We investigated the effect of a "PreBind" engagement protocol on the biomechanics of contested Rugby Union scrummaging at different playing levels. "PreBind" requires front-row props to take a bind on opposing players prior to the engagement, and to maintain the bind throughout the scrum duration. Twenty-seven teams from five different playing levels performed live scrums under realistic conditions. Video analysis, pressures sensors, and inertial measurement units measured biomechanical outcomes as teams scrummaged following different engagement protocols: the CTPE (referee calls "crouch-touch-pause-engage"), the CTS ("crouch-touch-set"), and the PreBind ("crouch-bind-set") variants. PreBind reduced the set-up distance between the packs (-27%) and the speed at which they came into contact by more than 20%. The peak biomechanical stresses acting on front rows during the engagement phase were decreased in PreBind by 14-25% with respect to CTPE and CTS, without reducing the capability to generate force in the subsequent sustained push. No relevant main effects were recorded for playing level due to within-group variability and there were no interaction effects between playing level and engagement protocol. Pre-binding reduced many mechanical quantities that have been indicated as possible factors for chronic and acute injury, and may lead to safer engagement conditions without affecting subsequent performance. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Performing private database queries in a real-world environment using a quantum protocol.
Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang
2014-06-10
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.
Performing private database queries in a real-world environment using a quantum protocol
Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang
2014-01-01
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. PMID:24913129
Environmental Toxicants and Developmental Disabilities: A Challenge for Psychologists
ERIC Educational Resources Information Center
Koger, Susan M.; Schettler, Ted; Weiss, Bernard
2005-01-01
Developmental, learning, and behavioral disabilities are a significant public health problem. Environmental chemicals can interfere with brain development during critical periods, thereby impacting sensory, motor, and cognitive function. Because regulation in the United States is based on limited testing protocols and essentially requires proof of…
DOT National Transportation Integrated Search
1993-04-14
In 2005, the US Department of Transportation (DOT) initiated a program to develop and test a 5.9GHzbased Vehicle Infrastructure Integration (VII) proof of concept (POC). The POC was implemented in the northwest suburbs of Detroit, Michigan. This r...
Device independence for two-party cryptography and position verification with memoryless devices
NASA Astrophysics Data System (ADS)
Ribeiro, Jérémy; Thinh, Le Phuc; Kaniewski, Jedrzej; Helsen, Jonas; Wehner, Stephanie
2018-06-01
Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we improve the device-independent security proofs of Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004] for two-party cryptography (with memoryless devices) and we add a security proof for device-independent position verification (also memoryless devices) under different physical constraints on the adversary. We assess the quality of the devices by observing a Bell violation, and, as for Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004], security can be attained for any violation of the Clauser-Holt-Shimony-Horne inequality.
Evans, Zachary P; Renne, Walter G; Bacro, Thierry R; Mennito, Anthony S; Ludlow, Mark E; Lecholop, Michael K
2018-02-01
Existing root-analog dental implant systems have no standardized protocols regarding retentive design, surface manipulation, or prosthetic attachment design relative to the site's unique anatomy. Historically, existing systems made those design choices arbitrarily. For this report, strategies were developed that deliberately reference the adjacent anatomy, implant and restorable path of draw, and bone density for implant and retentive design. For proof of concept, dentate arches from human cadavers were scanned using cone-beam computed tomography and then digitally modeled. Teeth of interest were virtually extracted and manipulated via computer-aided design to generate root-analog implants from zirconium. We created a stepwise protocol for analyzing and developing the implant sites, implant design and retention, and prosthetic emergence and connection all from the pre-op cone-beam data. Root-analog implants were placed at the time of extraction and examined radiographically and mechanically concerning ideal fit and stability. This study provides proof of concept that retentive root-analog implants can be produced from cone-beam data while improving fit, retention, safety, esthetics, and restorability when compared to the existing protocols. These advancements may provide the critical steps necessary for clinical relevance and success of immediately placed root-analog implants. Additional studies are necessary to validate the model prior to clinical trial.
On Anaphora and the Binding Principles in Categorial Grammar
NASA Astrophysics Data System (ADS)
Morrill, Glyn; Valentín, Oriol
In type logical categorial grammar the analysis of an expression is a resource-conscious proof. Anaphora represents a particular challenge to this approach in that the antecedent resource is multiplied in the semantics. This duplication, which corresponds logically to the structural rule of contraction, may be treated lexically or syntactically. Furthermore, anaphora is subject to constraints, which Chomsky (1981) formulated as Binding Principles A, B, and C. In this paper we consider English anaphora in categorial grammar including reference to the binding principles. We invoke displacement calculus, modal categorial calculus, categorial calculus with limited contraction, and entertain addition of negation as failure.
Label-free optical biosensors based on aptamer-functionalized porous silicon scaffolds.
Urmann, Katharina; Walter, Johanna-Gabriela; Scheper, Thomas; Segal, Ester
2015-02-03
A proof-of-concept for a label-free and reagentless optical biosensing platform based on nanostructured porous silicon (PSi) and aptamers is presented in this work. Aptamers are oligonucleotides (single-stranded DNA or RNA) that can bind their targets with high affinity and specificity, making them excellent recognition elements for biosensor design. Here we describe the fabrication and characterization of aptamer-conjugated PSi biosensors, where a previously characterized his-tag binding aptamer (6H7) is used as model system. Exposure of the aptamer-functionalized PSi to the target proteins as well as to complex fluids (i.e., bacteria lysates containing target proteins) results in robust and well-defined changes in the PSi optical interference spectrum, ascribed to specific aptamer-protein binding events occurring within the nanoscale pores, monitored in real time. The biosensors show exceptional stability and can be easily regenerated by a short rinsing step for multiple biosensing analyses. This proof-of-concept study demonstrates the possibility of designing highly stable and specific label-free optical PSi biosensors, employing aptamers as capture probes, holding immense potential for application in detection of a broad range of targets, in a simple yet reliable manner.
Electronic Voting Protocol Using Identity-Based Cryptography.
Gallegos-Garcia, Gina; Tapia-Recillas, Horacio
2015-01-01
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.
Electronic Voting Protocol Using Identity-Based Cryptography
Gallegos-Garcia, Gina; Tapia-Recillas, Horacio
2015-01-01
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515
Guess, Adam J; Daneault, Beth; Wang, Rongzhang; Bradbury, Hillary; La Perle, Krista M D; Fitch, James; Hedrick, Sheri L; Hamelberg, Elizabeth; Astbury, Caroline; White, Peter; Overolt, Kathleen; Rangarajan, Hemalatha; Abu-Arja, Rolla; Devine, Steven M; Otsuru, Satoru; Dominici, Massimo; O'Donnell, Lynn; Horwitz, Edwin M
2017-10-01
Mesenchymal stem/stromal cells (MSCs) are widely studied by both academia and industry for a broad array of clinical indications. The collective body of data provides compelling evidence of the clinical safety of MSC therapy. However, generally accepted proof of therapeutic efficacy has not yet been reported. In an effort to generate a more effective therapeutic cell product, investigators are focused on modifying MSC processing protocols to enhance the intrinsic biologic activity. Here, we report a Good Manufacturing Practice-compliant two-step MSC manufacturing protocol to generate MSCs or interferon γ (IFNγ) primed MSCs which allows freshly expanded cells to be infused in patients on a predetermined schedule. This protocol eliminates the need to infuse cryopreserved, just thawed cells which may reduce the immune modulatory activity. Moreover, using (IFNγ) as a prototypic cytokine, we demonstrate the feasibility of priming the cells with any biologic agent. We then characterized MSCs and IFNγ primed MSCs prepared with our protocol, by karyotype, in vitro potential for malignant transformation, biodistribution, effect on engraftment of transplanted hematopoietic cells, and in vivo toxicity in immune deficient mice including a complete post-mortem examination. We found no evidence of toxicity attributable to the MSC or IFNγ primed MSCs. Our data suggest that the clinical risk of infusing MSCs or IFNγ primed MSCs produced by our two-step protocol is not greater than MSCs currently in practice. While actual proof of safety requires phase I clinical trials, our data support the use of either cell product in new clinical studies. Stem Cells Translational Medicine 2017;6:1868-1879. © 2017 The Authors Stem Cells Translational Medicine published by Wiley Periodicals, Inc. on behalf of AlphaMed Press.
Ji, Jin; Yang, Jiun-Chan; Larson, Dale N.
2009-01-01
We demonstrate using nanohole arrays of mixed designs and a microwriting process based on dip-pen nanolithography to monitor multiple, different protein binding events simultaneously in real time based on the intensity of Extraordinary Optical Transmission of nanohole arrays. The microwriting process and small footprint of the individual nanohole arrays enabled us to observe different binding events located only 16μm apart, achieving high spatial resolution. We also present a novel concept that incorporates nanohole arrays of different designs to improve confidence and accuracy of binding studies. For proof of concept, two types of nanohole arrays, designed to exhibit opposite responses to protein bindings, were fabricated on one transducer. Initial studies indicate that the mixed designs could help to screen out artifacts such as protein intrinsic signals, providing improved accuracy of binding interpretation. PMID:19297143
Spotting and designing promiscuous ligands for drug discovery.
Schneider, P; Röthlisberger, M; Reker, D; Schneider, G
2016-01-21
The promiscuous binding behavior of bioactive compounds forms a mechanistic basis for understanding polypharmacological drug action. We present the development and prospective application of a computational tool for identifying potential promiscuous drug-like ligands. In combination with computational target prediction methods, the approach provides a working concept for rationally designing such molecular structures. We could confirm the multi-target binding of a de novo generated compound in a proof-of-concept study relying on the new method.
A new class of finite-time nonlinear consensus protocols for multi-agent systems
NASA Astrophysics Data System (ADS)
Zuo, Zongyu; Tie, Lin
2014-02-01
This paper is devoted to investigating the finite-time consensus problem for a multi-agent system in networks with undirected topology. A new class of global continuous time-invariant consensus protocols is constructed for each single-integrator agent dynamics with the aid of Lyapunov functions. In particular, it is shown that the settling time of the proposed new class of finite-time consensus protocols is upper bounded for arbitrary initial conditions. This makes it possible for network consensus problems that the convergence time is designed and estimated offline for a given undirected information flow and a group volume of agents. Finally, a numerical simulation example is presented as a proof of concept.
Security of Distributed-Phase-Reference Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Moroder, Tobias; Curty, Marcos; Lim, Charles Ci Wen; Thinh, Le Phuc; Zbinden, Hugo; Gisin, Nicolas
2012-12-01
Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. For many years, a full security proof of these schemes in a realistic setting has been elusive. We solve this long-standing problem and present a generic method to prove the security of such protocols against general attacks. To illustrate our result, we provide lower bounds on the key generation rate of a variant of the coherent-one-way quantum key distribution protocol. In contrast to standard predictions, it appears to scale quadratically with the system transmittance.
Gonçalves, Larissa M; Chaimovich, Hernan; Cuccovia, Iolanda M; Marana, Sandro R
2014-05-01
Phosphatases for organophosphate degradation and carbohydrate-binding domains (CBMs) have potential biotechnological applications. As a proof-of-concept, a soluble chimeric protein that combines acid phosphatase (AppA) from Escherichia coli and a CBM from Xanthomonas axonopodis pv. citri (AppA-CBM) was produced in E.coli. AppACBM adsorbed in microcrystalline cellulose Avicel PH101 catalyzed the hydrolysis of p-nitrophenyl phosphate (PNPP). The binding to microcrystalline cellulose displayed saturation behavior with an apparent binding constant (Kb) of 22 ± 5 mg and a maximum binding (Bmax) of 1.500 ± 0.001 enzyme units. Binding was highest at pH 2.5 and decreased above pH 6.5, as previously observed for family 2 CBMs. The Km values for PNPP of AppA-CBM and native AppA were identical (2.7 mM). To demonstrate that this strategy for protein engineering has practical applications and is largely functional, even for phosphatases exhibiting diverse folds, a chimeric protein combining human paraoxonase 1 (hPON1) and the CBM was produced. Both PON1-CBM and hPON1 had identical Km values for paraoxon (1.3 mM). Additionally, hPON1 bound to microcrystalline cellulose with a Kb of 27 ± 3 mg, the same as that observed for AppA-CBM. These data show that the phosphatase domains are as functional in both of the chimeric proteins as they are in the native enzymes and that the CBM domain maintains the same cellulose affinity. Therefore, the engineering of chimeric proteins combining domains of phosphatases and CBMs is fully feasible, resulting in chimeric enzymes that exhibit potential for OP detoxification.
An RFID solution for enhancing inpatient medication safety with real-time verifiable grouping-proof.
Chen, Yu-Yi; Tsai, Meng-Lin
2014-01-01
The occurrence of a medication error can threaten patient safety. The medication administration process is complex and cumbersome, and nursing staffs are prone to error when they are tired. Proper Information Technology (IT) can assist the nurse in correct medication administration. We review a recent proposal regarding a leading-edge solution to enhance inpatient medication safety by using RFID technology. The proof mechanism is the kernel concept in their design and worth studying to develop a well-designed grouping-proof scheme. Other RFID grouping-proof protocols could be similarly applied in administering physician orders. We improve on the weaknesses of previous works and develop a reading-order independent RFID grouping-proof scheme in this paper. In our scheme, tags are queried and verified under the direct control of the authorized reader without connecting to the back-end database server. Immediate verification in our design makes this application more portable and efficient and critical security issues have been analyzed by the threat model. Our scheme is suitable for the safe drug administration scenario and the drug package scenario in a hospital environment to enhance inpatient medication safety. It automatically checks for correct drug unit-dose and appropriate inpatient treatments. Copyright © 2013. Published by Elsevier Ireland Ltd.
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.
Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675
Blockchain protocols in clinical trials: Transparency and traceability of consent.
Benchoufi, Mehdi; Porcher, Raphael; Ravaud, Philippe
2017-01-01
Clinical trial consent for protocols and their revisions should be transparent for patients and traceable for stakeholders. Our goal is to implement a process allowing for collection of patients' informed consent, which is bound to protocol revisions, storing and tracking the consent in a secure, unfalsifiable and publicly verifiable way, and enabling the sharing of this information in real time. For that, we build a consent workflow using a trending technology called Blockchain. This is a distributed technology that brings a built-in layer of transparency and traceability. From a more general and prospective point of view, we believe Blockchain technology brings a paradigmatical shift to the entire clinical research field. We designed a Proof-of-Concept protocol consisting of time-stamping each step of the patient's consent collection using Blockchain, thus archiving and historicising the consent through cryptographic validation in a securely unfalsifiable and transparent way. For each protocol revision, consent was sought again. We obtained a single document, in an open format, that accounted for the whole consent collection process: a time-stamped consent status regarding each version of the protocol. This document cannot be corrupted and can be checked on any dedicated public website. It should be considered a robust proof of data. However, in a live clinical trial, the authentication system should be strengthened to remove the need for third parties, here trial stakeholders, and give participative control to the peer users. In the future, the complex data flow of a clinical trial could be tracked by using Blockchain, which core functionality, named Smart Contract, could help prevent clinical trial events not occurring in the correct chronological order, for example including patients before they consented or analysing case report form data before freezing the database. Globally, Blockchain could help with reliability, security, transparency and could be a consistent step toward reproducibility.
Blockchain protocols in clinical trials: Transparency and traceability of consent
Benchoufi, Mehdi; Porcher, Raphael; Ravaud, Philippe
2018-01-01
Clinical trial consent for protocols and their revisions should be transparent for patients and traceable for stakeholders. Our goal is to implement a process allowing for collection of patients’ informed consent, which is bound to protocol revisions, storing and tracking the consent in a secure, unfalsifiable and publicly verifiable way, and enabling the sharing of this information in real time. For that, we build a consent workflow using a trending technology called Blockchain. This is a distributed technology that brings a built-in layer of transparency and traceability. From a more general and prospective point of view, we believe Blockchain technology brings a paradigmatical shift to the entire clinical research field. We designed a Proof-of-Concept protocol consisting of time-stamping each step of the patient’s consent collection using Blockchain, thus archiving and historicising the consent through cryptographic validation in a securely unfalsifiable and transparent way. For each protocol revision, consent was sought again. We obtained a single document, in an open format, that accounted for the whole consent collection process: a time-stamped consent status regarding each version of the protocol. This document cannot be corrupted and can be checked on any dedicated public website. It should be considered a robust proof of data. However, in a live clinical trial, the authentication system should be strengthened to remove the need for third parties, here trial stakeholders, and give participative control to the peer users. In the future, the complex data flow of a clinical trial could be tracked by using Blockchain, which core functionality, named Smart Contract, could help prevent clinical trial events not occurring in the correct chronological order, for example including patients before they consented or analysing case report form data before freezing the database. Globally, Blockchain could help with reliability, security, transparency and could be a consistent step toward reproducibility. PMID:29167732
Symmetrically private information retrieval based on blind quantum computing
NASA Astrophysics Data System (ADS)
Sun, Zhiwei; Yu, Jianping; Wang, Ping; Xu, Lingling
2015-05-01
Universal blind quantum computation (UBQC) is a new secure quantum computing protocol which allows a user Alice who does not have any sophisticated quantum technology to delegate her computing to a server Bob without leaking any privacy. Using the features of UBQC, we propose a protocol to achieve symmetrically private information retrieval, which allows a quantum limited Alice to query an item from Bob with a fully fledged quantum computer; meanwhile, the privacy of both parties is preserved. The security of our protocol is based on the assumption that malicious Alice has no quantum computer, which avoids the impossibility proof of Lo. For the honest Alice, she is almost classical and only requires minimal quantum resources to carry out the proposed protocol. Therefore, she does not need any expensive laboratory which can maintain the coherence of complicated quantum experimental setups.
Simões, Inês C M; Costa, Inês P D; Coimbra, João T S; Ramos, Maria J; Fernandes, Pedro A
2017-01-23
Knowing how proteins make stable complexes enables the development of inhibitors to preclude protein-protein (P:P) binding. The identification of the specific interfacial residues that mostly contribute to protein binding, denominated as hot spots, is thus critical. Here, we refine an in silico alanine scanning mutagenesis protocol, based on a residue-dependent dielectric constant version of the Molecular Mechanics/Poisson-Boltzmann Surface Area method. We have used a large data set of structurally diverse P:P complexes to redefine the residue-dependent dielectric constants used in the determination of binding free energies. The accuracy of the method was validated through comparison with experimental data, considering the per-residue P:P binding free energy (ΔΔG binding ) differences upon alanine mutation. Different protocols were tested, i.e., a geometry optimization protocol and three molecular dynamics (MD) protocols: (1) one using explicit water molecules, (2) another with an implicit solvation model, and (3) a third where we have carried out an accelerated MD with explicit water molecules. Using a set of protein dielectric constants (within the range from 1 to 20) we showed that the dielectric constants of 7 for nonpolar and polar residues and 11 for charged residues (and histidine) provide optimal ΔΔG binding predictions. An overall mean unsigned error (MUE) of 1.4 kcal mol -1 relative to the experiment was achieved in 210 mutations only with geometry optimization, which was further reduced with MD simulations (MUE of 1.1 kcal mol -1 for the MD employing explicit solvent). This recalibrated method allows for a better computational identification of hot spots, avoiding expensive and time-consuming experiments or thermodynamic integration/ free energy perturbation/ uBAR calculations, and will hopefully help new drug discovery campaigns in their quest of searching spots of interest for binding small drug-like molecules at P:P interfaces.
RosettaScripts: a scripting language interface to the Rosetta macromolecular modeling suite.
Fleishman, Sarel J; Leaver-Fay, Andrew; Corn, Jacob E; Strauch, Eva-Maria; Khare, Sagar D; Koga, Nobuyasu; Ashworth, Justin; Murphy, Paul; Richter, Florian; Lemmon, Gordon; Meiler, Jens; Baker, David
2011-01-01
Macromolecular modeling and design are increasingly useful in basic research, biotechnology, and teaching. However, the absence of a user-friendly modeling framework that provides access to a wide range of modeling capabilities is hampering the wider adoption of computational methods by non-experts. RosettaScripts is an XML-like language for specifying modeling tasks in the Rosetta framework. RosettaScripts provides access to protocol-level functionalities, such as rigid-body docking and sequence redesign, and allows fast testing and deployment of complex protocols without need for modifying or recompiling the underlying C++ code. We illustrate these capabilities with RosettaScripts protocols for the stabilization of proteins, the generation of computationally constrained libraries for experimental selection of higher-affinity binding proteins, loop remodeling, small-molecule ligand docking, design of ligand-binding proteins, and specificity redesign in DNA-binding proteins.
Cut-and-paste restoration of entanglement transmission
NASA Astrophysics Data System (ADS)
Cuevas, Álvaro; Mari, Andrea; De Pasquale, Antonella; Orieux, Adeline; Massaro, Marcello; Sciarrino, Fabio; Mataloni, Paolo; Giovannetti, Vittorio
2017-07-01
The distribution of entangled quantum systems among two or more nodes of a network is a key task at the basis of quantum communication, quantum computation, and quantum cryptography. Unfortunately, the transmission lines used in this procedure can introduce so many perturbations and so much noise in the transmitted signal that they prevent the possibility of restoring quantum correlations in the received messages either by means of encoding optimization or by exploiting local operations and classical communication. In this work we present a procedure which allows one to improve the performance of some of these channels. The mechanism underpinning this result is a protocol which we dub cut and paste, as it consists in extracting and reshuffling the subcomponents of these communication lines, which finally succeed in correcting each other. The proof of this counterintuitive phenomenon, while improving our theoretical understanding of quantum entanglement, also has a direct application in the realization of quantum information networks based on imperfect and highly noisy communication lines. A quantum optics experiment, based on the transmission of single-photon polarization states, is also presented which provides a proof-of-principle test of the proposed protocol.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho
2014-01-01
While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.
Novel immunotherapy vaccine development.
Jutel, Marek; Akdis, Cezmi A
2014-12-01
Allergen-specific immunotherapy is the only curative treatment for allergic diseases. In spite of the great progress in both vaccine development and the methods of allergen immunotherapy (AIT) in recent years, several key problems related to limited efficacy, side-effects, low patient adherence and the relatively high costs due to the long duration (3-5 years) remain to be solved. The current approaches aiming at optimization of AIT are reviewed, including both conceptual studies in experimental models and proof-of-concept - as well as large, multicenter clinical studies. The most promising approaches to improve efficacy and safety of vaccine-based AIT include bypassing IgE binding and targeting allergen-specific T cells using hypoallergenic recombinant allergen derivatives and immunogenic peptides, the use of new adjuvants and stimulators of the innate immune response, the fusion of allergens to immune modifiers and peptide carrier proteins and new routes of vaccine administration. The cloning of allergen proteins and genetic engineering enabled the production of vaccines that have well defined molecular, immunologic and biologic characteristics as well as modified molecular structure. These new compounds along with new immunization protocols can bring us closer to the ultimate goal of AIT, that is, complete cure of a large number of allergic patients.
Huet, Maxime; Cubizolles, Myriam; Buhot, Arnaud
2017-07-15
The process of agglutination is commonly used for the detection of biomarkers like proteins or viruses. The multiple bindings between micrometer sized particles, either latex beads or red blood cells (RBCs), create aggregates that are easily detectable and give qualitative information about the presence of the biomarkers. In most cases, the detection is made by simple naked-eye observation of agglutinates without any access to the kinetics of agglutination. In this study, we address the development of a real-time time observation of RBCs agglutination. Using ABO blood typing as a proof-of-concept, we developed i) an integrated biological protocol suitable for further use as point-of-care (POC) analysis and ii) two dedicated image processing algorithms for the real-time and quantitative measurement of agglutination. Anti-A or anti-B typing reagents were dried inside the microchannel of a passive microfluidic chip designed to enhance capillary flow. A blood drop deposit at the tip of the biochip established a simple biological protocol. In situ agglutination of autologous RBCs was achieved by means of embedded reagents and real time agglutination process was monitored by video recording. Using a training set of 24 experiments, two real-time indicators based on correlation and variance of gray levels were optimized and then further confirmed on a validation set. 100% correct discrimination between positive and negative agglutinations was performed within less than 2min by measuring real-time evolution of both correlation and variance indicators. Copyright © 2016 Elsevier B.V. All rights reserved.
Turatsinze, Jean-Valery; Thomas-Chollier, Morgane; Defrance, Matthieu; van Helden, Jacques
2008-01-01
This protocol shows how to detect putative cis-regulatory elements and regions enriched in such elements with the regulatory sequence analysis tools (RSAT) web server (http://rsat.ulb.ac.be/rsat/). The approach applies to known transcription factors, whose binding specificity is represented by position-specific scoring matrices, using the program matrix-scan. The detection of individual binding sites is known to return many false predictions. However, results can be strongly improved by estimating P value, and by searching for combinations of sites (homotypic and heterotypic models). We illustrate the detection of sites and enriched regions with a study case, the upstream sequence of the Drosophila melanogaster gene even-skipped. This protocol is also tested on random control sequences to evaluate the reliability of the predictions. Each task requires a few minutes of computation time on the server. The complete protocol can be executed in about one hour.
Rosset-Llobet, Jaume; Fàbregas-Molas, Sílvia; Pascual-Leone, Alvaro
2014-03-01
Sensory-motor returning (SMR) can help the symptoms of task-specific focal hand dystonia. However, effects vary across patients and take many sessions. Here, we present proof of principle evidence that transcranial direct current stimulation (tDCS) can enhance these effects. We compared the effects of a combined tDCS-SMR protocol (n=4 patients) with the efficacy of SMR alone (n=30 patients). All 4 patients treated with the combined protocol showed greater improvement than those undergoing SMR alone. Results encourage a larger, parallel-group clinical trial with sham tDCS control.
Efficient entanglement distillation without quantum memory.
Abdelkhalek, Daniela; Syllwasschy, Mareike; Cerf, Nicolas J; Fiurášek, Jaromír; Schnabel, Roman
2016-05-31
Entanglement distribution between distant parties is an essential component to most quantum communication protocols. Unfortunately, decoherence effects such as phase noise in optical fibres are known to demolish entanglement. Iterative (multistep) entanglement distillation protocols have long been proposed to overcome decoherence, but their probabilistic nature makes them inefficient since the success probability decays exponentially with the number of steps. Quantum memories have been contemplated to make entanglement distillation practical, but suitable quantum memories are not realised to date. Here, we present the theory for an efficient iterative entanglement distillation protocol without quantum memories and provide a proof-of-principle experimental demonstration. The scheme is applied to phase-diffused two-mode-squeezed states and proven to distil entanglement for up to three iteration steps. The data are indistinguishable from those that an efficient scheme using quantum memories would produce. Since our protocol includes the final measurement it is particularly promising for enhancing continuous-variable quantum key distribution.
Efficient entanglement distillation without quantum memory
Abdelkhalek, Daniela; Syllwasschy, Mareike; Cerf, Nicolas J.; Fiurášek, Jaromír; Schnabel, Roman
2016-01-01
Entanglement distribution between distant parties is an essential component to most quantum communication protocols. Unfortunately, decoherence effects such as phase noise in optical fibres are known to demolish entanglement. Iterative (multistep) entanglement distillation protocols have long been proposed to overcome decoherence, but their probabilistic nature makes them inefficient since the success probability decays exponentially with the number of steps. Quantum memories have been contemplated to make entanglement distillation practical, but suitable quantum memories are not realised to date. Here, we present the theory for an efficient iterative entanglement distillation protocol without quantum memories and provide a proof-of-principle experimental demonstration. The scheme is applied to phase-diffused two-mode-squeezed states and proven to distil entanglement for up to three iteration steps. The data are indistinguishable from those that an efficient scheme using quantum memories would produce. Since our protocol includes the final measurement it is particularly promising for enhancing continuous-variable quantum key distribution. PMID:27241946
A Comparison of Single-Cycle Versus Multiple-Cycle Proof Testing Strategies
NASA Technical Reports Server (NTRS)
McClung, R. C.; Chell, G. G.; Millwater, H. R.; Russell, D. A.; Millwater, H. R.
1999-01-01
Single-cycle and multiple-cycle proof testing (SCPT and MCPT) strategies for reusable aerospace propulsion system components are critically evaluated and compared from a rigorous elastic-plastic fracture mechanics perspective. Earlier MCPT studies are briefly reviewed. New J-integral estimation methods for semielliptical surface cracks and cracks at notches are derived and validated. Engineering methods are developed to characterize crack growth rates during elastic-plastic fatigue crack growth (FCG) and the tear-fatigue interaction near instability. Surface crack growth experiments are conducted with Inconel 718 to characterize tearing resistance, FCG under small-scale yielding and elastic-plastic conditions, and crack growth during simulated MCPT. Fractography and acoustic emission studies provide additional insight. The relative merits of SCPT and MCPT are directly compared using a probabilistic analysis linked with an elastic-plastic crack growth computer code. The conditional probability of failure in service is computed for a population of components that have survived a previous proof test, based on an assumed distribution of initial crack depths. Parameter studies investigate the influence of proof factor, tearing resistance, crack shape, initial crack depth distribution, and notches on the MCPT versus SCPT comparison. The parameter studies provide a rational basis to formulate conclusions about the relative advantages and disadvantages of SCPT and MCPT. Practical engineering guidelines are proposed to help select the optimum proof test protocol in a given application.
A Comparison of Single-Cycle Versus Multiple-Cycle Proof Testing Strategies
NASA Technical Reports Server (NTRS)
McClung, R. C.; Chell, G. G.; Millwater, H. R.; Russell, D. A.; Orient, G. E.
1996-01-01
Single-cycle and multiple-cycle proof testing (SCPT and MCPT) strategies for reusable aerospace propulsion system components are critically evaluated and compared from a rigorous elastic-plastic fracture mechanics perspective. Earlier MCPT studies are briefly reviewed. New J-integral estimation methods for semi-elliptical surface cracks and cracks at notches are derived and validated. Engineering methods are developed to characterize crack growth rates during elastic-plastic fatigue crack growth (FCG) and the tear-fatigue interaction near instability. Surface crack growth experiments are conducted with Inconel 718 to characterize tearing resistance, FCG under small-scale yielding and elastic-plastic conditions, and crack growth during simulated MCPT. Fractography and acoustic emission studies provide additional insight. The relative merits of SCPT and MCPT are directly compared using a probabilistic analysis linked with an elastic-plastic crack growth computer code. The conditional probability of failure in service is computed for a population of components that have survived a previous proof test, based on an assumed distribution of initial crack depths. Parameter studies investigate the influence of proof factor, tearing resistance, crack shape, initial crack depth distribution, and notches on the MCPT vs. SCPT comparison. The parameter studies provide a rational basis to formulate conclusions about the relative advantages and disadvantages of SCPT and MCPT. Practical engineering guidelines are proposed to help select the optimum proof test protocol in a given application.
Moretti, Rocco; Lyskov, Sergey; Das, Rhiju; Meiler, Jens; Gray, Jeffrey J
2018-01-01
The Rosetta molecular modeling software package provides a large number of experimentally validated tools for modeling and designing proteins, nucleic acids, and other biopolymers, with new protocols being added continually. While freely available to academic users, external usage is limited by the need for expertise in the Unix command line environment. To make Rosetta protocols available to a wider audience, we previously created a web server called Rosetta Online Server that Includes Everyone (ROSIE), which provides a common environment for hosting web-accessible Rosetta protocols. Here we describe a simplification of the ROSIE protocol specification format, one that permits easier implementation of Rosetta protocols. Whereas the previous format required creating multiple separate files in different locations, the new format allows specification of the protocol in a single file. This new, simplified protocol specification has more than doubled the number of Rosetta protocols available under ROSIE. These new applications include pK a determination, lipid accessibility calculation, ribonucleic acid redesign, protein-protein docking, protein-small molecule docking, symmetric docking, antibody docking, cyclic toxin docking, critical binding peptide determination, and mapping small molecule binding sites. ROSIE is freely available to academic users at http://rosie.rosettacommons.org. © 2017 The Protein Society.
2010-07-12
Germany, 1999. [8] L. Babai, L. Fortnow, L. A. Levin, and M. Szegedy. Checking Computations in Polylogarithmic Time. In STOC, 1991. [9] A. Ben- David ...their work. J. ACM, 42(1):269–291, 1995. [12] D. Chaum , C. Crépeau, and I. Damgard. Multiparty unconditionally secure protocols. In STOC, 1988. [13
Justifying and Proving in the Cabri Environment.
ERIC Educational Resources Information Center
Mariotti, Maria Alessandra
2001-01-01
Describes a long term teaching experiment carried out with students from grades 9 and 10. Aims at clarifying the role of the Cabri environment in teaching-learning processes. Analysis of protocols shows the possible evolution of a justification into a proof but at the same time indicates that this evolution is not expected to be simple and…
Binding free energy prediction in strongly hydrophobic biomolecular systems.
Charlier, Landry; Nespoulous, Claude; Fiorucci, Sébastien; Antonczak, Serge; Golebiowski, Jérome
2007-11-21
We present a comparison of various computational approaches aiming at predicting the binding free energy in ligand-protein systems where the ligand is located within a highly hydrophobic cavity. The relative binding free energy between similar ligands is obtained by means of the thermodynamic integration (TI) method and compared to experimental data obtained through isothermal titration calorimetry measurements. The absolute free energy of binding prediction was obtained on a similar system (a pyrazine derivative bound to a lipocalin) by TI, potential of mean force (PMF) and also by means of the MMPBSA protocols. Although the TI protocol performs poorly either with an explicit or an implicit solvation scheme, the PMF calculation using an implicit solvation scheme leads to encouraging results, with a prediction of the binding affinity being 2 kcal mol(-1) lower than the experimental value. The use of an implicit solvation scheme appears to be well suited for the study of such hydrophobic systems, due to the lack of water molecules within the binding site.
Lawrenz, Morgan; Baron, Riccardo; Wang, Yi; McCammon, J Andrew
2012-01-01
The Independent-Trajectory Thermodynamic Integration (IT-TI) approach for free energy calculation with distributed computing is described. IT-TI utilizes diverse conformational sampling obtained from multiple, independent simulations to obtain more reliable free energy estimates compared to single TI predictions. The latter may significantly under- or over-estimate the binding free energy due to finite sampling. We exemplify the advantages of the IT-TI approach using two distinct cases of protein-ligand binding. In both cases, IT-TI yields distributions of absolute binding free energy estimates that are remarkably centered on the target experimental values. Alternative protocols for the practical and general application of IT-TI calculations are investigated. We highlight a protocol that maximizes predictive power and computational efficiency.
Password-only authenticated three-party key exchange with provable security in the standard model.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.
A Byzantine-Fault Tolerant Self-Stabilizing Protocol for Distributed Clock Synchronization Systems
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2006-01-01
Embedded distributed systems have become an integral part of safety-critical computing applications, necessitating system designs that incorporate fault tolerant clock synchronization in order to achieve ultra-reliable assurance levels. Many efficient clock synchronization protocols do not, however, address Byzantine failures, and most protocols that do tolerate Byzantine failures do not self-stabilize. Of the Byzantine self-stabilizing clock synchronization algorithms that exist in the literature, they are based on either unjustifiably strong assumptions about initial synchrony of the nodes or on the existence of a common pulse at the nodes. The Byzantine self-stabilizing clock synchronization protocol presented here does not rely on any assumptions about the initial state of the clocks. Furthermore, there is neither a central clock nor an externally generated pulse system. The proposed protocol converges deterministically, is scalable, and self-stabilizes in a short amount of time. The convergence time is linear with respect to the self-stabilization period. Proofs of the correctness of the protocol as well as the results of formal verification efforts are reported.
Security bound of cheat sensitive quantum bit commitment.
He, Guang Ping
2015-03-23
Cheat sensitive quantum bit commitment (CSQBC) loosens the security requirement of quantum bit commitment (QBC), so that the existing impossibility proofs of unconditionally secure QBC can be evaded. But here we analyze the common features in all existing CSQBC protocols, and show that in any CSQBC having these features, the receiver can always learn a non-trivial amount of information on the sender's committed bit before it is unveiled, while his cheating can pass the security check with a probability not less than 50%. The sender's cheating is also studied. The optimal CSQBC protocols that can minimize the sum of the cheating probabilities of both parties are found to be trivial, as they are practically useless. We also discuss the possibility of building a fair protocol in which both parties can cheat with equal probabilities.
Unification of quantum information theory
NASA Astrophysics Data System (ADS)
Abeyesinghe, Anura
We present the unification of many previously disparate results in noisy quantum Shannon theory and the unification of all of noiseless quantum Shannon theory. More specifically we deal here with bipartite, unidirectional, and memoryless quantum Shannon theory. We find all the optimal protocols and quantify the relationship between the resources used, both for the one-shot and for the ensemble case, for what is arguably the most fundamental task in quantum information theory: sharing entangled states between a sender and a receiver. We find that all of these protocols are derived from our one-shot superdense coding protocol and relate nicely to each other. We then move on to noisy quantum information theory and give a simple, direct proof of the "mother" protocol, or rather her generalization to the Fully Quantum Slepian-Wolf protocol (FQSW). FQSW simultaneously accomplishes two goals: quantum communication-assisted entanglement distillation, and state transfer from the sender to the receiver. As a result, in addition to her other "children," the mother protocol generates the state merging primitive of Horodecki, Oppenheim, and Winter as well as a new class of distributed compression protocols for correlated quantum sources, which are optimal for sources described by separable density operators. Moreover, the mother protocol described here is easily transformed into the so-called "father" protocol, demonstrating that the division of single-sender/single-receiver protocols into two families was unnecessary: all protocols in the family are children of the mother.
Nam, Junghyun; Choo, Kim-Kwang Raymond
2014-01-01
While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol. PMID:25309956
Development of Uniform Protocol for Alopecia Areata Clinical Trials.
Solomon, James A
2015-11-01
Developing a successful treatment for alopecia areata (AA), clearly has not been at the forefront of the agenda for new drug/device development among the pharmaceutical and medical device industry. The National Alopecia Areata Foundation (NAAF), a patient advocacy group, initiated a plan to facilitate and drive clinical research toward finding safe and efficacious treatments for AA. As such, Alopecia Areata Uniform Protocols for clinical trials to test new treatments for AA were developed. The design of the uniform protocol is to accomplish the development of a plug-and-play template as well as to provide a framework wherein data from studies utilizing the uniform protocol can be compared through consistency of inclusions/exclusions, safety, and outcome assessment measures. A core uniform protocol for use by pharmaceutical companies in testing proof of concept for investigational products to treat AA. The core protocol includes standardized title, informed consent, inclusion/exclusion criteria, disease outcome assessments, and safety assessments. The statistical methodology to assess successful outcomes will also be standardized. The protocol as well as the informed consent form has been approved in concept by Liberty IRB and is ready to present to pharmaceutical companies.
Pyrrole-Imidazole Polyamides: Manual Solid-Phase Synthesis.
Pauff, Steven M; Fallows, Andrew J; Mackay, Simon P; Su, Wu; Cullis, Paul M; Burley, Glenn A
2015-12-01
Pyrrole-imidazole polyamides (PAs) are a family of DNA-binding peptides that bind in the minor groove of double-stranded DNA (dsDNA) in a sequence-selective, programmable fashion. This protocol describes a detailed manual procedure for the solid-phase synthesis of this family of compounds. The protocol entails solution-phase synthesis of the Boc-protected pyrrole (Py) and imidazole (Im) carboxylic acid building blocks. This unit also describes the importance of choosing the appropriate condensing agent to form the amide linkages between each building block. Finally, a monomeric coupling protocol and a fragment-based approach are described that delivers PAs in 13% to 30% yield in 8 days. Copyright © 2015 John Wiley & Sons, Inc.
Myostatin antibody (LY2495655) in older weak fallers: a proof-of-concept, randomised, phase 2 trial
USDA-ARS?s Scientific Manuscript database
BACKGROUND: Myostatin inhibits skeletal muscle growth. The humanised monoclonal antibody LY2495655 (LY) binds and neutralises myostatin. We aimed to test whether LY increases appendicular lean body mass (aLBM) and improves physical performance in older individuals who have had recent falls and low m...
Sperry, Justin B.; Huang, Richard Y-C.; Zhu, Mei M.; Rempel, Don L.; Gross, Michael L.
2010-01-01
Calmodulin (CaM), a ubiquitous intracellular sensor protein, binds Ca2+ and interacts with various targets as part of signal transduction. Using hydrogen/deuterium exchange (H/DX) and a high resolution PLIMSTEX (Protein-Ligand Interactions by Mass Spectrometry, Titration, and H/D Exchange) protocol, we examined five different states of calmodulin: calcium-free, calcium-loaded, and three states of calcium-loaded in the presence of either melittin, mastoparan, or skeletal myosin light-chain kinase (MLCK). When CaM binds Ca2+, the extent of HDX decreased, consistent with the protein becoming stabilized upon binding. Furthermore, Ca2+-saturated calmodulin exhibits increased protection when bound to the peptides, forming high affinity complexes. The protocol reveals significant changes in EF hands 1, 3, and 4 with saturating levels of Ca2+. Titration of the protein using PLIMSTEX provides the binding affinity of Ca2+ to calmodulin within previously reported values. The affinities of calmodulin to Ca2+ increase by factors of 300 and 1000 in the presence of melittin and mastoparan, respectively. A modified PLIMSTEX protocol whereby the protein is digested to component peptides gives a region-specific titration. The titration data taken in this way show a decrease in the root mean square fit of the residuals, indicating a better fit of the data. The global H/D exchange results and those obtained in a region-specific way provide new insight into the Ca2+-binding properties of this well-studied protein. PMID:21765646
DOE Office of Scientific and Technical Information (OSTI.GOV)
Khan, Faaizah; Pickup, John C., E-mail: john.pickup@kcl.ac.uk
Highlights: •We showed that the NIR fluorophore, 651-Blue Oxazine, is solvatochromic (polarity sensitive). •Blue Oxazine was covalently attached to mutants of glucose/galactose-binding protein (GBP). •Fluorescence intensity of GBP-Blue Oxazine increased with addition of glucose. •Fluorescence from bead-immobilised GBP-Blue Oxazine was detectable through skin in vitro. •This shows proof-of-concept for non-invasive glucose sensing using GBP-Blue Oxazine. -- Abstract: Near-infrared (NIR) fluorescent dyes that are environmentally sensitive or solvatochromic are useful tools for protein labelling in in vivo biosensor applications such as glucose monitoring in diabetes since their spectral properties are mostly independent of tissue autofluorescence and light scattering, and they offermore » potential for non-invasive analyte sensing. We showed that the fluorophore 651-Blue Oxazine is polarity-sensitive, with a marked reduction in NIR fluorescence on increasing solvent polarity. Mutants of glucose/galactose-binding protein (GBP) used as the glucose receptor were site-specifically and covalently labelled with Blue Oxazine using click chemistry. Mutants H152C/A213R and H152C/A213R/L238S showed fluorescence increases of 15% and 21% on addition of saturating glucose concentrations and binding constants of 6 and 25 mM respectively. Fluorescence responses to glucose were preserved when GBP-Blue Oxazine was immobilised to agarose beads, and the beads were excited by NIR light through a mouse skin preparation studied in vitro. We conclude GBP-Blue Oxazine shows proof-of-concept as a non-invasive continuous glucose sensing system.« less
Analysis of Existing Privacy-Preserving Protocols in Domain Name System
NASA Astrophysics Data System (ADS)
Zhao, Fangming; Hori, Yoshiaki; Sakurai, Kouichi
In a society preoccupied with gradual erosion of electronic privacy, loss of privacy in the current Domain Name System is an important issue worth considering. In this paper, we first review the DNS and some security & privacy threats to make average users begin to concern about the significance of privacy preservation in DNS protocols. Then, by an careful survey of four noise query generation based existing privacy protection approaches, we analyze some benefits and limitations of these proposals in terms of both related performance evaluation results and theoretic proofs. Finally, we point out some problems that still exist for research community's continuing efforts in the future.
Optical protocols for terabit networks
NASA Technical Reports Server (NTRS)
Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.
1991-01-01
This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.
Wang, Jindong; Qin, Xiaojuan; Jiang, Yinzhu; Wang, Xiaojing; Chen, Liwei; Zhao, Feng; Wei, Zhengjun; Zhang, Zhiming
2016-04-18
A proof-of-principle demonstration of a one-way polarization encoding quantum key distribution (QKD) system is demonstrated. This approach can automatically compensate for birefringence and phase drift. This is achieved by constructing intrinsically stable polarization-modulated units (PMUs) to perform the encoding and decoding, which can be used with four-state protocol, six-state protocol, and the measurement-device-independent (MDI) scheme. A polarization extinction ratio of about 30 dB was maintained for several hours over a 50 km optical fiber without any adjustments to our setup, which evidences its potential for use in practical applications.
Peer Review and Publication of Research Protocols and Proposals: A Role for Open Access Journals
2004-01-01
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for “peer-review only” (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public. PMID:15471763
Peer-review and publication of research protocols and proposals: a role for open access journals.
Eysenbach, Gunther
2004-09-30
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for "peer-review only" (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public.
A novel assay to identify the trafficking proteins that bind to specific vesicle populations
Bentley, Marvin; Banker, Gary
2016-01-01
Here we describe a method capable of identifying interactions between candidate trafficking proteins and a defined vesicle population in intact cells. The assay involves the expression of an FKBP12-rapamycin–binding domain (FRB)–tagged candidate vesicle-binding protein that can be inducibly linked to an FKBP-tagged molecular motor. If the FRB-tagged candidate protein binds the labeled vesicles, then linking the FRB and FKBP domains recruits motors to the vesicles and causes a predictable, highly distinctive change in vesicle trafficking. We describe two versions of the assay: a general protocol for use in cells with a typical microtubule-organizing center and a specialized protocol designed to detect protein-vesicle interactions in cultured neurons. We have successfully used this assay to identify kinesins and Rabs that bind to a variety of different vesicle populations. In principle, this assay could be used to investigate interactions between any category of vesicle trafficking proteins and any vesicle population that can be specifically labeled. PMID:26621371
Evaluation of water displacement energetics in protein binding sites with grid cell theory.
Gerogiokas, G; Southey, M W Y; Mazanetz, M P; Heifetz, A; Hefeitz, A; Bodkin, M; Law, R J; Michel, J
2015-04-07
Excess free energies, enthalpies and entropies of water in protein binding sites were computed via classical simulations and Grid Cell Theory (GCT) analyses for three pairs of congeneric ligands in complex with the proteins scytalone dehydratase, p38α MAP kinase and EGFR kinase respectively. Comparative analysis is of interest since the binding modes for each ligand pair differ in the displacement of one binding site water molecule, but significant variations in relative binding affinities are observed. Protocols that vary in their use of restraints on protein and ligand atoms were compared to determine the influence of protein-ligand flexibility on computed water structure and energetics, and to assess protocols for routine analyses of protein-ligand complexes. The GCT-derived binding affinities correctly reproduce experimental trends, but the magnitude of the predicted changes in binding affinities is exaggerated with respect to results from a previous Monte Carlo Free Energy Perturbation study. Breakdown of the GCT water free energies into enthalpic and entropic components indicates that enthalpy changes dominate the observed variations in energetics. In EGFR kinase GCT analyses revealed that replacement of a pyrimidine by a cyanopyridine perturbs water energetics up three hydration shells away from the ligand.
NASA Technical Reports Server (NTRS)
Moore, J. Strother
1992-01-01
In this paper we present a formal model of asynchronous communication as a function in the Boyer-Moore logic. The function transforms the signal stream generated by one processor into the signal stream consumed by an independently clocked processor. This transformation 'blurs' edges and 'dilates' time due to differences in the phases and rates of the two clocks and the communications delay. The model can be used quantitatively to derive concrete performance bounds on asynchronous communications at ISO protocol level 1 (physical level). We develop part of the reusable formal theory that permits the convenient application of the model. We use the theory to show that a biphase mark protocol can be used to send messages of arbitrary length between two asynchronous processors. We study two versions of the protocol, a conventional one which uses cells of size 32 cycles and an unconventional one which uses cells of size 18. We conjecture that the protocol can be proved to work under our model for smaller cell sizes and more divergent clock rates but the proofs would be harder.
Guiding lead optimization with GPCR structure modeling and molecular dynamics.
Heifetz, Alexander; James, Tim; Morao, Inaki; Bodkin, Michael J; Biggin, Philip C
2016-10-01
G-protein coupled receptor (GPCR) modeling approaches are widely used in the hit-to-lead and lead optimization stages of drug discovery. Modern protocols that involve molecular dynamics simulation can address key issues such as the free energy of binding (affinity), ligand-induced GPCR flexibility, ligand binding kinetics, conserved water positions and their role in ligand binding and the effects of mutations. The goals of these calculations are to predict the structures of the complexes between existing ligands and their receptors, to understand the key interactions and to utilize these insights in the design of new molecules with improved binding, selectivity or other pharmacological properties. In this review we present a brief survey of various computational approaches illustrated through a hierarchical GPCR modeling protocol and its prospective application in three industrial drug discovery projects. Copyright © 2016 Elsevier Ltd. All rights reserved.
Chemokine receptor binding and signal transduction in native cells of the central nervous system.
Davis, Christopher N; Chen, Shuzhen; Boehme, Stefen A; Bacon, Kevin B; Harrison, Jeffrey K
2003-04-01
Chemokine receptors belong to the superfamily of seven-transmembrane-spanning, G-protein-coupled receptors, and their expression by central nervous system cells is clearly documented. As this gene family has become the target of novel therapeutic development, the analysis of these receptors requires radioligand binding techniques as well as methods that entail assessing receptor stimulation of signal transduction pathways. Herein, we describe specific protocols for measuring radiolabeled chemokine binding to their cognate receptors on cultured glial cells as well as to receptors expressed in heterologous cell systems. Multiple downstream signaling pathways, including intracellular calcium influx and receptor-dependent kinase activation, are associated with chemokine receptor stimulation. Protocols for measuring these signaling events in chemokine-receptor-expressing cells are also presented.
Molecular Docking Study on Galantamine Derivatives as Cholinesterase Inhibitors.
Atanasova, Mariyana; Yordanov, Nikola; Dimitrov, Ivan; Berkov, Strahil; Doytchinova, Irini
2015-06-01
A training set of 22 synthetic galantamine derivatives binding to acetylcholinesterase was docked by GOLD and the protocol was optimized in terms of scoring function, rigidity/flexibility of the binding site, presence/absence of a water molecule inside and radius of the binding site. A moderate correlation was found between the affinities of compounds expressed as pIC50 values and their docking scores. The optimized docking protocol was validated by an external test set of 11 natural galantamine derivatives and the correlation coefficient between the docking scores and the pIC50 values was 0.800. The derived relationship was used to analyze the interactions between galantamine derivatives and AChE. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229
Jablonski, Rita A; Winstead, Vicki; Azuero, Andres; Ptacek, Travis; Jones-Townsend, Corteza; Byrd, Elizabeth; Geisinger, Maria L; Morrow, Casey
2017-09-01
Individuals with dysphagia who reside in nursing homes often receive inadequate mouth care and experience poor oral health. From a policy perspective, the combination of absent evidence-based mouth care protocols coupled with insufficient dental coverage create a pool of individuals at great risk for preventable infectious illnesses that contribute to high health care costs. The purpose of the current study was to determine (a) the safety of a mouth care protocol tailored for individuals with dysphagia residing in nursing homes without access to suction equipment, and (b) the feasibility of collecting oral and fecal samples for microbiota analyses. The mouth care protocol resulted in improved oral hygiene without aspiration, and oral and fecal samples were safely collected from participants. Policies supporting ongoing testing of evidence-based mouth care protocols for individuals with dysphagia are important to improve quality, demonstrate efficacy, and save health care costs. [Journal of Gerontological Nursing, 43(9), 9-15.]. Copyright 2017, SLACK Incorporated.
Fully device-independent quantum key distribution.
Vazirani, Umesh; Vidick, Thomas
2014-10-03
Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.
Fully Device-Independent Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Vazirani, Umesh; Vidick, Thomas
2014-10-01
Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.
High Speed Oblivious Random Access Memory (HS-ORAM)
2015-09-01
Bryan Parno, “Non-interactive verifiable computing: Outsourcing computation to untrusted workers”, 30th International Cryptology Conference, pp. 465...holder or any other person or corporation; or convey any rights or permission to manufacture , use, or sell any patented invention that may relate to...secure outsourced data access protocols. HS-ORAM deploys a number of server- side software components running inside tamper-proof secure coprocessors
Validation of Survivability Validation Protocols
1993-05-01
simu- lation fidelityl. Physical testing of P.i SOS, in either aboveground tests (AGTs) or underground test ( UGTs ), will usually be impossible, due...with some simulation fidelity compromises) are possible in UGTs and/orAGTs. Hence proof tests, if done in statistically significant numbers, can...level. Simulation fidelity and AGT/ UGT /threat correlation will be validation issues here. Extrapolation to threat environments will be done via modeling
Simultaneous prediction of binding free energy and specificity for PDZ domain-peptide interactions
NASA Astrophysics Data System (ADS)
Crivelli, Joseph J.; Lemmon, Gordon; Kaufmann, Kristian W.; Meiler, Jens
2013-12-01
Interactions between protein domains and linear peptides underlie many biological processes. Among these interactions, the recognition of C-terminal peptides by PDZ domains is one of the most ubiquitous. In this work, we present a mathematical model for PDZ domain-peptide interactions capable of predicting both affinity and specificity of binding based on X-ray crystal structures and comparative modeling with R osetta. We developed our mathematical model using a large phage display dataset describing binding specificity for a wild type PDZ domain and 91 single mutants, as well as binding affinity data for a wild type PDZ domain binding to 28 different peptides. Structural refinement was carried out through several R osetta protocols, the most accurate of which included flexible peptide docking and several iterations of side chain repacking and backbone minimization. Our findings emphasize the importance of backbone flexibility and the energetic contributions of side chain-side chain hydrogen bonds in accurately predicting interactions. We also determined that predicting PDZ domain-peptide interactions became increasingly challenging as the length of the peptide increased in the N-terminal direction. In the training dataset, predicted binding energies correlated with those derived through calorimetry and specificity switches introduced through single mutations at interface positions were recapitulated. In independent tests, our best performing protocol was capable of predicting dissociation constants well within one order of magnitude of the experimental values and specificity profiles at the level of accuracy of previous studies. To our knowledge, this approach represents the first integrated protocol for predicting both affinity and specificity for PDZ domain-peptide interactions.
A verified design of a fault-tolerant clock synchronization circuit: Preliminary investigations
NASA Technical Reports Server (NTRS)
Miner, Paul S.
1992-01-01
Schneider demonstrates that many fault tolerant clock synchronization algorithms can be represented as refinements of a single proven correct paradigm. Shankar provides mechanical proof that Schneider's schema achieves Byzantine fault tolerant clock synchronization provided that 11 constraints are satisfied. Some of the constraints are assumptions about physical properties of the system and cannot be established formally. Proofs are given that the fault tolerant midpoint convergence function satisfies three of the constraints. A hardware design is presented, implementing the fault tolerant midpoint function, which is shown to satisfy the remaining constraints. The synchronization circuit will recover completely from transient faults provided the maximum fault assumption is not violated. The initialization protocol for the circuit also provides a recovery mechanism from total system failure caused by correlated transient faults.
Liang, Wen-Ye; Wang, Shuang; Li, Hong-Wei; Yin, Zhen-Qiang; Chen, Wei; Yao, Yao; Huang, Jing-Zheng; Guo, Guang-Can; Han, Zheng-Fu
2014-01-01
We have demonstrated a proof-of-principle experiment of reference-frame-independent phase coding quantum key distribution (RFI-QKD) over an 80-km optical fiber. After considering the finite-key bound, we still achieve a distance of 50 km. In this scenario, the phases of the basis states are related by a slowly time-varying transformation. Furthermore, we developed and realized a new decoy state method for RFI-QKD systems with weak coherent sources to counteract the photon-number-splitting attack. With the help of a reference-frame-independent protocol and a Michelson interferometer with Faraday rotator mirrors, our system is rendered immune to the slow phase changes of the interferometer and the polarization disturbances of the channel, making the procedure very robust. PMID:24402550
Swift, Brian J F; Shadish, Jared A; DeForest, Cole A; Baneyx, François
2017-03-22
Combining bioorthogonal chemistry with the use of proteins engineered with adhesive and morphogenetic solid-binding peptides is a promising route for synthesizing hybrid materials with the economy and efficiency of living systems. Using optical sensing of chloramphenicol as a proof of concept, we show here that a GFP variant engineered with zinc sulfide and silica-binding peptides on opposite sides of its β-barrel supports the fabrication of protein-capped ZnS:Mn nanocrystals that exhibit the combined emission signatures of organic and inorganic fluorophores. Conjugation of a chloramphenicol-specific DNA aptamer to the protein shell through strain-promoted azide-alkyne cycloaddition and spontaneous concentration of the resulting nanostructures onto SiO 2 particles mediated by the silica-binding sequence enables visual detection of environmentally and clinically relevant concentrations of chloramphenicol through analyte-mediated inner filtering of sub-330 nm excitation light.
NASA Astrophysics Data System (ADS)
Qi, Yulin; Geib, Timon; Volmer, Dietrich A.
2015-07-01
Cyclodextrins (CDs) are a group of cyclic oligosaccharides, which readily form inclusion complexes with hydrophobic compounds to increase bioavailability, thus making CDs ideal drug excipients. Recent studies have also shown that CDs exhibit a wide range of protective effects, preventing proteins from aggregation, degradation, and folding. These effects strongly depend on the binding sites on the protein surface. CDs only exhibit weak interactions with amino acids, however; conventional analytical techniques therefore usually fail to reveal the exact location of the binding sites. Moreover, some studies even suggest that CD inclusion complexes are merely electrostatic adducts. Here, electron capture dissociation (ECD) was applied in this proof-of-concept study to examine the exact nature of the CD/peptide complexes, and CD binding sites were unambiguously located for the first time via Fourier-transform ion cyclotron resonance (FTICR) tandem mass spectrometry.
Zhang, Yun; Liu, Fang; Nie, Jinfang; Jiang, Fuyang; Zhou, Caibin; Yang, Jiani; Fan, Jinlong; Li, Jianping
2014-05-07
In this paper, we report for the first time an electrochemical biosensor for single-step, reagentless, and picomolar detection of a sequence-specific DNA-binding protein using a double-stranded, electrode-bound DNA probe terminally modified with a redox active label close to the electrode surface. This new methodology is based upon local repression of electrolyte diffusion associated with protein-DNA binding that leads to reduction of the electrochemical response of the label. In the proof-of-concept study, the resulting electrochemical biosensor was quantitatively sensitive to the concentrations of the TATA binding protein (TBP, a model analyte) ranging from 40 pM to 25.4 nM with an estimated detection limit of ∼10.6 pM (∼80 to 400-fold improvement on the detection limit over previous electrochemical analytical systems).
Missing Fragments: Detecting Cooperative Binding in Fragment-Based Drug Design
2012-01-01
The aim of fragment-based drug design (FBDD) is to identify molecular fragments that bind to alternate subsites within a given binding pocket leading to cooperative binding when linked. In this study, the binding of fragments to human phenylethanolamine N-methyltransferase is used to illustrate how (a) current protocols may fail to detect fragments that bind cooperatively, (b) theoretical approaches can be used to validate potential hits, and (c) apparent false positives obtained when screening against cocktails of fragments may in fact indicate promising leads. PMID:24900472
Building blocks for protein interaction devices
Grünberg, Raik; Ferrar, Tony S.; van der Sloot, Almer M.; Constante, Marco; Serrano, Luis
2010-01-01
Here, we propose a framework for the design of synthetic protein networks from modular protein–protein or protein–peptide interactions and provide a starter toolkit of protein building blocks. Our proof of concept experiments outline a general work flow for part–based protein systems engineering. We streamlined the iterative BioBrick cloning protocol and assembled 25 synthetic multidomain proteins each from seven standardized DNA fragments. A systematic screen revealed two main factors controlling protein expression in Escherichia coli: obstruction of translation initiation by mRNA secondary structure or toxicity of individual domains. Eventually, 13 proteins were purified for further characterization. Starting from well-established biotechnological tools, two general–purpose interaction input and two readout devices were built and characterized in vitro. Constitutive interaction input was achieved with a pair of synthetic leucine zippers. The second interaction was drug-controlled utilizing the rapamycin-induced binding of FRB(T2098L) to FKBP12. The interaction kinetics of both devices were analyzed by surface plasmon resonance. Readout was based on Förster resonance energy transfer between fluorescent proteins and was quantified for various combinations of input and output devices. Our results demonstrate the feasibility of parts-based protein synthetic biology. Additionally, we identify future challenges and limitations of modular design along with approaches to address them. PMID:20215443
Robitaille, Nicolas; Jackson, Philip L; Hébert, Luc J; Mercier, Catherine; Bouyer, Laurent J; Fecteau, Shirley; Richards, Carol L; McFadyen, Bradford J
2017-10-01
This proof of concept study tested the ability of a dual task walking protocol using a recently developed avatar-based virtual reality (VR) platform to detect differences between military personnel post mild traumatic brain injury (mTBI) and healthy controls. The VR platform coordinated motion capture, an interaction and rendering system, and a projection system to present first (participant-controlled) and third person avatars within the context of a specific military patrol scene. A divided attention task was also added. A healthy control group was compared to a group with previous mTBI (both groups comprised of six military personnel) and a repeated measures ANOVA tested for differences between conditions and groups based on recognition errors, walking speed and fluidity and obstacle clearance. The VR platform was well tolerated by both groups. Walking fluidity was degraded for the control group within the more complex navigational dual tasking involving avatars, and appeared greatest in the dual tasking with the interacting avatar. This navigational behaviour was not seen in the mTBI group. The present findings show proof of concept for using avatars, particularly more interactive avatars, to expose differences in executive functioning when applying context-specific protocols (here for the military). Implications for rehabilitation Virtual reality provides a means to control context-specific factors for assessment and intervention. Adding human interaction and agency through avatars increases the ecologic nature of the virtual environment. Avatars in the present application of the Virtual Reality avatar interaction platform appear to provide a better ability to reveal differences between trained, military personal with and without mTBI.
Simultaneous Multiple MS Binding Assays Addressing D1 and D2 Dopamine Receptors.
Schuller, Marion; Höfner, Georg; Wanner, Klaus T
2017-10-09
MS Binding Assays are a label-free alternative to radioligand binding assays. They provide basically the same capabilities as the latter, but use a non-labeled reporter ligand instead of a radioligand. In contrast to radioligand binding assays, MS Binding Assays offer-owing to the selectivity of mass spectrometric detection-the opportunity to monitor the binding of different reporter ligands at different targets simultaneously. The present study shows a proof of concept for this strategy as exemplified for MS Binding Assays selectively addressing D 1 and D 2 dopamine receptors in a single binding experiment. A highly sensitive, rapid and robust LC-ESI-MS/MS quantification method capable of quantifying both SCH23390 and raclopride, selectively addressing D 1 and D 2 receptors, respectively, was established and validated for this purpose. Based thereon, simultaneous saturation and competition experiments with SCH23390 and raclopride in the presence of both D 1 and D 2 receptors were performed and analyzed by LC-MS/MS within a single chromatographic cycle. The present study thus demonstrates the feasibility of this strategy and the high versatility of MS Binding Assays that appears to surpass that common for conventional radioligand binding assays. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
Air toxics evaluation of ABB Combustion Engineering Low-Emission Boiler Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wesnor, J.D.
1993-10-26
The specific goals of the program are to identify air toxic compounds that might be emmitted from the new boiler with its various Air Pollution Control device for APCD alternatives in levels of regulatory concern. For the compounds thought to be of concern, potential air toxic control methodologies will be suggested and a Test Protocol will be written to be used in the Proof of Concept and full scale tests. The following task was defined: Define Replations and Standards; Identify Air Toxic Pollutants of Interest to Interest to Utility Boilers; Assesment of Air Toxic By-Products; State of the Art Assessmentmore » of Toxic By-Product Control Technologies; and Test Protocol Definition.« less
Hill, Elliott; Shukla, Rameshwer; Park, Steve S; Baker, James R
2007-01-01
Screening techniques now allow for the identification of small peptides that bind specifically to molecules like cells. However, despite the enthusiasm for this approach, single peptides often lack the binding affinity to target in vivo and regulate cell function. We took peptides containing the Arg-Gly Asp(RGD) motif that bind to the alpha Vbeta 3 integrin and have shown potential as therapeutics. To improve their binding affinity, we synthesized polyamidoamine (PAMAM) dendrimer-RGD conjugates that that contain 12-13 copies of the peptide. When cultured with human dermal microvessel endothelial cells (HDMEC), human vascular endothelial cells (HUVEC), or odontoblast-like MDPC-23 cells, the PAMAM dendrimer conjugate targets this receptor in a manner that is both time- and dose-dependent. Finally, this conjugate selectively targets RGD binding sites in the predentin of human tooth organ cultures. Taken together, these studies provide proof of principle that synthetic PAMAM-RGD conjugates could prove useful as carriers for the tissue-specific delivery of integrin-targeted therapeutics or imaging agents and could be used to engineer tissue regeneration.
Mavon, A
2015-10-01
The megatrend of population ageing is leading to a growing demand for "anti-ageing" treatments, especially to prevent or treat skin ageing. Facing an increasing offer, consumers are choosing more and more skin care products supported by a scientific rationale, active ingredients and clinical proof of efficacy. Considering consumer expectations, this research led to the discovery of acetyl aspartic acid (A-A-A), a novel active ingredient to improve sagging skin and loss of skin firmness. This supplement is featuring seven manuscripts aiming at presenting the research and investigations from consumer insights, discovery of A-A-A, its in vitro activity confirmation, safety assessment, formulation and its dermal absorption to the clinical proof of efficacy, investigated through two pilots' double bind randomized and placebo controlled studies on photo-aged skin. This extensive research enabled us to discover A-A-A, as an active ingredient with potential to repair sign of skin ageing and supported by clinical proof of efficacy. This active ingredient will be soon launched in a commercial innovative skin care range, delivering desirable anti-wrinkle and skin lifting benefits. © 2015 Society of Cosmetic Scientists and the Société Française de Cosmétologie.
NASA Astrophysics Data System (ADS)
Rezaei Darestani, Reza; Winter, Philip; Kitova, Elena N.; Tuszynski, Jack A.; Klassen, John S.
2016-05-01
Tubulin, which is the building block of microtubules, plays an important role in cell division. This critical role makes tubulin an attractive target for the development of chemotherapeutic drugs to treat cancer. Currently, there is no general binding assay for tubulin-drug interactions. The present work describes the application of the catch-and-release electrospray ionization mass spectrometry (CaR-ESI-MS) assay to investigate the binding of colchicinoid drugs to αβ-tubulin dimers extracted from porcine brain. Proof-of-concept experiments using positive (ligands with known affinities) and negative (non-binders) controls were performed to establish the reliability of the assay. The assay was then used to screen a library of seven colchicinoid analogues to test their binding to tubulin and to rank their affinities.
Pethica, Brian A
2015-03-01
Isothermal titration calorimetry (ITC) has given a mass of data on the binding of small molecules to proteins and other biopolymers, with particular interest in drug binding to proteins chosen as therapeutic indicators. Interpretation of the enthalpy data usually follows an unsound protocol that uses thermodynamic relations in circumstances where they do not apply. Errors of interpretation include incomplete definitions of ligand binding and equilibrium constants and neglect of the non-ideality of the solutions under study, leading to unreliable estimates of standard free energies and entropies of binding. The mass of reported thermodynamic functions for ligand binding to proteins estimated from ITC enthalpies alone is consequently of uncertain thermodynamic significance and utility. ITC and related experiments to test the protocol assumptions are indicated. A thermodynamic procedure avoiding equilibrium constants or other reaction models and not requiring protein activities is given. The discussion draws attention to the fundamental but neglected relation between the thermodynamic activity and bioactivity of drugs and to the generally unknown thermodynamic status of ligand solutions, which for drugs relates directly to effective therapeutic dosimetry. Copyright © 2014 Elsevier Inc. All rights reserved.
Approximating the Qualitative Vickrey Auction by a Negotiation Protocol
NASA Astrophysics Data System (ADS)
Hindriks, Koen V.; Tykhonov, Dmytro; de Weerdt, Mathijs
A result of Bulow and Klemperer has suggested that auctions may be a better tool to obtain an efficient outcome than negotiation. For example, some auction mechanisms can be shown to be efficient and strategy-proof. However, they generally also require that the preferences of at least one side of the auction are publicly known. However, sometimes it is very costly, impossible, or undesirable to publicly announce such preferences. It thus is interesting to find methods that do not impose this constraint but still approximate the outcome of the auction. In this paper we show that a multi-round multi-party negotiation protocol may be used to this end if the negotiating agents are capable of learning opponent preferences. The latter condition can be met by current state of the art negotiation technology. We show that this protocol approximates the theoretical outcome predicted by a so-called Qualitative Vickrey auction mechanism (even) on a complex multi-issue domain.
Use of bacteriophage cell wall-binding proteins for rapid diagnostics of Listeria.
Schmelcher, Mathias; Loessner, Martin J
2014-01-01
Diagnostic protocols for food-borne bacterial pathogens such as Listeria need to be sensitive, specific, rapid, and inexpensive. Conventional culture methods are hampered by lengthy enrichment and incubation steps. Bacteriophage-derived high-affinity binding molecules (cell wall-binding domains, CBDs) specific for Listeria cells have recently been introduced as tools for detection and differentiation of this pathogen in foods. When coupled with magnetic separation, these proteins offer advantages in sensitivity and speed compared to the standard diagnostic methods. Furthermore, fusion of CBDs to differently colored fluorescent reporter proteins enables differentiation of Listeria strains in mixed cultures. This chapter provides protocols for detection of Listeria in food by CBD-based magnetic separation and subsequent multiplexed identification of strains of different serotypes with reporter-CBD fusion proteins.
Update of the ATTRACT force field for the prediction of protein-protein binding affinity.
Chéron, Jean-Baptiste; Zacharias, Martin; Antonczak, Serge; Fiorucci, Sébastien
2017-06-05
Determining the protein-protein interactions is still a major challenge for molecular biology. Docking protocols has come of age in predicting the structure of macromolecular complexes. However, they still lack accuracy to estimate the binding affinities, the thermodynamic quantity that drives the formation of a complex. Here, an updated version of the protein-protein ATTRACT force field aiming at predicting experimental binding affinities is reported. It has been designed on a dataset of 218 protein-protein complexes. The correlation between the experimental and predicted affinities reaches 0.6, outperforming most of the available protocols. Focusing on a subset of rigid and flexible complexes, the performance raises to 0.76 and 0.69, respectively. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.
Continuous Tamper-proof Logging using TPM2.0
2014-06-16
process each log entry. Additional hardware support could mitigate this problem. Tradeoffs between performance and security guarantees Disk write...becomes weaker as the block size increases. This problem is mitigated in protocol B by allowing offline recovery from a power failure and detection of...M.K., Isozaki, H.: Flicker : An execution infrastructure for TCB minimization. ACM SIGOPS Operating Systems Review 42(4) (2008) 315–328 24. Parno, B
Strep-Tagged Protein Purification.
Maertens, Barbara; Spriestersbach, Anne; Kubicek, Jan; Schäfer, Frank
2015-01-01
The Strep-tag system can be used to purify recombinant proteins from any expression system. Here, protocols for lysis and affinity purification of Strep-tagged proteins from E. coli, baculovirus-infected insect cells, and transfected mammalian cells are given. Depending on the amount of Strep-tagged protein in the lysate, a protocol for batch binding and subsequent washing and eluting by gravity flow can be used. Agarose-based matrices with the coupled Strep-Tactin ligand are the resins of choice, with a binding capacity of up to 9 mg ml(-1). For purification of lower amounts of Strep-tagged proteins, the use of Strep-Tactin magnetic beads is suitable. In addition, Strep-tagged protein purification can also be automated using prepacked columns for FPLC or other liquid-handling chromatography instrumentation, but automated purification is not discussed in this protocol. The protocols described here can be regarded as an update of the Strep-Tag Protein Handbook (Qiagen, 2009). © 2015 Elsevier Inc. All rights reserved.
DNA-aptamers binding aminoglycoside antibiotics.
Nikolaus, Nadia; Strehlitz, Beate
2014-02-21
Aptamers are short, single stranded DNA or RNA oligonucleotides that are able to bind specifically and with high affinity to their non-nucleic acid target molecules. This binding reaction enables their application as biorecognition elements in biosensors and assays. As antibiotic residues pose a problem contributing to the emergence of antibiotic-resistant pathogens and thereby reducing the effectiveness of the drug to fight human infections, we selected aptamers targeted against the aminoglycoside antibiotic kanamycin A with the aim of constructing a robust and functional assay that can be used for water analysis. With this work we show that aptamers that were derived from a Capture-SELEX procedure targeting against kanamycin A also display binding to related aminoglycoside antibiotics. The binding patterns differ among all tested aptamers so that there are highly substance specific aptamers and more group specific aptamers binding to a different variety of aminoglycoside antibiotics. Also the region of the aminoglycoside antibiotics responsible for aptamer binding can be estimated. Affinities of the different aptamers for their target substance, kanamycin A, are measured with different approaches and are in the micromolar range. Finally, the proof of principle of an assay for detection of kanamycin A in a real water sample is given.
Goldberg, Andrew J; Zaidi, Razi; Brooking, Deirdre; Kim, Louise; Korda, Michelle; Masci, Lorenzo; Green, Ruth; O’Donnell, Paul; Smith, Roger
2018-01-01
Introduction Achilles tendinopathy (AT) is a cause of pain and disability affecting both athletes and sedentary individuals. More than 150 000 people in the UK every year suffer from AT. While there is much preclinical work on the use of stem cells in tendon pathology, there is a scarcity of clinical data looking at the use of mesenchymal stem cells to treat tendon disease and there does not appear to be any studies of the use of autologous cultured mesenchymal stem cells (MSCs) for AT. Our hypothesis is that autologous culture expanded MSCs implanted into an area of mid-portion AT will lead to improved pain-free mechanical function. The current paper presents the protocol for a phase IIa clinical study. Methods and analysis The presented protocol is for a non-commercial, single-arm, open-label, phase IIa proof-of-concept study. The study will recruit 10 participants and will follow them up for 6 months. Included will be patients aged 18–70 years with chronic mid-portion AT who have failed at least 6 months of non-operative management. Participants will have a bone marrow aspirate collected from the posterior iliac crest under either local or general anaesthetic. MSCs will be isolated and expanded from the bone marrow. Four to 6 weeks after the harvest, participants will undergo implantation of the culture expanded MSCs under local anaesthetic and ultrasound guidance. The primary outcome will be safety as defined by the incidence rate of serious adverse reaction. The secondary outcomes will be efficacy as measured by patient-reported outcome measures and radiological outcome using ultrasound techniques. Ethics and dissemination The protocol has been approved by the National Research Ethics Service Committee (London, Harrow; reference 13/LO/1670). Trial findings will be disseminated through peer-reviewed publications and conference presentations. Trial registration number NCT02064062. PMID:29764889
Marshall, Owen J; Southall, Tony D; Cheetham, Seth W; Brand, Andrea H
2016-09-01
This protocol is an extension to: Nat. Protoc. 2, 1467-1478 (2007); doi:10.1038/nprot.2007.148; published online 7 June 2007The ability to profile transcription and chromatin binding in a cell-type-specific manner is a powerful aid to understanding cell-fate specification and cellular function in multicellular organisms. We recently developed targeted DamID (TaDa) to enable genome-wide, cell-type-specific profiling of DNA- and chromatin-binding proteins in vivo without cell isolation. As a protocol extension, this article describes substantial modifications to an existing protocol, and it offers additional applications. TaDa builds upon DamID, a technique for detecting genome-wide DNA-binding profiles of proteins, by coupling it with the GAL4 system in Drosophila to enable both temporal and spatial resolution. TaDa ensures that Dam-fusion proteins are expressed at very low levels, thus avoiding toxicity and potential artifacts from overexpression. The modifications to the core DamID technique presented here also increase the speed of sample processing and throughput, and adapt the method to next-generation sequencing technology. TaDa is robust, reproducible and highly sensitive. Compared with other methods for cell-type-specific profiling, the technique requires no cell-sorting, cross-linking or antisera, and binding profiles can be generated from as few as 10,000 total induced cells. By profiling the genome-wide binding of RNA polymerase II (Pol II), TaDa can also identify transcribed genes in a cell-type-specific manner. Here we describe a detailed protocol for carrying out TaDa experiments and preparing the material for next-generation sequencing. Although we developed TaDa in Drosophila, it should be easily adapted to other organisms with an inducible expression system. Once transgenic animals are obtained, the entire experimental procedure-from collecting tissue samples to generating sequencing libraries-can be accomplished within 5 d.
Physical cryptographic verification of nuclear warheads
Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.
2016-01-01
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times. PMID:27432959
Physical cryptographic verification of nuclear warheads
NASA Astrophysics Data System (ADS)
Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.
2016-08-01
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.
Physical cryptographic verification of nuclear warheads.
Kemp, R Scott; Danagoulian, Areg; Macdonald, Ruaridh R; Vavrek, Jayson R
2016-08-02
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.
Bohari, Mohammed H; Sastry, G Narahari
2012-09-01
Efficient drug discovery programs can be designed by utilizing existing pools of knowledge from the already approved drugs. This can be achieved in one way by repositioning of drugs approved for some indications to newer indications. Complex of drug to its target gives fundamental insight into molecular recognition and a clear understanding of putative binding site. Five popular docking protocols, Glide, Gold, FlexX, Cdocker and LigandFit have been evaluated on a dataset of 199 FDA approved drug-target complexes for their accuracy in predicting the experimental pose. Performance for all the protocols is assessed at default settings, with root mean square deviation (RMSD) between the experimental ligand pose and the docked pose of less than 2.0 Å as the success criteria in predicting the pose. Glide (38.7 %) is found to be the most accurate in top ranked pose and Cdocker (58.8 %) in top RMSD pose. Ligand flexibility is a major bottleneck in failure of docking protocols to correctly predict the pose. Resolution of the crystal structure shows an inverse relationship with the performance of docking protocol. All the protocols perform optimally when a balanced type of hydrophilic and hydrophobic interaction or dominant hydrophilic interaction exists. Overall in 16 different target classes, hydrophobic interactions dominate in the binding site and maximum success is achieved for all the docking protocols in nuclear hormone receptor class while performance for the rest of the classes varied based on individual protocol.
Improved prediction of antibody VL–VH orientation
Marze, Nicholas A.; Lyskov, Sergey; Gray, Jeffrey J.
2016-01-01
Antibodies are important immune molecules with high commercial value and therapeutic interest because of their ability to bind diverse antigens. Computational prediction of antibody structure can quickly reveal valuable information about the nature of these antigen-binding interactions, but only if the models are of sufficient quality. To achieve high model quality during complementarity-determining region (CDR) structural prediction, one must account for the VL–VH orientation. We developed a novel four-metric VL–VH orientation coordinate frame. Additionally, we extended the CDR grafting protocol in RosettaAntibody with a new method that diversifies VL–VH orientation by using 10 VL–VH orientation templates rather than a single one. We tested the multiple-template grafting protocol on two datasets of known antibody crystal structures. During the template-grafting phase, the new protocol improved the fraction of accurate VL–VH orientation predictions from only 26% (12/46) to 72% (33/46) of targets. After the full RosettaAntibody protocol, including CDR H3 remodeling and VL–VH re-orientation, the new protocol produced more candidate structures with accurate VL–VH orientation than the standard protocol in 43/46 targets (93%). The improved ability to predict VL–VH orientation will bolster predictions of other parts of the paratope, including the conformation of CDR H3, a grand challenge of antibody homology modeling. PMID:27276984
2017-01-01
Binding free energy calculations that make use of alchemical pathways are becoming increasingly feasible thanks to advances in hardware and algorithms. Although relative binding free energy (RBFE) calculations are starting to find widespread use, absolute binding free energy (ABFE) calculations are still being explored mainly in academic settings due to the high computational requirements and still uncertain predictive value. However, in some drug design scenarios, RBFE calculations are not applicable and ABFE calculations could provide an alternative. Computationally cheaper end-point calculations in implicit solvent, such as molecular mechanics Poisson–Boltzmann surface area (MMPBSA) calculations, could too be used if one is primarily interested in a relative ranking of affinities. Here, we compare MMPBSA calculations to previously performed absolute alchemical free energy calculations in their ability to correlate with experimental binding free energies for three sets of bromodomain–inhibitor pairs. Different MMPBSA approaches have been considered, including a standard single-trajectory protocol, a protocol that includes a binding entropy estimate, and protocols that take into account the ligand hydration shell. Despite the improvements observed with the latter two MMPBSA approaches, ABFE calculations were found to be overall superior in obtaining correlation with experimental affinities for the test cases considered. A difference in weighted average Pearson () and Spearman () correlations of 0.25 and 0.31 was observed when using a standard single-trajectory MMPBSA setup ( = 0.64 and = 0.66 for ABFE; = 0.39 and = 0.35 for MMPBSA). The best performing MMPBSA protocols returned weighted average Pearson and Spearman correlations that were about 0.1 inferior to ABFE calculations: = 0.55 and = 0.56 when including an entropy estimate, and = 0.53 and = 0.55 when including explicit water molecules. Overall, the study suggests that ABFE calculations are indeed the more accurate approach, yet there is also value in MMPBSA calculations considering the lower compute requirements, and if agreement to experimental affinities in absolute terms is not of interest. Moreover, for the specific protein–ligand systems considered in this study, we find that including an explicit ligand hydration shell or a binding entropy estimate in the MMPBSA calculations resulted in significant performance improvements at a negligible computational cost. PMID:28786670
Analysis of In Vivo Chromatin and Protein Interactions of Arabidopsis Transcript Elongation Factors.
Pfab, Alexander; Antosz, Wojciech; Holzinger, Philipp; Bruckmann, Astrid; Griesenbeck, Joachim; Grasser, Klaus D
2017-01-01
A central step to elucidate the function of proteins commonly comprises the analysis of their molecular interactions in vivo. For nuclear regulatory proteins this involves determining protein-protein interactions as well as mapping of chromatin binding sites. Here, we present two protocols to identify protein-protein and chromatin interactions of transcript elongation factors (TEFs) in Arabidopsis. The first protocol (Subheading 3.1) describes protein affinity-purification coupled to mass spectrometry (AP-MS) that utilizes suspension cultured cells as experimental system. This approach provides an unbiased view of proteins interacting with epitope-tagged TEFs. The second protocol (Subheading 3.2) depicts details about a chromatin immunoprecipitation (ChIP) procedure to characterize genomic binding sites of TEFs. These methods should be valuable tools for the analysis of a broad variety of nuclear proteins.
Quantum protocols within Spekkens' toy model
NASA Astrophysics Data System (ADS)
Disilvestro, Leonardo; Markham, Damian
2017-05-01
Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.
Automated Planning Enables Complex Protocols on Liquid-Handling Robots.
Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg
2018-03-16
Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.
Self-referenced continuous-variable quantum key distribution protocol
Soh, Daniel Beom Soo; Sarovar, Mohan; Brif, Constantin; ...
2015-10-21
We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of themore » protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. Furthermore, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less
Self-referenced continuous-variable quantum key distribution protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Soh, Daniel Beom Soo; Sarovar, Mohan; Brif, Constantin
We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of themore » protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. Furthermore, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less
Self-Referenced Continuous-Variable Quantum Key Distribution Protocol
NASA Astrophysics Data System (ADS)
Soh, Daniel B. S.; Brif, Constantin; Coles, Patrick J.; Lütkenhaus, Norbert; Camacho, Ryan M.; Urayama, Junji; Sarovar, Mohan
2015-10-01
We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. As such, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.
NASA Astrophysics Data System (ADS)
Huang, Duan; Huang, Peng; Wang, Tao; Li, Huasheng; Zhou, Yingming; Zeng, Guihua
2016-09-01
We propose and experimentally demonstrate a continuous-variable quantum key distribution (CV-QKD) protocol using dual-phase-modulated coherent states. We show that the modulation scheme of our protocol works equivalently to that of the Gaussian-modulated coherent-states (GMCS) protocol, but shows better experimental feasibility in the plug-and-play configuration. Besides, it waives the necessity of propagation of a local oscillator (LO) between legitimate users and generates a real local LO for quantum measurement. Our protocol is proposed independent of the one-way GMCS QKD without sending a LO [Opt. Lett. 40, 3695 (2015), 10.1364/OL.40.003695; Phys. Rev. X 5, 041009 (2015), 10.1103/PhysRevX.5.041009; Phys. Rev. X 5, 041010 (2015), 10.1103/PhysRevX.5.041010]. In those recent works, the system stability will suffer the impact of polarization drifts induced by environmental perturbations, and two independent frequency-locked laser sources are necessary to achieve reliable coherent detection. In the proposed protocol, these previous problems can be resolved. We derive the security bounds for our protocol against collective attacks, and we also perform a proof-of-principle experiment to confirm the utility of our proposal in real-life applications. Such an efficient scheme provides a way of removing the security loopholes associated with the transmitting LO, which have been a notoriously hard problem in continuous-variable quantum communication.
Reasoning about Probabilistic Security Using Task-PIOAs
NASA Astrophysics Data System (ADS)
Jaggard, Aaron D.; Meadows, Catherine; Mislove, Michael; Segala, Roberto
Task-structured probabilistic input/output automata (Task-PIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framework for the universal composability paradigms of protocol security. One of their advantages is that that they allow one to distinguish high-level nondeterminism that can affect the outcome of the protocol, from low-level choices, which can't. We present an alternative approach to analyzing the structure of Task-PIOAs that relies on ordered sets. We focus on two of the components that are required to define and apply Task-PIOAs: discrete probability theory and automata theory. We believe our development gives insight into the structure of Task-PIOAs and how they can be utilized to model crypto-protocols. We illustrate our approach with an example from anonymity, an area that has not previously been addressed using Task-PIOAs. We model Chaum's Dining Cryptographers Protocol at a level that does not require cryptographic primitives in the analysis. We show via this example how our approach can leverage a proof of security in the case a principal behaves deterministically to prove security when that principal behaves probabilistically.
Suraniti, Emmanuel; Studer, Vincent; Sojic, Neso; Mano, Nicolas
2011-04-01
Immobilization and electrical wiring of enzymes is of particular importance for the elaboration of efficient biosensors and can be cumbersome. Here, we report a fast and easy protocol for enzyme immobilization, and as a proof of concept, we applied it to the immobilization of bilirubin oxidase, a labile enzyme. In the first step, bilirubin oxidase is mixed with a redox hydrogel "wiring" the enzyme reaction centers to electrodes. Then, this adduct is covered by an outer layer of PEGDA made by photoinitiated polymerization of poly(ethylene-glycol) diacrylate (PEGDA) and a photoclivable precursor, DAROCUR. This two-step protocol is 18 times faster than the current state-of-the-art protocol and leads to currents 25% higher. In addition, the outer layer of PEGDA acts as a protective layer increasing the lifetime of the electrode by 100% when operating continuously for 2000 s and by 60% when kept in dry state for 24 h. This new protocol is particularly appropriate for labile enzymes that quickly denaturate. In addition, by tuning the ratio PEGDA/DAROCUR, it is possible to make the enzyme electrodes even more active or more stable.
Modeling Techniques for High Dependability Protocols and Architecture
NASA Technical Reports Server (NTRS)
LaValley, Brian; Ellis, Peter; Walter, Chris J.
2012-01-01
This report documents an investigation into modeling high dependability protocols and some specific challenges that were identified as a result of the experiments. The need for an approach was established and foundational concepts proposed for modeling different layers of a complex protocol and capturing the compositional properties that provide high dependability services for a system architecture. The approach centers around the definition of an architecture layer, its interfaces for composability with other layers and its bindings to a platform specific architecture model that implements the protocols required for the layer.
Receptor Subtype Alterations: Bases of Neuronal Plasticity and Learning
1990-12-18
oxotremorine -M binding in rabbit anterior thalamus and cingulate cortex increased during the course of discriminative avoidance conditioning (DAC). Since there...anterior thalamus between training-induced neuronal plasticities and changes in oxotremorine -M binding. 3) The concentrations of noradrenaline, serotonin...binding protocols included the following: M 1, 3H-pirenzepine; M 2, 3H- oxotremorine -M in the p resence of unlabeled pirenzepine; GABAA, 3H-muscimol; M, and
Bello, Martiniano
2014-10-01
The bovine dairy protein β-lactoglobulin (βlg) is a promiscuous protein that has the ability to bind several hydrophobic ligands. In this study, based on known experimental data, the dynamic interaction mechanism between bovine βlg and four fatty acids was investigated by a protocol combining molecular dynamics (MD) simulations and molecular mechanics generalized Born surface area (MMGBSA) binding free energy calculations. Energetic analyses revealed binding free energy trends that corroborated known experimental findings; larger ligand size corresponded to greater binding affinity. Finally, binding free energy decomposition provided detailed information about the key residues stabilizing the complex. © 2014 Wiley Periodicals, Inc.
Twenty Seven Years of Quantum Cryptography!
NASA Astrophysics Data System (ADS)
Hughes, Richard
2011-03-01
One of the fundamental goals of cryptographic research is to minimize the assumptions underlying the protocols that enable secure communications between pairs or groups of users. In 1984, building on earlier research by Stephen Wiesner, Charles Bennett and Gilles Brassard showed how quantum physics could be harnessed to provide information-theoretic security for protocols such as the distribution of cryptographic keys, which enables two parties to secure their conventional communications. Bennett and Brassard and colleagues performed a proof-of-principle quantum key distribution (QKD) experiment with single-photon quantum state transmission over a 32-cm air path in 1991. This seminal experiment led other researchers to explore QKD in optical fibers and over line-of-sight outdoor atmospheric paths (``free-space''), resulting in dramatic increases in range, bit rate and security. These advances have been enabled by improvements in sources and single-photon detectors. Also in 1991 Artur Ekert showed how the security of QKD could be related to quantum entanglement. This insight led to a deeper understanding and proof of QKD security with practical sources and detectors in the presence of transmission loss and channel noise. Today, QKD has been implemented over ranges much greater than 100km in both fiber and free-space, multi-node network testbeds have been demonstrated, and satellite-based QKD is under study in several countries. ``Quantum hacking'' researchers have shown the importance of extending security considerations to the classical devices that produce and detect the photon quantum states. New quantum cryptographic protocols such as secure identification have been proposed, and others such as quantum secret splitting have been demonstrated. It is now possible to envision quantum cryptography providing a more secure alternative to present-day cryptographic methods for many secure communications functions. My talk will survey these remarkable developments.
Toward Synthesis, Analysis, and Certification of Security Protocols
NASA Technical Reports Server (NTRS)
Schumann, Johann
2004-01-01
Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen: multiple tries with invalid passwords caused the expected error message (too many retries). but let the user nevertheless pass. Finally, security can be compromised by silly implementation bugs or design decisions. In a commercial VPN software, all calls to the encryption routines were incidentally replaced by stubs, probably during factory testing. The product worked nicely. and the error (an open VPN) would have gone undetected, if a team member had not inspected the low-level traffic out of curiosity. Also, the use secret proprietary encryption routines can backfire, because such algorithms often exhibit weaknesses which can be exploited easily (see e.g., DVD encoding). Summarizing, there is large number of possibilities to make errors which can compromise the security of a protocol. In today s world with short time-to-market and the use of security protocols in open and hostile networks for safety-critical applications (e.g., power or air-traffic control), such slips could lead to catastrophic situations. Thus, formal methods and automatic reasoning techniques should not be used just for the formal proof of absence of an attack, but they ought to be used to provide an end-to-end tool-supported framework for security software. With such an approach all required artifacts (code, documentation, test cases) , formal analyses, and reliable certification will be generated automatically, given a single, high level specification. By a combination of program synthesis, formal protocol analysis, certification; and proof-carrying code, this goal is within practical reach, since all the important technologies for such an approach actually exist and only need to be assembled in the right way.
A DNA Aptamer Recognizes the Asp f 1 Allergen of Aspergillus fumigatus
Low, Swee Yang; Hill, Jane E.; Peccia, Jordan
2009-01-01
Allergies are caused by the binding of IgE antibodies onto specific sites on allergens. However, in the assessment of exposure to airborne allergens, current techniques such as whole spore counts fail to account for the presence of these allergenic epitopes that trigger allergic reactions. The objective of the research is to develop a DNA aptamer for the Asp f 1 allergen of the pathogenic fungus Aspergillus fumigatus, using an IgE-binding epitope of the allergen as the target for aptamer selection. Through in vitro SELEX, an aptamer has been produced that binds with nanomolar affinity to the Asp f 1 IgE-epitope. The aptamer is also able to recognize the native Asp f 1 allergen, and does not bind to allergenic proteins from non-target mold species such as Alternaria alternata. Production of this aptamer provides proof-of-principle that allergen measurement methods can be developed to indicate the potent fraction, or allergenicity, of allergens. PMID:19545545
Droplet microfluidics with magnetic beads: a new tool to investigate drug-protein interactions.
Lombardi, Dario; Dittrich, Petra S
2011-01-01
In this study, we give the proof of concept for a method to determine binding constants of compounds in solution. By implementing a technique based on magnetic beads with a microfluidic device for segmented flow generation, we demonstrate, for individual droplets, fast, robust and complete separation of the magnetic beads. The beads are used as a carrier for one binding partner and hence, any bound molecule is separated likewise, while the segmentation into small microdroplets ensures fast mixing, and opens future prospects for droplet-wise analysis of drug candidate libraries. We employ the method for characterization of drug-protein binding, here warfarin to human serum albumin. The approach lays the basis for a microfluidic droplet-based screening device aimed at investigating the interactions of drugs with specific targets including enzymes and cells. Furthermore, the continuous method could be employed for various applications, such as binding assays, kinetic studies, and single cell analysis, in which rapid removal of a reactive component is required.
Authentication Binding between SSL/TLS and HTTP
NASA Astrophysics Data System (ADS)
Saito, Takamichi; Sekiguchi, Kiyomi; Hatsugai, Ryosuke
While the Secure Socket Layer or Transport Layer Security (SSL/TLS) is assumed to provide secure communications over the Internet, many web applications utilize basic or digest authentication of Hyper Text Transport Protocol (HTTP) over SSL/TLS. Namely, in the scheme, there are two different authentication schemes in a session. Since they are separated by a layer, these are not convenient for a web application. Moreover, the scheme may also cause problems in establishing secure communication. Then we provide a scheme of authentication binding between SSL/TLS and HTTP without modifying SSL/TLS protocols and its implementation, and we show the effectiveness of our proposed scheme.
NASA Astrophysics Data System (ADS)
Mulatsari, E.; Mumpuni, E.; Herfian, A.
2017-05-01
Curcumin is yellow colored phenolic compounds contained in Curcuma longa. Curcumin is known to have biological activities as anti-inflammatory, antiviral, antioxidant, and anti-infective agent [1]. Synthesis of curcumin analogue compounds has been done and some of them had biological activity like curcumin. In this research, the virtual screening of curcumin analogue compounds has been conducted. The purpose of this research was to determine the activity of these compounds as selective Cyclooxygenase-2inhibitors in in-silico. Binding mode elucidation was made by active and inactive representative compounds to see the interaction of the amino acids in the binding site of the compounds. This research used AYO_COX2_V.1.1, a structure-based virtual screening protocol (SBVS) that has been validated by Mumpuni E et al, 2014 [2]. AYO_COX2_V.1.1 protocol using a variety of integrated applications such as SPORES, PLANTS, BKchem, OpenBabel and PyMOL. The results of virtual screening conducted on 49 curcumin analogue compounds obtained 8 compounds with 4 active amino acid residues (GLY340, ILE503, PHE343, and PHE367) that were considered active as COX-2 inhibitor.
Recognition of the pro-mutagenic base uracil by family B DNA polymerases from archaea.
Shuttleworth, Gillian; Fogg, Mark J; Kurpiewski, Michael R; Jen-Jacobson, Linda; Connolly, Bernard A
2004-03-26
Archaeal family B DNA polymerases contain a specialised pocket that binds tightly to template-strand uracil, causing the stalling of DNA replication. The mechanism of this unique "template-strand proof-reading" has been studied using equilibrium binding measurements, DNA footprinting, van't Hoff analysis and calorimetry. Binding assays have shown that the polymerase preferentially binds to uracil in single as opposed to double-stranded DNA. Tightest binding is observed using primer-templates that contain uracil four bases in front of the primer-template junction, corresponding to the observed stalling position. Ethylation interference analysis of primer-templates shows that the two phosphates, immediately flanking the uracil (NpUpN), are important for binding; contacts are also made to phosphates in the primer-strand. Microcalorimetry and van't Hoff analysis have given a fuller understanding of the thermodynamic parameters involved in uracil recognition. All the results are consistent with a "read-ahead" mechanism, in which the replicating polymerase scans the template, ahead of the replication fork, for the presence of uracil and halts polymerisation on detecting this base. Post-stalling events, serving to eliminate uracil, await full elucidation.
Saleh, Noureldin; Ibrahim, Passainte; Saladino, Giorgio; Gervasio, Francesco Luigi; Clark, Timothy
2017-05-22
A generally applicable metadynamics scheme for predicting the free energy profile of ligand binding to G-protein-coupled receptors (GPCRs) is described. A common and effective collective variable (CV) has been defined using the ideally placed and highly conserved Trp6.48 as a reference point for ligand-GPCR distance measurement and the common orientation of GPCRs in the cell membrane. Using this single CV together with well-tempered multiple-walker metadynamics with a funnel-like boundary allows an efficient exploration of the entire ligand binding path from the extracellular medium to the orthosteric binding site, including vestibule and intermediate sites. The protocol can be used with X-ray structures or high-quality homology models (based on a high-quality template and after thorough refinement) for the receptor and is universally applicable to agonists, antagonists, and partial and reverse agonists. The root-mean-square error (RMSE) in predicted binding free energies for 12 diverse ligands in five receptors (a total of 23 data points) is surprisingly small (less than 1 kcal mol -1 ). The RMSEs for simulations that use receptor X-ray structures and homology models are very similar.
Sand, Olivier; Thomas-Chollier, Morgane; Vervisch, Eric; van Helden, Jacques
2008-01-01
This protocol shows how to access the Regulatory Sequence Analysis Tools (RSAT) via a programmatic interface in order to automate the analysis of multiple data sets. We describe the steps for writing a Perl client that connects to the RSAT Web services and implements a workflow to discover putative cis-acting elements in promoters of gene clusters. In the presented example, we apply this workflow to lists of transcription factor target genes resulting from ChIP-chip experiments. For each factor, the protocol predicts the binding motifs by detecting significantly overrepresented hexanucleotides in the target promoters and generates a feature map that displays the positions of putative binding sites along the promoter sequences. This protocol is addressed to bioinformaticians and biologists with programming skills (notions of Perl). Running time is approximately 6 min on the example data set.
Physical cryptographic verification of nuclear warheads
Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; ...
2016-07-18
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably securemore » cryptographic hash that does not rely on electronics or software. Finally, these techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.« less
NASA Astrophysics Data System (ADS)
Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano
2018-05-01
We present a rigorous security analysis of continuous-variable measurement-device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 107-109 quantum signal transmissions, depending on loss and noise, and on the required level of security.
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things.
Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido
2016-01-07
This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie-Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes.
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things
Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido
2016-01-01
This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie–Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes. PMID:26751454
NASA Astrophysics Data System (ADS)
Kurkcuoglu, Zeynep; Koukos, Panagiotis I.; Citro, Nevia; Trellet, Mikael E.; Rodrigues, J. P. G. L. M.; Moreira, Irina S.; Roel-Touris, Jorge; Melquiond, Adrien S. J.; Geng, Cunliang; Schaarschmidt, Jörg; Xue, Li C.; Vangone, Anna; Bonvin, A. M. J. J.
2018-01-01
We present the performance of HADDOCK, our information-driven docking software, in the second edition of the D3R Grand Challenge. In this blind experiment, participants were requested to predict the structures and binding affinities of complexes between the Farnesoid X nuclear receptor and 102 different ligands. The models obtained in Stage1 with HADDOCK and ligand-specific protocol show an average ligand RMSD of 5.1 Å from the crystal structure. Only 6/35 targets were within 2.5 Å RMSD from the reference, which prompted us to investigate the limiting factors and revise our protocol for Stage2. The choice of the receptor conformation appeared to have the strongest influence on the results. Our Stage2 models were of higher quality (13 out of 35 were within 2.5 Å), with an average RMSD of 4.1 Å. The docking protocol was applied to all 102 ligands to generate poses for binding affinity prediction. We developed a modified version of our contact-based binding affinity predictor PRODIGY, using the number of interatomic contacts classified by their type and the intermolecular electrostatic energy. This simple structure-based binding affinity predictor shows a Kendall's Tau correlation of 0.37 in ranking the ligands (7th best out of 77 methods, 5th/25 groups). Those results were obtained from the average prediction over the top10 poses, irrespective of their similarity/correctness, underscoring the robustness of our simple predictor. This results in an enrichment factor of 2.5 compared to a random predictor for ranking ligands within the top 25%, making it a promising approach to identify lead compounds in virtual screening.
NASA Astrophysics Data System (ADS)
Samuelsen, Simone V.; Solov'Yov, Ilia A.; Balboni, Imelda M.; Mellins, Elizabeth; Nielsen, Christoffer Tandrup; Heegaard, Niels H. H.; Astakhova, Kira
2016-10-01
New techniques to detect and quantify antibodies to nucleic acids would provide a significant advance over current methods, which often lack specificity. We investigate the potential of novel antigens containing locked nucleic acids (LNAs) as targets for antibodies. Particularly, employing molecular dynamics we predict optimal nucleotide composition for targeting DNA-binding antibodies. As a proof of concept, we address a problem of detecting anti-DNA antibodies that are characteristic of systemic lupus erythematosus, a chronic autoimmune disease with multiple manifestations. We test the best oligonucleotide binders in surface plasmon resonance studies to analyze binding and kinetic aspects of interactions between antigens and target DNA. These DNA and LNA/DNA sequences showed improved binding in enzyme-linked immunosorbent assay using human samples of pediatric lupus patients. Our results suggest that the novel method is a promising tool to create antigens for research and point-of-care monitoring of anti-DNA antibodies.
The tightly bound nuclei in the liquid drop model
NASA Astrophysics Data System (ADS)
Sree Harsha, N. R.
2018-05-01
In this paper, we shall maximise the binding energy per nucleon function in the semi-empirical mass formula of the liquid drop model of the atomic nuclei to analytically prove that the mean binding energy per nucleon curve has local extrema at A ≈ 58.6960, Z ≈ 26.3908 and at A ≈ 62.0178, Z ≈ 27.7506. The Lagrange method of multipliers is used to arrive at these results, while we have let the values of A and Z take continuous fractional values. The shell model that shows why 62Ni is the most tightly bound nucleus is outlined. A brief account on stellar nucleosynthesis is presented to show why 56Fe is more abundant than 62Ni and 58Fe. We believe that the analytical proof presented in this paper can be a useful tool to the instructors to introduce the nucleus with the highest mean binding energy per nucleon.
Characterization of chlorophyll binding to LIL3.
Mork-Jansson, Astrid Elisabeth; Eichacker, Lutz Andreas
2018-01-01
The light harvesting like protein 3 (LIL 3) from higher plants, has been linked to functions in chlorophyll and tocopherol biosynthesis, photo-protection and chlorophyll transfer. However, the binding of chlorophyll to LIL3 is unclear. We present a reconstitution protocol for chlorophyll binding to LIL3 in DDM micelles. It is shown in the absence of lipids and carotenoids that reconstitution of chlorophyll binding to in vitro expressed LIL3 requires pre-incubation of reaction partners at room temperature. We show chlorophyll a but not chlorophyll b binding to LIL3 at a molar ratio of 1:1. Neither dynamic light scattering nor native PAGE, enabled a discrimination between binding of chlorophyll a and/or b to LIL3.
J-PAKE: Authenticated Key Exchange without PKI
NASA Astrophysics Data System (ADS)
Hao, Feng; Ryan, Peter
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research in this field, there have been several PAKE protocols available. The EKE and SPEKE schemes are perhaps the two most notable examples. Both techniques are however patented. In this paper, we review these techniques in detail and summarize various theoretical and practical weaknesses. In addition, we present a new PAKE solution called J-PAKE. Our strategy is to depend on well-established primitives such as the Zero-Knowledge Proof (ZKP). So far, almost all of the past solutions have avoided using ZKP for the concern on efficiency. We demonstrate how to effectively integrate the ZKP into the protocol design and meanwhile achieve good efficiency. Our protocol has comparable computational efficiency to the EKE and SPEKE schemes with clear advantages on security.
A covert authentication and security solution for GMOs.
Mueller, Siguna; Jafari, Farhad; Roth, Don
2016-09-21
Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary. Herein, we present a new crypto protocol, that is applicable in broader settings, and embeds the authentication string indistinguishably from a random element in the signature space and the string is verified or denied without disclosing the actual signature. Results show that in a nucleotide string of 1000, the algorithm gives a correlation of 0.98 or higher between the distribution of the codon and that of E. coli, making the signature virtually invisible. This algorithm may be used to securely authenticate and validate GMOs without disclosing the actual signature. While this protocol uses watermarking, its novelty is in use of more complex cryptographic techniques based on zero knowledge proofs to encode information.
Aldeghi, Matteo; Bodkin, Michael J; Knapp, Stefan; Biggin, Philip C
2017-09-25
Binding free energy calculations that make use of alchemical pathways are becoming increasingly feasible thanks to advances in hardware and algorithms. Although relative binding free energy (RBFE) calculations are starting to find widespread use, absolute binding free energy (ABFE) calculations are still being explored mainly in academic settings due to the high computational requirements and still uncertain predictive value. However, in some drug design scenarios, RBFE calculations are not applicable and ABFE calculations could provide an alternative. Computationally cheaper end-point calculations in implicit solvent, such as molecular mechanics Poisson-Boltzmann surface area (MMPBSA) calculations, could too be used if one is primarily interested in a relative ranking of affinities. Here, we compare MMPBSA calculations to previously performed absolute alchemical free energy calculations in their ability to correlate with experimental binding free energies for three sets of bromodomain-inhibitor pairs. Different MMPBSA approaches have been considered, including a standard single-trajectory protocol, a protocol that includes a binding entropy estimate, and protocols that take into account the ligand hydration shell. Despite the improvements observed with the latter two MMPBSA approaches, ABFE calculations were found to be overall superior in obtaining correlation with experimental affinities for the test cases considered. A difference in weighted average Pearson ([Formula: see text]) and Spearman ([Formula: see text]) correlations of 0.25 and 0.31 was observed when using a standard single-trajectory MMPBSA setup ([Formula: see text] = 0.64 and [Formula: see text] = 0.66 for ABFE; [Formula: see text] = 0.39 and [Formula: see text] = 0.35 for MMPBSA). The best performing MMPBSA protocols returned weighted average Pearson and Spearman correlations that were about 0.1 inferior to ABFE calculations: [Formula: see text] = 0.55 and [Formula: see text] = 0.56 when including an entropy estimate, and [Formula: see text] = 0.53 and [Formula: see text] = 0.55 when including explicit water molecules. Overall, the study suggests that ABFE calculations are indeed the more accurate approach, yet there is also value in MMPBSA calculations considering the lower compute requirements, and if agreement to experimental affinities in absolute terms is not of interest. Moreover, for the specific protein-ligand systems considered in this study, we find that including an explicit ligand hydration shell or a binding entropy estimate in the MMPBSA calculations resulted in significant performance improvements at a negligible computational cost.
Binding mechanism of patulin to heat-treated yeast cell.
Guo, C; Yuan, Y; Yue, T; Hatab, S; Wang, Z
2012-12-01
This study aims to assess the removal mechanism of patulin using heat-treated Saccharomyces cerevisiae cells and identify the role of different cell wall components in the binding process. In order to understand the binding mechanism, viable cells, heat-treated cells, cell wall and intracellular extract were performed to assess their ability to remove patulin. Additionally, the effects of chemical and enzymatic treatments of yeast on the binding ability were tested. The results showed that there was no significant difference between viable (53·28%) and heat-treated yeast cells (51·71%) in patulin binding. In addition, the cell wall fraction decreased patulin by 35·05%, and the cell extract nearly failed to bind patulin. Treatments with protease E, methanol, formaldehyde, periodate or urea significantly decreased (P < 0·05) the ability of heat-treated cells to remove patulin. Fourier transform infrared (FTIR) analysis indicated that more functional groups were involved in the binding process of heat-treated cells. Polysaccharides and protein are important components of yeast cell wall involved in patulin removal. In addition, hydrophobic interactions play a major role in binding processes. Heat-treated S. cerevisiae cells could be used to control patulin contamination in the apple juice industry. Also, our results proof that the patulin removal process is based mainly on the adsorption not degradation. © 2012 The Society for Applied Microbiology.
Rupesh, Kanchi Ravi; Smith, Aaron; Boehmer, Paul E
2014-11-28
We have adapted the thermal shift assay to measure the ligand binding properties of the herpes simplex virus-1 single-strand DNA binding protein, ICP8. By measuring SYPRO Orange fluorescence in microtiter plates using a fluorescence-enabled thermal cycler, we have quantified the effects of oligonucleotide ligands on the melting temperature of ICP8. We found that single-stranded oligomers raise the melting temperature of ICP8 in a length- and concentration-dependent manner, ranging from 1°C for (dT)5 to a maximum of 9°C with oligomers ⩾10 nucleotides, with an apparent Kd of <1μM for (dT)20. Specifically, the results indicate that ICP8 is capable of interacting with oligomers as short as 5 nucleotides. Moreover, the observed increases in melting temperature of up to 9°C, indicates that single-strand DNA binding significantly stabilizes the structure of ICP8. This assay may be applied to investigate the ligand binding proteins of other single-strand DNA binding proteins and used as a high-throughput screen to identify compounds with therapeutic potential that inhibit single-strand DNA binding. As proof of concept, the single-strand DNA binding agent ciprofloxacin reduces the ligand induced stabilization of the melting temperature of ICP8 in a dose-dependent manner. Copyright © 2014 Elsevier Inc. All rights reserved.
Collocated Dataglyphs for large-message storage and retrieval
NASA Astrophysics Data System (ADS)
Motwani, Rakhi C.; Breidenbach, Jeff A.; Black, John R.
2004-06-01
In contrast to the security and integrity of electronic files, printed documents are vulnerable to damage and forgery due to their physical nature. Researchers at Palo Alto Research Center utilize DataGlyph technology to render digital characteristics to printed documents, which provides them with the facility of tamper-proof authentication and damage resistance. This DataGlyph document is known as GlyphSeal. Limited DataGlyph carrying capacity per printed page restricted the application of this technology to a domain of graphically simple and small-sized single-paged documents. In this paper the authors design a protocol motivated by techniques from the networking domain and back-up strategies, which extends the GlyphSeal technology to larger-sized, graphically complex, multi-page documents. This protocol provides fragmentation, sequencing and data loss recovery. The Collocated DataGlyph Protocol renders large glyph messages onto multiple printed pages and recovers the glyph data from rescanned versions of the multi-page documents, even when pages are missing, reordered or damaged. The novelty of this protocol is the application of ideas from RAID to the domain of DataGlyphs. The current revision of this protocol is capable of generating at most 255 pages, if page recovery is desired and does not provide enough data density to store highly detailed images in a reasonable amount of page space.
Haverkort, J J Mark; Leenen, Luke P H
2017-10-01
Presently used evaluation techniques rely on 3 traditional dimensions: reports from observers, registration system data, and observational cameras. Some of these techniques are observer-dependent and are not reproducible for a second review. This proof-of-concept study aimed to test the feasibility of extending evaluation to a fourth dimension, the patient's perspective. Footage was obtained during a large, full-scale hospital trauma drill. Two mock victims were equipped with point-of-view cameras filming from the patient's head. Based on the Major Incident Hospital's first experience during the drill, a protocol was developed for a prospective, standardized method to evaluate a hospital's major incident response from the patient's perspective. The protocol was then tested in a second drill for its feasibility. New insights were gained after review of the footage. The traditional observer missed some of the evaluation points, which were seen on the point-of-view cameras. The information gained from the patient's perspective proved to be implementable into the designed protocol. Use of point-of-view camera recordings from a mock patient's perspective is a valuable addition to traditional evaluation of trauma drills and trauma care. Protocols should be designed to optimize and objectify judgement of such footage. (Disaster Med Public Health Preparedness. 2017;11:594-599).
Computation of pH-Dependent Binding Free Energies
Kim, M. Olivia; McCammon, J. Andrew
2015-01-01
Protein-ligand binding accompanies changes in the surrounding electrostatic environments of the two binding partners and may lead to changes in protonation upon binding. In cases where the complex formation results in a net transfer of protons, the binding process is pH-dependent. However, conventional free energy computations or molecular docking protocols typically employ fixed protonation states for the titratable groups in both binding partners set a priori, which are identical for the free and bound states. In this review, we draw attention to these important yet largely ignored binding-induced protonation changes in protein-ligand association by outlining physical origins and prevalence of the protonation changes upon binding. Following a summary of various theoretical methods for pKa prediction, we discuss the theoretical framework to examine the pH dependence of protein-ligand binding processes. PMID:26202905
Parody, Nuria; Fuertes, Miguel Angel; Alonso, Carlos; Pico de Coaña, Yago
2013-01-01
The polcalcin family is one of the most epidemiologically relevant families of calcium-binding allergens. Polcalcins are potent plant allergens that contain one or several EF-hand motifs and their allergenicity is primarily associated with the Ca(2+)-bound form of the protein. Conformation, stability, as well as IgE recognition of calcium-binding allergens greatly depend on the presence of protein-bound calcium ions. We describe a protocol that uses three techniques (SDS-PAGE, circular dichroism spectroscopy, and ELISA) to describe the effects that calcium has on the structural changes in an allergen and its IgE binding properties.
Development and characterization of antibody reagents for detecting nanoparticles
NASA Astrophysics Data System (ADS)
Ravichandran, Supriya; Sullivan, Mark A.; Callahan, Linda M.; Bentley, Karen L.; Delouise, Lisa A.
2015-11-01
The increasing use of nanoparticles (NPs) in technological applications and in commercial products has escalated environmental health and safety concerns. The detection of NPs in the environment and in biological systems is challenged by limitations associated with commonly used analytical techniques. In this paper we report on the development and characterization of NP binding antibodies, termed NProbes. Phage display methodology was used to discover antibodies that bind NPs dispersed in solution. We present a proof-of-concept for the generation of NProbes and their use for detecting quantum dots and titanium dioxide NPs in vitro and in an ex vivo human skin model. Continued development and refinement of NProbes to detect NPs that vary in composition, shape, size, and surface coating will comprise a powerful tool kit that can be used to advance nanotechnology research particularly in the nanotoxicology and nanotherapeutics fields.The increasing use of nanoparticles (NPs) in technological applications and in commercial products has escalated environmental health and safety concerns. The detection of NPs in the environment and in biological systems is challenged by limitations associated with commonly used analytical techniques. In this paper we report on the development and characterization of NP binding antibodies, termed NProbes. Phage display methodology was used to discover antibodies that bind NPs dispersed in solution. We present a proof-of-concept for the generation of NProbes and their use for detecting quantum dots and titanium dioxide NPs in vitro and in an ex vivo human skin model. Continued development and refinement of NProbes to detect NPs that vary in composition, shape, size, and surface coating will comprise a powerful tool kit that can be used to advance nanotechnology research particularly in the nanotoxicology and nanotherapeutics fields. Electronic supplementary information (ESI) available: Figures and detailed methods of various techniques used. See DOI: 10.1039/c5nr04882f
Isolation of high-quality total RNA from leaves of Myrciaria dubia "CAMU CAMU".
Gómez, Juan Carlos Castro; Reátegui, Alina Del Carmen Egoavil; Flores, Julián Torres; Saavedra, Roberson Ramírez; Ruiz, Marianela Cobos; Correa, Sixto Alfredo Imán
2013-01-01
Myrciaria dubia is a main source of vitamin C for people in the Amazon region. Molecular studies of M. dubia require high-quality total RNA from different tissues. So far, no protocols have been reported for total RNA isolation from leaves of this species. The objective of this research was to develop protocols for extracting high-quality total RNA from leaves of M. dubia. Total RNA was purified following two modified protocols developed for leaves of other species (by Zeng and Yang, and by Reid et al.) and one modified protocol developed for fruits of the studied species (by Silva). Quantity and quality of purified total RNA were assessed by spectrophotometric and electrophoretic analysis. Additionally, quality of total RNA was evaluated with reverse-transcription polymerase chain reaction (RT-PCR). With these three modified protocols we were able to isolate high-quality RNA (A260nm/A280nm >1.9 and A260nm/A230nm >2.0). Highest yield was produced with the Zeng and Yang modified protocol (384±46µg ARN/g fresh weight). Furthermore, electrophoretic analysis showed the integrity of isolated RNA and the absence of DNA. Another proof of the high quality of our purified RNA was the successful cDNA synthesis and amplification of a segment of the M. dubia actin 1 gene. We report three modified protocols for isolation total RNA from leaves of M. dubia. The modified protocols are easy, rapid, low in cost, and effective for high-quality and quantity total RNA isolation suitable for cDNA synthesis and polymerase chain reaction.
NASA Astrophysics Data System (ADS)
Xi, Huixing
2017-05-01
Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.
Postprocessing of docked protein-ligand complexes using implicit solvation models.
Lindström, Anton; Edvinsson, Lotta; Johansson, Andreas; Andersson, C David; Andersson, Ida E; Raubacher, Florian; Linusson, Anna
2011-02-28
Molecular docking plays an important role in drug discovery as a tool for the structure-based design of small organic ligands for macromolecules. Possible applications of docking are identification of the bioactive conformation of a protein-ligand complex and the ranking of different ligands with respect to their strength of binding to a particular target. We have investigated the effect of implicit water on the postprocessing of binding poses generated by molecular docking using MM-PB/GB-SA (molecular mechanics Poisson-Boltzmann and generalized Born surface area) methodology. The investigation was divided into three parts: geometry optimization, pose selection, and estimation of the relative binding energies of docked protein-ligand complexes. Appropriate geometry optimization afforded more accurate binding poses for 20% of the complexes investigated. The time required for this step was greatly reduced by minimizing the energy of the binding site using GB solvation models rather than minimizing the entire complex using the PB model. By optimizing the geometries of docking poses using the GB(HCT+SA) model then calculating their free energies of binding using the PB implicit solvent model, binding poses similar to those observed in crystal structures were obtained. Rescoring of these poses according to their calculated binding energies resulted in improved correlations with experimental binding data. These correlations could be further improved by applying the postprocessing to several of the most highly ranked poses rather than focusing exclusively on the top-scored pose. The postprocessing protocol was successfully applied to the analysis of a set of Factor Xa inhibitors and a set of glycopeptide ligands for the class II major histocompatibility complex (MHC) A(q) protein. These results indicate that the protocol for the postprocessing of docked protein-ligand complexes developed in this paper may be generally useful for structure-based design in drug discovery.
Topics in quantum cryptography, quantum error correction, and channel simulation
NASA Astrophysics Data System (ADS)
Luo, Zhicheng
In this thesis, we mainly investigate four different topics: efficiently implementable codes for quantum key expansion [51], quantum error-correcting codes based on privacy amplification [48], private classical capacity of quantum channels [44], and classical channel simulation with quantum side information [49, 50]. For the first topic, we propose an efficiently implementable quantum key expansion protocol, capable of increasing the size of a pre-shared secret key by a constant factor. Previously, the Shor-Preskill proof [64] of the security of the Bennett-Brassard 1984 (BB84) [6] quantum key distribution protocol relied on the theoretical existence of good classical error-correcting codes with the "dual-containing" property. But the explicit and efficiently decodable construction of such codes is unknown. We show that we can lift the dual-containing constraint by employing the non-dual-containing codes with excellent performance and efficient decoding algorithms. For the second topic, we propose a construction of Calderbank-Shor-Steane (CSS) [19, 68] quantum error-correcting codes, which are originally based on pairs of mutually dual-containing classical codes, by combining a classical code with a two-universal hash function. We show, using the results of Renner and Koenig [57], that the communication rates of such codes approach the hashing bound on tensor powers of Pauli channels in the limit of large block-length. For the third topic, we prove a regularized formula for the secret key assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak on entanglement assisted quantum communication capacity. This formula provides a new family protocol, the private father protocol, under the resource inequality framework that includes the private classical communication without the assisted secret keys as a child protocol. For the fourth topic, we study and solve the problem of classical channel simulation with quantum side information at the receiver. Our main theorem has two important corollaries: rate-distortion theory with quantum side information and common randomness distillation. Simple proofs of achievability of classical multi-terminal source coding problems can be made via a unified approach using the channel simulation theorem as building blocks. The fully quantum generalization of the problem is also conjectured with outer and inner bounds on the achievable rate pairs.
Schaal, Patrick A; Besmehn, Astrid; Maynicke, Eva; Noyong, Michael; Beschoten, Bernd; Simon, Ulrich
2012-02-07
We report the formation of thiol nanopatterns on SAM covered silicon wafers by converting sulfonic acid head groups via e-beam lithography. These thiol groups act as binding sites for gold nanoparticles, which can be enhanced to form electrically conducting nanostructures. This approach serves as a proof-of-concept for the combination of top-down and bottom-up processes for the generation of electrical devices on silicon.
Experimental extraction of secure correlations from a noisy private state.
Dobek, K; Karpiński, M; Demkowicz-Dobrzański, R; Banaszek, K; Horodecki, P
2011-01-21
We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies to extract the key is exposed by an implementation of an entanglement distillation protocol for the produced state.
Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions
2013-01-01
assumptions (e.g., [DS98, Dam00, CGGM00, Gol02, PTV12, GJO+12]), or in alternative models (e.g., super -polynomial-time simulation [Pas03b, PV10]). In the...T (·)-time computations, where T (·) is some “nice” (slightly) super -polynomial function (e.g., T (n) = nlog log logn). We refer to such proof...put a cap on both using a (slightly) super -polynomial function, and thus to guarantee soundness of the concurrent zero-knowledge protocol, we need
Boron neutron capture therapy for oral precancer: proof of principle in an experimental animal model
DOE Office of Scientific and Technical Information (OSTI.GOV)
A. Monti Hughes; ECC Pozzi; S. Thorp
Field-cancerized tissue can give rise to second primary tumours, causing therapeutic failure. Boron neutron capture therapy (BNCT) is based on biological targeting and would serve to treat undetectable foci of malignant transformation. The aim of this study was to optimize BNCT for the integral treatment for oral cancer, with particular emphasis on the inhibitory effect on tumour development originating in precancerous conditions, and radiotoxicity of different BNCT protocols in a hamster cheek pouch oral precancer model.
Demonstration of measurement-only blind quantum computing
NASA Astrophysics Data System (ADS)
Greganti, Chiara; Roehsner, Marie-Christine; Barz, Stefanie; Morimae, Tomoyuki; Walther, Philip
2016-01-01
Blind quantum computing allows for secure cloud networks of quasi-classical clients and a fully fledged quantum server. Recently, a new protocol has been proposed, which requires a client to perform only measurements. We demonstrate a proof-of-principle implementation of this measurement-only blind quantum computing, exploiting a photonic setup to generate four-qubit cluster states for computation and verification. Feasible technological requirements for the client and the device-independent blindness make this scheme very applicable for future secure quantum networks.
Initiated Protocol Telephony Feasibility for the US Navy, Embedded Proof-of-Concept
2011-03-01
2.1 Generating Certificates Using Open SSL 1. OpenSSL can be used to generate certificates. There are a number of helper scripts written in Perl that...help with the creation and maintenance of the certificate and keys. OpenSSL is available from a number of sites, i.e., slproweb.com. The default...installation is adequate although it may be useful to add the OpenSSL \\bin directory to the system environment variable PATH. Perl is also available
Scientific Research in Homeopathic Medicine: Validation, Methodology and Perspectives
2007-01-01
Verona's School of Homeopathic Medicine (www.omeopatia.org) organized a day of full immersion in the field of homeopathy, focusing on the validity of this much-debated discipline. There is widespread consensus in the medical community that evidence-based medicine is the best standard for assessing efficacy and safety of healthcare practices, and systematic reviews with strict protocols are essential to establish proof for various therapies. Students, homeopathic practitioners, academic and business representatives, who are interested in or curious about homeopathic practices attended the conference.
Sampling protein motion and solvent effect during ligand binding
Limongelli, Vittorio; Marinelli, Luciana; Cosconati, Sandro; La Motta, Concettina; Sartini, Stefania; Mugnaini, Laura; Da Settimo, Federico; Novellino, Ettore; Parrinello, Michele
2012-01-01
An exhaustive description of the molecular recognition mechanism between a ligand and its biological target is of great value because it provides the opportunity for an exogenous control of the related process. Very often this aim can be pursued using high resolution structures of the complex in combination with inexpensive computational protocols such as docking algorithms. Unfortunately, in many other cases a number of factors, like protein flexibility or solvent effects, increase the degree of complexity of ligand/protein interaction and these standard techniques are no longer sufficient to describe the binding event. We have experienced and tested these limits in the present study in which we have developed and revealed the mechanism of binding of a new series of potent inhibitors of Adenosine Deaminase. We have first performed a large number of docking calculations, which unfortunately failed to yield reliable results due to the dynamical character of the enzyme and the complex role of the solvent. Thus, we have stepped up the computational strategy using a protocol based on metadynamics. Our approach has allowed dealing with protein motion and solvation during ligand binding and finally identifying the lowest energy binding modes of the most potent compound of the series, 4-decyl-pyrazolo[1,5-a]pyrimidin-7-one. PMID:22238423
Genetically-Engineered Proteins For Functional Nanoinorganics
2007-02-28
CD) protocols have been successfully implemented; noble metals (Au and Ag, in addition to Pt and Pd previously selected) and oxides ( hydroxyapatite ...nanomasks (Schwartz, Baneyx, and Sarikaya); 7. Biofabrication of material using genetically selected and designed peptides, including hydroxyapatite ...Pt-, silica, and hydroxyapatite -binding peptides) have been determined, and related to their functions (binding and assembly). Again, for the
2016-01-01
Many excellent methods exist that incorporate cryo-electron microscopy (cryoEM) data to constrain computational protein structure prediction and refinement. Previously, it was shown that iteration of two such orthogonal sampling and scoring methods – Rosetta and molecular dynamics (MD) simulations – facilitated exploration of conformational space in principle. Here, we go beyond a proof-of-concept study and address significant remaining limitations of the iterative MD–Rosetta protein structure refinement protocol. Specifically, all parts of the iterative refinement protocol are now guided by medium-resolution cryoEM density maps, and previous knowledge about the native structure of the protein is no longer necessary. Models are identified solely based on score or simulation time. All four benchmark proteins showed substantial improvement through three rounds of the iterative refinement protocol. The best-scoring final models of two proteins had sub-Ångstrom RMSD to the native structure over residues in secondary structure elements. Molecular dynamics was most efficient in refining secondary structure elements and was thus highly complementary to the Rosetta refinement which is most powerful in refining side chains and loop regions. PMID:25883538
Phage display selection of peptides that target calcium-binding proteins.
Vetter, Stefan W
2013-01-01
Phage display allows to rapidly identify peptide sequences with binding affinity towards target proteins, for example, calcium-binding proteins (CBPs). Phage technology allows screening of 10(9) or more independent peptide sequences and can identify CBP binding peptides within 2 weeks. Adjusting of screening conditions allows selecting CBPs binding peptides that are either calcium-dependent or independent. Obtained peptide sequences can be used to identify CBP target proteins based on sequence homology or to quickly obtain peptide-based CBP inhibitors to modulate CBP-target interactions. The protocol described here uses a commercially available phage display library, in which random 12-mer peptides are displayed on filamentous M13 phages. The library was screened against the calcium-binding protein S100B.
Characterization of chlorophyll binding to LIL3
Mork-Jansson, Astrid Elisabeth
2018-01-01
The light harvesting like protein 3 (LIL 3) from higher plants, has been linked to functions in chlorophyll and tocopherol biosynthesis, photo-protection and chlorophyll transfer. However, the binding of chlorophyll to LIL3 is unclear. We present a reconstitution protocol for chlorophyll binding to LIL3 in DDM micelles. It is shown in the absence of lipids and carotenoids that reconstitution of chlorophyll binding to in vitro expressed LIL3 requires pre-incubation of reaction partners at room temperature. We show chlorophyll a but not chlorophyll b binding to LIL3 at a molar ratio of 1:1. Neither dynamic light scattering nor native PAGE, enabled a discrimination between binding of chlorophyll a and/or b to LIL3. PMID:29390011
Burmester, Mike; Munilla, Jorge; Ortiz, Andrés; Caballero-Gil, Pino
2017-07-04
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of "simulatenous" presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions.
Discovery of HDAC Inhibitors That Lack an Active Site Zn(2+)-Binding Functional Group.
Vickers, Chris J; Olsen, Christian A; Leman, Luke J; Ghadiri, M Reza
2012-06-14
Natural and synthetic histone deacetylase (HDAC) inhibitors generally derive their strong binding affinity and high potency from a key functional group that binds to the Zn(2+) ion within the enzyme active site. However, this feature is also thought to carry the potential liability of undesirable off-target interactions with other metalloenzymes. As a step toward mitigating this issue, here, we describe the design, synthesis, and structure-activity characterizations of cyclic α3β-tetrapeptide HDAC inhibitors that lack the presumed indispensable Zn(2+)-binding group. The lead compounds (e.g., 15 and 26) display good potency against class 1 HDACs and are active in tissue culture against various human cancer cell lines. Importantly, enzymological analysis of 26 indicates that the cyclic α3β-tetrapeptide is a fast-on/off competitive inhibitor of HDACs 1-3 with K i values of 49, 33, and 37 nM, respectively. Our proof of principle study supports the idea that novel classes of HDAC inhibitors, which interact at the active-site opening, but not with the active site Zn(2+), can have potential in drug design.
Schröter, Christian; Günther, Ralf; Rhiel, Laura; Becker, Stefan; Toleikis, Lars; Doerner, Achim; Becker, Janine; Schönemann, Andreas; Nasu, Daichi; Neuteboom, Berend; Kolmar, Harald; Hock, Björn
2015-01-01
There is growing interest in the fast and robust engineering of protein pH-sensitivity that aims to reduce binding at acidic pH, compared to neutral pH. Here, we describe a novel strategy for the incorporation of pH-sensitive antigen binding functions into antibody variable domains using combinatorial histidine scanning libraries and yeast surface display. The strategy allows simultaneous screening for both, high affinity binding at pH 7.4 and pH-sensitivity, and excludes conventional negative selection steps. As proof of concept, we applied this strategy to incorporate pH-dependent antigen binding into the complementary-determining regions of adalimumab. After 3 consecutive rounds of separate heavy and light chain library screening, pH-sensitive variants could be isolated. Heavy and light chain mutations were combined, resulting in 3 full-length antibody variants that revealed sharp, reversible pH-dependent binding profiles. Dissociation rate constants at pH 6.0 increased 230- to 780-fold, while high affinity binding at pH 7.4 in the sub-nanomolar range was retained. Furthermore, binding to huFcRn and thermal stability were not affected by histidine substitutions. Overall, this study emphasizes a generalizable strategy for engineering pH-switch functions potentially applicable to a variety of antibodies and further proteins-based therapeutics.
Borthwick, Nicola J; Lane, Thirusha; Moyo, Nathifa; Crook, Alison; Shim, Jung Min; Baines, Ian; Wee, Edmund G; Hawkins, Philip N; Gillmore, Julian D; Hanke, Tomáš; Pepys, Mark B
2018-01-01
The failure of DNA vaccination in humans, in contrast to its efficacy in some species, is unexplained. Observational and interventional experimental evidence suggests that DNA immunogenicity may be prevented by binding of human serum amyloid P component (SAP). SAP is the single normal DNA binding protein in human plasma. The drug (R)-1-[6-[(R)-2-carboxypyrrolidin-1-yl]-6-oxo-hexanoyl]pyrrolidine-2-carboxylic acid (CPHPC, miridesap), developed for treatment of systemic amyloidosis and Alzheimer's disease, depletes circulating SAP by 95-99%. The proof-of-concept HIV-CORE 003 clinical trial tested whether SAP depletion by CPHPC would enhance the immune response in human volunteers to DNA vaccination delivering the HIVconsv immunogen derived from conserved sub-protein regions of HIV-1. Human volunteers received 3 intramuscular immunizations with an experimental DNA vaccine (DDD) expressing HIV-1-derived immunogen HIVconsv, with or without prior depletion of SAP by CPHPC. All subjects were subsequently boosted by simian (chimpanzee) adenovirus (C)- and poxvirus MVA (M)-vectored vaccines delivering the same immunogen. After administration of each vaccine modality, the peak total magnitudes, kinetics, functionality and memory subsets of the T-cell responses to HIVconsv were thoroughly characterized. No differences were observed between the CPHPC treated and control groups in any of the multiple quantitative and qualitative parameters of the T-cell responses to HIVconsv, except that after SAP depletion, there was a statistically significantly greater breadth of T-cell specificities, that is the number of recognized epitopes, following the DDDC vaccination. The protocol used here for SAP depletion by CPHPC prior to DNA vaccination produced only a very modest suggestion of enhanced immunogenicity. Further studies will be required to determine whether SAP depletion might have a practical value in DNA vaccination for other plasmid backbones and/or immunogens. Clinicaltrials.gov NCT02425241.
NASA Astrophysics Data System (ADS)
Réau, Manon; Langenfeld, Florent; Zagury, Jean-François; Montes, Matthieu
2018-01-01
The Drug Design Data Resource (D3R) Grand Challenges are blind contests organized to assess the state-of-the-art methods accuracy in predicting binding modes and relative binding free energies of experimentally validated ligands for a given target. The second stage of the D3R Grand Challenge 2 (GC2) was focused on ranking 102 compounds according to their predicted affinity for Farnesoid X Receptor. In this task, our workflow was ranked 5th out of the 77 submissions in the structure-based category. Our strategy consisted in (1) a combination of molecular docking using AutoDock 4.2 and manual edition of available structures for binding poses generation using SeeSAR, (2) the use of HYDE scoring for pose selection, and (3) a hierarchical ranking using HYDE and MM/GBSA. In this report, we detail our pose generation and ligands ranking protocols and provide guidelines to be used in a prospective computer aided drug design program.
Kresoja-Rakic, Jelena; Felley-Bosco, Emanuela
2018-04-25
The in vitro RNA-pulldown is still largely used in the first steps of protocols aimed at identifying RNA-binding proteins that recognize specific RNA structures and motifs. In this RNA-pulldown protocol, commercially synthesized RNA probes are labeled with a modified form of biotin, desthiobiotin, at the 3' terminus of the RNA strand, which reversibly binds to streptavidin and thus allows elution of proteins under more physiological conditions. The RNA-desthiobiotin is immobilized through interaction with streptavidin on magnetic beads, which are used to pull down proteins that specifically interact with the RNA of interest. Non-denatured and active proteins from the cytosolic fraction of mesothelioma cells are used as the source of proteins. The method described here can be applied to detect the interaction between known RNA binding proteins and a 25-nucleotide (nt) long RNA probe containing a sequence of interest. This is useful to complete the functional characterization of stabilizing or destabilizing elements present in RNA molecules achieved using a reporter vector assay.
Pernomian, Larissa; Gomes, Mayara Santos; Moreira, Josimar Dornelas; da Silva, Carlos Henrique Tomich de Paula; Rosa, Joaquin Maria Campos; Cardoso, Cristina Ribeiro de Barros
2017-01-01
One of the cornerstones of rational drug development is the measurement of molecular parameters derived from ligand-receptor interaction, which guides therapeutic windows definition. Over the last decades, radioligand binding has provided valuable contributions in this field as key method for such purposes. However, its limitations spurred the development of more exquisite techniques for determining such parameters. For instance, safety risks related to radioactivity waste, expensive and controlled disposal of radioisotopes, radiotracer separation-dependence for affinity analysis, and one-site mathematical models-based fitting of data make radioligand binding a suboptimal approach in providing measures of actual affinity conformations from ligands and G proteincoupled receptors (GPCR). Current advances on high-throughput screening (HTS) assays have markedly extended the options of sparing sensitive ways for monitoring ligand affinity. The advent of the novel bioluminescent donor NanoLuc luciferase (Nluc), engineered from Oplophorus gracilirostris luciferase, allowed fitting bioluminescence resonance energy transfer (BRET) for monitoring ligand binding. Such novel approach named Nluc-based BRET (NanoBRET) binding assay consists of a real-time homogeneous proximity assay that overcomes radioligand binding limitations but ensures the quality in affinity measurements. Here, we cover the main advantages of NanoBRET protocol and the undesirable drawbacks of radioligand binding as molecular methods that span pharmacological toolbox applied to Drug Discovery. Also, we provide a novel perspective for the application of NanoBRET technology in affinity assays for multiple-state binding mechanisms involving oligomerization and/or functional biased selectivity. This new angle was proposed based on specific biophysical criteria required for the real-time homogeneity assigned to the proximity NanoBRET protocol. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.
ERIC Educational Resources Information Center
John, Nancy J.; Firestone, Gary L.
1987-01-01
Describes two complementary laboratory exercises that use the glass fiber assay to assess receptor specificity and hormone binding affinity in rat liver cytoplasmic extracts. Details the methods, materials and protocol of the experiments. Discusses the basic concepts illustrated and the feasibility of using the experiments at the undergraduate…
NASA Astrophysics Data System (ADS)
Polgár, Tímea; Menyhárd, Dóra K.; Keserű, György M.
2007-09-01
An effective virtual screening protocol was developed against an extended active site of CYP2C9, which was derived from X-ray structures complexed with flubiprofen and S-warfarin. Virtual screening has been effectively supported by our structure-based pharmacophore model. Importance of hot residues identified by mutation data and structural analysis was first estimated in an enrichment study. Key role of Arg108 and Phe114 in ligand binding was also underlined. Our screening protocol successfully identified 76% of known CYP2C9 ligands in the top 1% of the ranked database resulting 76-fold enrichment relative to random situation. Relevance of the protocol was further confirmed in selectivity studies, when 89% of CYP2C9 ligands were retrieved from a mixture of CYP2C9 and CYP2C8 ligands, while only 22% of CYP2C8 ligands were found applying the structure-based pharmacophore constraints. Moderate discrimination of CYP2C9 ligands from CYP2C18 and CYP2C19 ligands could also be achieved extending the application domain of our virtual screening protocol for the entire CYP2C family. Our findings further demonstrate the existence of an active site comprising of at least two binding pockets and strengthens the need of involvement of protein flexibility in virtual screening.
Zou, Yi; Wang, Fang; Wang, Yan; Guo, Wenjie; Zhang, Yihua; Xu, Qiang; Lai, Yisheng
2017-05-05
Indoleamine 2,3-dioxygenase 1 (IDO1) is regarded as an attractive target for cancer immunotherapy. To rationalize the detailed interactions between IDO1 and its inhibitors at the atomic level, an integrated computational approach by combining molecular mechanics and quantum mechanics methods was employed in this report. Specifically, the binding modes of 20 inhibitors was initially investigated using the induced fit docking (IFD) protocol, which outperformed other two docking protocols in terms of correctly predicting ligand conformations. Secondly, molecular dynamics (MD) simulations and MM/PBSA free energy calculations were employed to determine the dynamic binding process and crucial residues were confirmed through close contact analysis, hydrogen-bond analysis and binding free energy decomposition calculations. Subsequent quantum mechanics and nonbonding interaction analysis were carried out to provide in-depth explanations on the critical role of those key residues, and Arg231 and 7-propionate of the heme group were major contributors to ligand binding, which lowed a great amount of interaction energy. We anticipate that these findings will be valuable for enzymatic studies and rational drug design. Copyright © 2017. Published by Elsevier Masson SAS.
Hidden relationships between metalloproteins unveiled by structural comparison of their metal sites
NASA Astrophysics Data System (ADS)
Valasatava, Yana; Andreini, Claudia; Rosato, Antonio
2015-03-01
Metalloproteins account for a substantial fraction of all proteins. They incorporate metal atoms, which are required for their structure and/or function. Here we describe a new computational protocol to systematically compare and classify metal-binding sites on the basis of their structural similarity. These sites are extracted from the MetalPDB database of minimal functional sites (MFSs) in metal-binding biological macromolecules. Structural similarity is measured by the scoring function of the available MetalS2 program. Hierarchical clustering was used to organize MFSs into clusters, for each of which a representative MFS was identified. The comparison of all representative MFSs provided a thorough structure-based classification of the sites analyzed. As examples, the application of the proposed computational protocol to all heme-binding proteins and zinc-binding proteins of known structure highlighted the existence of structural subtypes, validated known evolutionary links and shed new light on the occurrence of similar sites in systems at different evolutionary distances. The present approach thus makes available an innovative viewpoint on metalloproteins, where the functionally crucial metal sites effectively lead the discovery of structural and functional relationships in a largely protein-independent manner.
Discrimination between olfactory receptor agonists and non-agonists.
Topin, Jérémie; de March, Claire A; Charlier, Landry; Ronin, Catherine; Antonczak, Serge; Golebiowski, Jérôme
2014-08-11
A joint approach combining free-energy calculations and calcium-imaging assays on the broadly tuned human 1G1 olfactory receptor is reported. The free energy of binding of ten odorants was computed by means of molecular-dynamics simulations. This state function allows separating the experimentally determined eight agonists from the two non-agonists. This study constitutes a proof-of-principle for the computational deorphanization of olfactory receptors. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Zhou, Peng; Wang, Congcong; Tian, Feifei; Ren, Yanrong; Yang, Chao; Huang, Jian
2013-01-01
Quantitative structure-activity relationship (QSAR), a regression modeling methodology that establishes statistical correlation between structure feature and apparent behavior for a series of congeneric molecules quantitatively, has been widely used to evaluate the activity, toxicity and property of various small-molecule compounds such as drugs, toxicants and surfactants. However, it is surprising to see that such useful technique has only very limited applications to biomacromolecules, albeit the solved 3D atom-resolution structures of proteins, nucleic acids and their complexes have accumulated rapidly in past decades. Here, we present a proof-of-concept paradigm for the modeling, prediction and interpretation of the binding affinity of 144 sequence-nonredundant, structure-available and affinity-known protein complexes (Kastritis et al. Protein Sci 20:482-491, 2011) using a biomacromolecular QSAR (BioQSAR) scheme. We demonstrate that the modeling performance and predictive power of BioQSAR are comparable to or even better than that of traditional knowledge-based strategies, mechanism-type methods and empirical scoring algorithms, while BioQSAR possesses certain additional features compared to the traditional methods, such as adaptability, interpretability, deep-validation and high-efficiency. The BioQSAR scheme could be readily modified to infer the biological behavior and functions of other biomacromolecules, if their X-ray crystal structures, NMR conformation assemblies or computationally modeled structures are available.
Asynchronous Messaging and Data Transfer in a Spacecraft: An Implementation
NASA Technical Reports Server (NTRS)
Moholt, Joseph M.
2005-01-01
Data transfer and messaging is an important part of a spacecraft. Creating a standard protocol for messaging that can be used for a variety of applications is an extremely beneficial project at the Jet Propulsion Laboratory (JPL). The Asynchronous Messaging Service (AMS) is a protocol outlining how subsystems initialize and conduct communication between each other. There are currently two implementations of AMS in the works. At JPL, my task is to get a working implementation of AMS onto vxWorks as a proof of concept. An Autocoder, a program used to convert visually created state chart diagrams to C++, has also been created to accomplish a part of the implementation. I was assigned to make the program portable on any Unix type environment. Lastly, I was to develop a program to demonstrate messaging between two FireWire cards running vxworks.
Experimental quantum fingerprinting with weak coherent pulses
Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong
2015-01-01
Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity. PMID:26515586
Experimental quantum fingerprinting with weak coherent pulses.
Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong
2015-10-30
Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity.
Experimental quantum fingerprinting with weak coherent pulses
NASA Astrophysics Data System (ADS)
Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong
2015-10-01
Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity.
Lee, Alyssa Sara; Ozakinci, Gozde; Leung, Steve; Humphris, Gerry; Dale, Hannah; Hamlet, Neil
2016-01-01
Previous research has shown diagnosis or screening for cancer may be a 'teachable moment' for prevention through lifestyle change. Previous trials have been successful but have been delivered via national programmes targeting patients being screened for colorectal cancer. This manuscript reports the protocol for a proof-of-concept study to assess the feasibility and acceptability of a lifestyle change service targeting men suspected or diagnosed with cancer of the prostate in a secondary care cancer service within the UK. Lifestyle change will be promoted through integration of a lifestyle change service in a urology department in one NHS Board. The service is delivered by a Health Psychologist and uses motivational interviewing and behavioural change techniques to motivate and support patients to consider and address topics such as increasing physical activity and a healthy diet, smoking cessation, alcohol reduction and weight loss. A service evaluation will assess feasibility and acceptability via a patient experience survey, a survey exploring staff knowledge, attitudes and practice, pre- and post-intervention lifestyle behaviour survey and an audit of routine patient database. This pilot will assess the viability of using cancer testing and diagnosis as a teachable moment for lifestyle change in a unique population (i.e. men with suspected cancer of the prostate). If successful, this approach offers potential for preventative services to enhance routine and person-centred clinical cancer care provided within secondary care settings.
Validating metal binding sites in macromolecule structures using the CheckMyMetal web server
Zheng, Heping; Chordia, Mahendra D.; Cooper, David R.; Chruszcz, Maksymilian; Müller, Peter; Sheldrick, George M.
2015-01-01
Metals play vital roles in both the mechanism and architecture of biological macromolecules. Yet structures of metal-containing macromolecules where metals are misidentified and/or suboptimally modeled are abundant in the Protein Data Bank (PDB). This shows the need for a diagnostic tool to identify and correct such modeling problems with metal binding environments. The "CheckMyMetal" (CMM) web server (http://csgid.org/csgid/metal_sites/) is a sophisticated, user-friendly web-based method to evaluate metal binding sites in macromolecular structures in respect to 7350 metal binding sites observed in a benchmark dataset of 2304 high resolution crystal structures. The protocol outlines how the CMM server can be used to detect geometric and other irregularities in the structures of metal binding sites and alert researchers to potential errors in metal assignment. The protocol also gives practical guidelines for correcting problematic sites by modifying the metal binding environment and/or redefining metal identity in the PDB file. Several examples where this has led to meaningful results are described in the anticipated results section. CMM was designed for a broad audience—biomedical researchers studying metal-containing proteins and nucleic acids—but is equally well suited for structural biologists to validate new structures during modeling or refinement. The CMM server takes the coordinates of a metal-containing macromolecule structure in the PDB format as input and responds within a few seconds for a typical protein structure modeled with a few hundred amino acids. PMID:24356774
Feinstein, Wei P; Brylinski, Michal
2015-01-01
Computational approaches have emerged as an instrumental methodology in modern research. For example, virtual screening by molecular docking is routinely used in computer-aided drug discovery. One of the critical parameters for ligand docking is the size of a search space used to identify low-energy binding poses of drug candidates. Currently available docking packages often come with a default protocol for calculating the box size, however, many of these procedures have not been systematically evaluated. In this study, we investigate how the docking accuracy of AutoDock Vina is affected by the selection of a search space. We propose a new procedure for calculating the optimal docking box size that maximizes the accuracy of binding pose prediction against a non-redundant and representative dataset of 3,659 protein-ligand complexes selected from the Protein Data Bank. Subsequently, we use the Directory of Useful Decoys, Enhanced to demonstrate that the optimized docking box size also yields an improved ranking in virtual screening. Binding pockets in both datasets are derived from the experimental complex structures and, additionally, predicted by eFindSite. A systematic analysis of ligand binding poses generated by AutoDock Vina shows that the highest accuracy is achieved when the dimensions of the search space are 2.9 times larger than the radius of gyration of a docking compound. Subsequent virtual screening benchmarks demonstrate that this optimized docking box size also improves compound ranking. For instance, using predicted ligand binding sites, the average enrichment factor calculated for the top 1 % (10 %) of the screening library is 8.20 (3.28) for the optimized protocol, compared to 7.67 (3.19) for the default procedure. Depending on the evaluation metric, the optimal docking box size gives better ranking in virtual screening for about two-thirds of target proteins. This fully automated procedure can be used to optimize docking protocols in order to improve the ranking accuracy in production virtual screening simulations. Importantly, the optimized search space systematically yields better results than the default method not only for experimental pockets, but also for those predicted from protein structures. A script for calculating the optimal docking box size is freely available at www.brylinski.org/content/docking-box-size. Graphical AbstractWe developed a procedure to optimize the box size in molecular docking calculations. Left panel shows the predicted binding pose of NADP (green sticks) compared to the experimental complex structure of human aldose reductase (blue sticks) using a default protocol. Right panel shows the docking accuracy using an optimized box size.
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET
Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei
2017-01-01
Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.
Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei
2017-06-17
Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.
NASA Astrophysics Data System (ADS)
Vallières, Martin; Laberge, Sébastien; Diamant, André; El Naqa, Issam
2017-11-01
Texture-based radiomic models constructed from medical images have the potential to support cancer treatment management via personalized assessment of tumour aggressiveness. While the identification of stable texture features under varying imaging settings is crucial for the translation of radiomics analysis into routine clinical practice, we hypothesize in this work that a complementary optimization of image acquisition parameters prior to texture feature extraction could enhance the predictive performance of texture-based radiomic models. As a proof of concept, we evaluated the possibility of enhancing a model constructed for the early prediction of lung metastases in soft-tissue sarcomas by optimizing PET and MR image acquisition protocols via computerized simulations of image acquisitions with varying parameters. Simulated PET images from 30 STS patients were acquired by varying the extent of axial data combined per slice (‘span’). Simulated T 1-weighted and T 2-weighted MR images were acquired by varying the repetition time and echo time in a spin-echo pulse sequence, respectively. We analyzed the impact of the variations of PET and MR image acquisition parameters on individual textures, and we investigated how these variations could enhance the global response and the predictive properties of a texture-based model. Our results suggest that it is feasible to identify an optimal set of image acquisition parameters to improve prediction performance. The model constructed with textures extracted from simulated images acquired with a standard clinical set of acquisition parameters reached an average AUC of 0.84 +/- 0.01 in bootstrap testing experiments. In comparison, the model performance significantly increased using an optimal set of image acquisition parameters (p = 0.04 ), with an average AUC of 0.89 +/- 0.01 . Ultimately, specific acquisition protocols optimized to generate superior radiomics measurements for a given clinical problem could be developed and standardized via dedicated computer simulations and thereafter validated using clinical scanners.
Meek, Megan E; Van Dolah, Frances M
2016-05-01
Phytoplankton rarely occur as unialgal populations. Therefore, to study species-specific protein expression, indicative of physiological status in natural populations, methods are needed that will both assay for a protein of interest and identify the species expressing it. Here we describe a protocol for IF-FISH, a dual labeling procedure using immunofluorescence (IF) labeling of a protein of interest followed by fluorescence in situ hybridization (FISH) to identify the species expressing that protein. The protocol was developed to monitor expression of the cell cycle marker proliferating cell nuclear antigen (PCNA) in the red tide dinoflagellate, Karenia brevis, using a large subunit (LSU) rRNA probe to identify K. brevis in a mixed population of morphologically similar Karenia species. We present this protocol as proof of concept that IF-FISH can be successfully applied to phytoplankton cells. This method is widely applicable for the analysis of single-cell protein expression of any protein of interest within phytoplankton communities. Copyright © 2016 Elsevier B.V. All rights reserved.
Fast Preparation of Critical Ground States Using Superluminal Fronts
NASA Astrophysics Data System (ADS)
Agarwal, Kartiek; Bhatt, R. N.; Sondhi, S. L.
2018-05-01
We propose a spatiotemporal quench protocol that allows for the fast preparation of ground states of gapless models with Lorentz invariance. Assuming the system initially resides in the ground state of a corresponding massive model, we show that a superluminally moving "front" that locally quenches the mass, leaves behind it (in space) a state arbitrarily close to the ground state of the gapless model. Importantly, our protocol takes time O (L ) to produce the ground state of a system of size ˜Ld (d spatial dimensions), while a fully adiabatic protocol requires time ˜O (L2) to produce a state with exponential accuracy in L . The physics of the dynamical problem can be understood in terms of relativistic rarefaction of excitations generated by the mass front. We provide proof of concept by solving the proposed quench exactly for a system of free bosons in arbitrary dimensions, and for free fermions in d =1 . We discuss the role of interactions and UV effects on the free-theory idealization, before numerically illustrating the usefulness of the approach via simulations on the quantum Heisenberg spin chain.
Quantum tomography enhanced through parametric amplification
NASA Astrophysics Data System (ADS)
Knyazev, E.; Spasibko, K. Yu; Chekhova, M. V.; Khalili, F. Ya
2018-01-01
Quantum tomography is the standard method of reconstructing the Wigner function of quantum states of light by means of balanced homodyne detection. The reconstruction quality strongly depends on the photodetectors quantum efficiency and other losses in the measurement setup. In this article we analyze in detail a protocol of enhanced quantum tomography, proposed by Leonhardt and Paul [1] which allows one to reduce the degrading effect of detection losses. It is based on phase-sensitive parametric amplification, with the phase of the amplified quadrature being scanned synchronously with the local oscillator phase. Although with sufficiently strong amplification the protocol enables overcoming any detection inefficiency, it was so far not implemented in the experiment, probably due to the losses in the amplifier. Here we discuss a possible proof-of-principle experiment with a traveling-wave parametric amplifier. We show that with the state-of-the-art optical elements, the protocol enables high fidelity tomographic reconstruction of bright non-classical states of light. We consider two examples: bright squeezed vacuum and squeezed single-photon state, with the latter being a non-Gaussian state and both strongly affected by the losses.
Sooter, Letha J.
2017-01-01
Fipronil is a commonly used insecticide that has been shown to have environmental and human health risks. The current standard methods of detection for fipronil and its metabolites, such as GC-MS, are time consuming and labor intensive. In this study, a variant of systematic evolution of ligands by exponential enrichment (SELEX), was utilized to identify the first single-stranded DNA (ssDNA) molecular recognition element (MRE) that binds to fipronil with high affinity (Kd = 48 ± 8 nM). The selected MRE displayed low cross binding activity on various environmentally relevant, structurally unrelated herbicides and pesticides, in addition to broad-spectrum binding activity on major metabolites of fipronil and a structurally similar pesticide in prepared river samples. Additionally, a proof-of-principle fluorescent detection assay was developed by using the selected ssDNA MRE as a signal-reporting element, with a limit of detection of 105 nM in a prepared river water sample. PMID:29283416
Accuracy of binding mode prediction with a cascadic stochastic tunneling method.
Fischer, Bernhard; Basili, Serena; Merlitz, Holger; Wenzel, Wolfgang
2007-07-01
We investigate the accuracy of the binding modes predicted for 83 complexes of the high-resolution subset of the ASTEX/CCDC receptor-ligand database using the atomistic FlexScreen approach with a simple forcefield-based scoring function. The median RMS deviation between experimental and predicted binding mode was just 0.83 A. Over 80% of the ligands dock within 2 A of the experimental binding mode, for 60 complexes the docking protocol locates the correct binding mode in all of ten independent simulations. Most docking failures arise because (a) the experimental structure clashed in our forcefield and is thus unattainable in the docking process or (b) because the ligand is stabilized by crystal water. 2007 Wiley-Liss, Inc.
Gans, Jonathan; Osborne, Jonathan; Cheng, Juliet; Djapgne, Louise; Oglesby-Sherrouse, Amanda G
2018-01-01
Bacterial small RNA molecules (sRNAs) are increasingly recognized as central regulators of bacterial stress responses and pathogenesis. In many cases, RNA-binding proteins are critical for the stability and function of sRNAs. Previous studies have adopted strategies to genetically tag an sRNA of interest, allowing isolation of RNA-protein complexes from cells. Here we present a sequence-specific affinity purification protocol that requires no prior genetic manipulation of bacterial cells, allowing isolation of RNA-binding proteins bound to native RNA molecules.
Unconditionally secure multi-party quantum commitment scheme
NASA Astrophysics Data System (ADS)
Wang, Ming-Qiang; Wang, Xue; Zhan, Tao
2018-02-01
A new unconditionally secure multi-party quantum commitment is proposed in this paper by encoding the committed message to the phase of a quantum state. Multi-party means that there are more than one recipient in our scheme. We show that our quantum commitment scheme is unconditional hiding and binding, and hiding is perfect. Our technique is based on the interference of phase-encoded coherent states of light. Its security proof relies on the no-cloning theorem of quantum theory and the properties of quantum information.
Mie, Masayasu; Thuy, Ngo Phan Bich; Kobatake, Eiry
2012-03-07
A homogeneous immunoassay system was developed using fragmented Renilla luciferase (Rluc). The B domain of protein A was fused to two Rluc fragments. When complexes between an antibody and fragmented Rluc fusion proteins bind to target molecules, the Rluc fragments come into close proximity and the luminescence activity of fragmented Rluc is restored by complementation. As proof-of-principle, this fragmented Rluc system was used to detect E. coli homogeneously using an anti-E. coli antibody.
A new optical method for a fast and simple detection of ephedrine
NASA Astrophysics Data System (ADS)
Varriale, Antonio; Staiano, Maria; Strianese, Maria; Marzullo, Vincenzo; Ruggiero, Giuseppe; Secchi, Alberto; Dispenza, Massimiliano; Fiorello, Anna Maria; D'Auria, Sabato
2011-11-01
In this work we describe the synthesis of a new ephedrine derivative with a carbon linker featuring an amino reactive group, and its conjugation to the glutamine binding protein (GlnBP) from E. coli as a carrier protein for the production of polyclonal antibodies in rabbits against ephedrine. Proof-of-principle results that an efficient SPR-based indirect competitive immunoassay for the detection and quantification of ephedrine are presented. The detection limit of this assay was found to be about 33ng/ml.
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept
NASA Astrophysics Data System (ADS)
Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto
We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS detects such attacks thanks to an internal representation of the controlled SCADA system and a corresponding rule language, powerful enough to express the system's critical states. Furthermore, we detail the implementation and provide experimental comparative results.
Experimental quantum private queries with linear optics
NASA Astrophysics Data System (ADS)
de Martini, Francesco; Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo; Nagali, Eleonora; Sansoni, Linda; Sciarrino, Fabio
2009-07-01
The quantum private query is a quantum cryptographic protocol to recover information from a database, preserving both user and data privacy: the user can test whether someone has retained information on which query was asked and the database provider can test the amount of information released. Here we discuss a variant of the quantum private query algorithm that admits a simple linear optical implementation: it employs the photon’s momentum (or time slot) as address qubits and its polarization as bus qubit. A proof-of-principle experimental realization is implemented.
Experimental Blind Quantum Computing for a Classical Client.
Huang, He-Liang; Zhao, Qi; Ma, Xiongfeng; Liu, Chang; Su, Zu-En; Wang, Xi-Lin; Li, Li; Liu, Nai-Le; Sanders, Barry C; Lu, Chao-Yang; Pan, Jian-Wei
2017-08-04
To date, blind quantum computing demonstrations require clients to have weak quantum devices. Here we implement a proof-of-principle experiment for completely classical clients. Via classically interacting with two quantum servers that share entanglement, the client accomplishes the task of having the number 15 factorized by servers who are denied information about the computation itself. This concealment is accompanied by a verification protocol that tests servers' honesty and correctness. Our demonstration shows the feasibility of completely classical clients and thus is a key milestone towards secure cloud quantum computing.
Experimental Blind Quantum Computing for a Classical Client
NASA Astrophysics Data System (ADS)
Huang, He-Liang; Zhao, Qi; Ma, Xiongfeng; Liu, Chang; Su, Zu-En; Wang, Xi-Lin; Li, Li; Liu, Nai-Le; Sanders, Barry C.; Lu, Chao-Yang; Pan, Jian-Wei
2017-08-01
To date, blind quantum computing demonstrations require clients to have weak quantum devices. Here we implement a proof-of-principle experiment for completely classical clients. Via classically interacting with two quantum servers that share entanglement, the client accomplishes the task of having the number 15 factorized by servers who are denied information about the computation itself. This concealment is accompanied by a verification protocol that tests servers' honesty and correctness. Our demonstration shows the feasibility of completely classical clients and thus is a key milestone towards secure cloud quantum computing.
Clark, Anthony J; Gindin, Tatyana; Zhang, Baoshan; Wang, Lingle; Abel, Robert; Murret, Colleen S; Xu, Fang; Bao, Amy; Lu, Nina J; Zhou, Tongqing; Kwong, Peter D; Shapiro, Lawrence; Honig, Barry; Friesner, Richard A
2017-04-07
Direct calculation of relative binding affinities between antibodies and antigens is a long-sought goal. However, despite substantial efforts, no generally applicable computational method has been described. Here, we describe a systematic free energy perturbation (FEP) protocol and calculate the binding affinities between the gp120 envelope glycoprotein of HIV-1 and three broadly neutralizing antibodies (bNAbs) of the VRC01 class. The protocol has been adapted from successful studies of small molecules to address the challenges associated with modeling protein-protein interactions. Specifically, we built homology models of the three antibody-gp120 complexes, extended the sampling times for large bulky residues, incorporated the modeling of glycans on the surface of gp120, and utilized continuum solvent-based loop prediction protocols to improve sampling. We present three experimental surface plasmon resonance data sets, in which antibody residues in the antibody/gp120 interface were systematically mutated to alanine. The RMS error in the large set (55 total cases) of FEP tests as compared to these experiments, 0.68kcal/mol, is near experimental accuracy, and it compares favorably with the results obtained from a simpler, empirical methodology. The correlation coefficient for the combined data set including residues with glycan contacts, R 2 =0.49, should be sufficient to guide the choice of residues for antibody optimization projects, assuming that this level of accuracy can be realized in prospective prediction. More generally, these results are encouraging with regard to the possibility of using an FEP approach to calculate the magnitude of protein-protein binding affinities. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.
Vandehey, Nicholas T; Moirano, Jeffrey M; Converse, Alexander K; Holden, James E; Mukherjee, Jogesh; Murali, Dhanabalan; Nickles, R Jerry; Davidson, Richard J; Schneider, Mary L; Christian, Bradley T
2010-01-01
18F-Fallypride and 11C-FLB457 are commonly used PET radioligands for imaging extrastriatal dopamine D2/D3 receptors, but differences in their in vivo kinetics may affect the sensitivity for measuring subtle changes in receptor binding. Focusing on regions of low binding, a direct comparison of the kinetics of 18F-fallypride and 11C-FLB457 was made using a MI protocol. Injection protocols were designed to estimate K1, k2, fNDkon, Bmax, and koff in the midbrain and cortical regions of the rhesus monkey. 11C-FLB457 cleared from the arterial plasma faster and yielded a ND space distribution volume (K1/k2) that is three times higher than 18F-fallypride, primarily due to a slower k2 (FAL:FLB; k2=0.54 min−1:0.18 min−1). The dissociation rate constant, koff, was slower for 11C-FLB457, resulting in a lower KDapp than 18F-fallypride (FAL:FLB; 0.39 nM:0.13 nM). Specific D2/D3 binding could be detected in the cerebellum for 11C-FLB457 but not 18F-fallypride. Both radioligands can be used to image extrastriatal D2/D3 receptors, with 11C-FLB457 providing greater sensitivity to subtle changes in low-receptor-density cortical regions and 18F-fallypride being more sensitive to endogenous dopamine displacement in medium-to-high-receptor-density regions. In the presence of specific D2/D3 binding in the cerebellum, reference region analysis methods will give a greater bias in BPND with 11C-FLB457 than with 18F-fallypride. PMID:20040928
Ballante, Flavio; Marshall, Garland R
2016-01-25
Molecular docking is a widely used technique in drug design to predict the binding pose of a candidate compound in a defined therapeutic target. Numerous docking protocols are available, each characterized by different search methods and scoring functions, thus providing variable predictive capability on a same ligand-protein system. To validate a docking protocol, it is necessary to determine a priori the ability to reproduce the experimental binding pose (i.e., by determining the docking accuracy (DA)) in order to select the most appropriate docking procedure and thus estimate the rate of success in docking novel compounds. As common docking programs use generally different root-mean-square deviation (RMSD) formulas, scoring functions, and format results, it is both difficult and time-consuming to consistently determine and compare their predictive capabilities in order to identify the best protocol to use for the target of interest and to extrapolate the binding poses (i.e., best-docked (BD), best-cluster (BC), and best-fit (BF) poses) when applying a given docking program over thousands/millions of molecules during virtual screening. To reduce this difficulty, two new procedures called Clusterizer and DockAccessor have been developed and implemented for use with some common and "free-for-academics" programs such as AutoDock4, AutoDock4(Zn), AutoDock Vina, DOCK, MpSDockZn, PLANTS, and Surflex-Dock to automatically extrapolate BD, BC, and BF poses as well as to perform consistent cluster and DA analyses. Clusterizer and DockAccessor (code available over the Internet) represent two novel tools to collect computationally determined poses and detect the most predictive docking approach. Herein an application to human lysine deacetylase (hKDAC) inhibitors is illustrated.
Hydroxylapatite chromatography.
Broadhurst, A V
2001-05-01
Hydroxylapatite (also called hydroxyapatite), a form of calcium phosphate, can be used as a matrix for the chromatography of both proteins and nucleic acids. Protocols are provided for both standard low-pressure chromatography of a protein mixture using a hydroxylapatite column prepared in the laboratory, and an HPLC method, applicable to proteins and nucleic acids, that uses a commercially available column. Alternate protocols describe column chromatography using a step gradient or batch binding and step-gradient elution.
Hurst, Sarah J; Han, Min Su; Lytton-Jean, Abigail K R; Mirkin, Chad A
2007-09-15
We have developed a novel competition assay that uses a gold nanoparticle (Au NP)-based, high-throughput colorimetric approach to screen the sequence selectivity of DNA-binding molecules. This assay hinges on the observation that the melting behavior of DNA-functionalized Au NP aggregates is sensitive to the concentration of the DNA-binding molecule in solution. When short, oligomeric hairpin DNA sequences were added to a reaction solution consisting of DNA-functionalized Au NP aggregates and DNA-binding molecules, these molecules may either bind to the Au NP aggregate interconnects or the hairpin stems based on their relative affinity for each. This relative affinity can be measured as a change in the melting temperature (Tm) of the DNA-modified Au NP aggregates in solution. As a proof of concept, we evaluated the selectivity of 4',6-diamidino-2-phenylindone (an AT-specific binder), ethidium bromide (a nonspecific binder), and chromomycin A (a GC-specific binder) for six sequences of hairpin DNA having different numbers of AT pairs in a five-base pair variable stem region. Our assay accurately and easily confirmed the known trends in selectivity for the DNA binders in question without the use of complicated instrumentation. This novel assay will be useful in assessing large libraries of potential drug candidates that work by binding DNA to form a drug/DNA complex.
Vashisht, Kapil; Verma, Sonia; Gupta, Sunita; Lynn, Andrew M; Dixit, Rajnikant; Mishra, Neelima; Valecha, Neena; Hamblin, Karleigh A; Maytum, Robin; Pandey, Kailash C; van der Giezen, Mark
2017-01-24
Charged, solvent-exposed residues at the entrance to the substrate binding site (gatekeeper residues) produce electrostatic dipole interactions with approaching substrates, and control their access by a novel mechanism called "electrostatic gatekeeper effect". This proof-of-concept study demonstrates that the nucleotide specificity can be engineered by altering the electrostatic properties of the gatekeeper residues outside the binding site. Using Blastocystis succinyl-CoA synthetase (SCS, EC 6.2.1.5), we demonstrated that the gatekeeper mutant (ED) resulted in ATP-specific SCS to show high GTP specificity. Moreover, nucleotide binding site mutant (LF) had no effect on GTP specificity and remained ATP-specific. However, via combination of the gatekeeper mutant with the nucleotide binding site mutant (ED+LF), a complete reversal of nucleotide specificity was obtained with GTP, but no detectable activity was obtained with ATP. This striking result of the combined mutant (ED+LF) was due to two changes; negatively charged gatekeeper residues (ED) favored GTP access, and nucleotide binding site residues (LF) altered ATP binding, which was consistent with the hypothesis of the "electrostatic gatekeeper effect". These results were further supported by molecular modeling and simulation studies. Hence, it is imperative to extend the strategy of the gatekeeper effect in a different range of crucial enzymes (synthetases, kinases, and transferases) to engineer substrate specificity for various industrial applications and substrate-based drug design.
van Andel, Esther; de Bus, Ian; Tijhaar, Edwin J; Smulders, Maarten M J; Savelkoul, Huub F J; Zuilhof, Han
2017-11-08
Micron- and nano-sized particles are extensively used in various biomedical applications. However, their performance is often drastically hampered by the nonspecific adsorption of biomolecules, a process called biofouling, which can cause false-positive and false-negative outcomes in diagnostic tests. Although antifouling coatings have been extensively studied on flat surfaces, their use on micro- and nanoparticles remains largely unexplored, despite the widespread experimental (specifically, clinical) uncertainties that arise because of biofouling. Here, we describe the preparation of magnetic micron-sized beads coated with zwitterionic sulfobetaine polymer brushes that display strong antifouling characteristics. These coated beads can then be equipped with recognition elements of choice, to enable the specific binding of target molecules. First, we present a proof of principle with biotin-functionalized beads that are able to specifically bind fluorescently labeled streptavidin from a complex mixture of serum proteins. Moreover, we show the versatility of the method by demonstrating that it is also possible to functionalize the beads with mannose moieties to specifically bind the carbohydrate-binding protein concanavalin A. Flow cytometry was used to show that thus-modified beads only bind specifically targeted proteins, with minimal/near-zero nonspecific protein adsorption from other proteins that are present. These antifouling zwitterionic polymer-coated beads, therefore, provide a significant advancement for the many bead-based diagnostic and other biosensing applications that require stringent antifouling conditions.
2017-01-01
Micron- and nano-sized particles are extensively used in various biomedical applications. However, their performance is often drastically hampered by the nonspecific adsorption of biomolecules, a process called biofouling, which can cause false-positive and false-negative outcomes in diagnostic tests. Although antifouling coatings have been extensively studied on flat surfaces, their use on micro- and nanoparticles remains largely unexplored, despite the widespread experimental (specifically, clinical) uncertainties that arise because of biofouling. Here, we describe the preparation of magnetic micron-sized beads coated with zwitterionic sulfobetaine polymer brushes that display strong antifouling characteristics. These coated beads can then be equipped with recognition elements of choice, to enable the specific binding of target molecules. First, we present a proof of principle with biotin-functionalized beads that are able to specifically bind fluorescently labeled streptavidin from a complex mixture of serum proteins. Moreover, we show the versatility of the method by demonstrating that it is also possible to functionalize the beads with mannose moieties to specifically bind the carbohydrate-binding protein concanavalin A. Flow cytometry was used to show that thus-modified beads only bind specifically targeted proteins, with minimal/near-zero nonspecific protein adsorption from other proteins that are present. These antifouling zwitterionic polymer-coated beads, therefore, provide a significant advancement for the many bead-based diagnostic and other biosensing applications that require stringent antifouling conditions. PMID:29064669
Nagy, Bálint; Bán, Zoltán; Papp, Zoltán
2005-10-01
The quality and the quantity of isolated DNA have an effect on PCR amplifications. The authors studied three DNA isolation protocols (resin binding method using fresh and frozen amniotic fluid samples, and silica adsorption method using fresh samples) on the quantity and on the quality of the isolated DNA. Amniotic fluid samples were obtained from 20 pregnant women. The isolated DNA concentrations were determined by real-time fluorimeter using SYBRGreen I method. Each sample was studied for the presence of 8 STR markers. The authors compared the number of the detected alleles, electrophoretograms and peak areas. There was a significant difference between the concentration of the obtained DNA and in the peak areas between the three isolation protocols. The numbers of detected alleles were different, we observed the most allele drop outs in the resin type DNA isolation protocol from the fresh sample (detected allele numbers 182), followed by resin binding protocol from the frozen samples (detected allele number 243) and by the silica adsorption method (detected allele number 264). The authors demonstrated that the DNA isolation method has an effect on the quantity and quality of the isolated DNA, and on further PCR amplifications.
Ortiz, Andrés
2017-01-01
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of “simulatenous” presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions. PMID:28677637
NASA Astrophysics Data System (ADS)
Smith, Jarrod Anson
2D homonuclear 1H NMR methods and restrained molecular dynamics (rMD) calculations have been applied to determining the three-dimensional structures of DNA and minor groove-binding ligand-DNA complexes in solution. The structure of the DNA decamer sequence d(GCGTTAACGC)2 has been solved both with a distance-based rMD protocol and an NOE relaxation matrix backcalculation-based protocol in order to probe the relative merits of the different refinement methods. In addition, three minor groove binding ligand-DNA complexes have been examined. The solution structure of the oligosaccharide moiety of the antitumor DNA scission agent calicheamicin γ1I has been determined in complex with a decamer duplex containing its high affinity 5'-TCCT- 3' binding sequence. The structure of the complex reinforces the belief that the oligosaccharide moiety is responsible for the sequence selective minor-groove binding activity of the agent, and critical intermolecular contacts are revealed. The solution structures of both the (+) and (-) enantiomers of the minor groove binding DNA alkylating agent duocarmycin SA have been determined in covalent complex with the undecamer DNA duplex d(GACTAATTGTC).d(GAC AATTAGTC). The results support the proposal that the alkylation activity of the duocarmycin antitumor antibiotics is catalyzed by a binding-induced conformational change in the ligand which activates the cyclopropyl group for reaction with the DNA. Comparisons between the structures of the two enantiomers covalently bound to the same DNA sequence at the same 5'-AATTA-3 ' site have provided insight into the binding orientation and site selectivity, as well as the relative rates of reactivity of these two agents.
Barish, Syndi; Ochs, Michael F.; Sontag, Eduardo D.; Gevertz, Jana L.
2017-01-01
Cancer is a highly heterogeneous disease, exhibiting spatial and temporal variations that pose challenges for designing robust therapies. Here, we propose the VEPART (Virtual Expansion of Populations for Analyzing Robustness of Therapies) technique as a platform that integrates experimental data, mathematical modeling, and statistical analyses for identifying robust optimal treatment protocols. VEPART begins with time course experimental data for a sample population, and a mathematical model fit to aggregate data from that sample population. Using nonparametric statistics, the sample population is amplified and used to create a large number of virtual populations. At the final step of VEPART, robustness is assessed by identifying and analyzing the optimal therapy (perhaps restricted to a set of clinically realizable protocols) across each virtual population. As proof of concept, we have applied the VEPART method to study the robustness of treatment response in a mouse model of melanoma subject to treatment with immunostimulatory oncolytic viruses and dendritic cell vaccines. Our analysis (i) showed that every scheduling variant of the experimentally used treatment protocol is fragile (nonrobust) and (ii) discovered an alternative region of dosing space (lower oncolytic virus dose, higher dendritic cell dose) for which a robust optimal protocol exists. PMID:28716945
Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing
NASA Astrophysics Data System (ADS)
Sajeed, Shihan; Radchenko, Igor; Kaiser, Sarah; Bourgoin, Jean-Philippe; Pappa, Anna; Monat, Laurent; Legré, Matthieu; Makarov, Vadim
2015-03-01
The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acín-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD we model both a strong attack using technology possible in principle and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed, the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.
Thekkumkara, Thomas; Snyder, Russell; Karamyan, Vardan T
2016-01-01
The role of 2-methoxyestradiol is becoming a major area of investigation because of its therapeutic utility, though its mechanism is not fully explored. Recent studies have identified the G-protein-coupled receptor 30 (GPR30, GPER) as a high-affinity membrane receptor for 2-methoxyestradiol. However, studies aimed at establishing the binding affinities of steroid compounds for specific targets are difficult, as the tracers are highly lipophilic and often result in nonspecific binding in lipid-rich membrane preparations with low-level target receptor expression. 2-Methoxyestradiol binding studies are essential to elucidate the underlying effects of this novel estrogen metabolite and to validate its targets; therefore, this competitive receptor-binding assay protocol was developed in order to assess the membrane receptor binding and affinity of 2-methyoxyestradiol.
NASA Astrophysics Data System (ADS)
Derkach, Ivan D.; Peuntinger, Christian; Ruppert, László; Heim, Bettina; Gunthner, Kevin; Usenko, Vladyslav C.; Elser, Dominique; Marquardt, Christoph; Filip, Radim; Leuchs, Gerd
2016-10-01
Continuous-variable quantum key distribution is a practical application of quantum information theory that is aimed at generation of secret cryptographic key between two remote trusted parties and that uses multi-photon quantum states as carriers of key bits. Remote parties share the secret key via a quantum channel, that presumably is under control of of an eavesdropper, and which properties must be taken into account in the security analysis. Well-studied fiber-optical quantum channels commonly possess stable transmittance and low noise levels, while free-space channels represent a simpler, less demanding and more flexible alternative, but suffer from atmospheric effects such as turbulence that in particular causes a non-uniform transmittance distribution referred to as fading. Nonetheless free-space channels, providing an unobstructed line-of-sight, are more apt for short, mid-range and potentially long-range (using satellites) communication and will play an important role in the future development and implementation of QKD networks. It was previously theoretically shown that coherent-state CV QKD should be in principle possible to implement over a free-space fading channel, but strong transmittance fluctuations result in the significant modulation-dependent channel excess noise. In this regime the post-selection of highly transmitting sub-channels may be needed, which can even restore the security of the protocol in the strongly turbulent channels. We now report the first proof-of-principle experimental test of coherent state CV QKD protocol using different levels Gaussian modulation over a mid-range (1.6-kilometer long) free-space atmospheric quantum channel. The transmittance of the link was characterized using intensity measurements for the reference but channel estimation using the modulated coherent states was also studied. We consider security against Gaussian collective attacks, that were shown to be optimal against CV QKD protocols . We assumed a general entangling cloner collective attack (modeled using data obtained from the state measurement results on both trusted sides of the protocol), that allows to purify the noise added in the quantum channel . Our security analysis of coherent-state protocol also took into account the effect of imperfect channel estimation, limited post-processing efficiency and finite data ensemble size on the performance of the protocol. In this regime we observe the positive key rate even without the need of applying post-selection. We show the positive improvement of the key rate with increase of the modulation variance, still remaining low enough to tolerate the transmittance fluctuations. The obtained results show that coherent-state CV QKD protocol that uses real free-space atmospheric channel can withstand negative influence of transmittance fluctuations, limited post-processing efficiency, imperfect channel estimation and other finite-size effects, and be successfully implemented. Our result paves the way to the full-scale implementation of the CV QKD in real free-space channels at mid-range distances.
Henzl, Michael T; Markus, Lindsey A; Davis, Meredith E; McMillan, Andrew T
2013-03-01
Capable of providing a detailed thermodynamic picture of noncovalent association reactions, isothermal titration calorimetry (ITC) has become a popular method for studying protein-ligand interactions. We routinely employ the technique to study divalent ion-binding by two-site EF-hand proteins from the parvalbumin- and polcalcin lineages. The combination of high Ca(2+) affinity and relatively low Mg(2+) affinity, and the attendant complication of parameter correlation, conspire to make the simultaneous extraction of binding constants and -enthalpies for both ions challenging. Although global analysis of multiple ITC experiments can overcome these hurdles, our current experimental protocol includes upwards of 10 titrations - requiring a substantial investment in labor, machine time, and material. This paper explores the potential for using a smaller suite of experiments that includes simultaneous titrations with Ca(2+) and Mg(2+) at different ratios of the two ions. The results obtained for four proteins, differing substantially in their divalent ion-binding properties, suggest that the approach has merit. The Ca(2+)- and Mg(2+)-binding constants afforded by the streamlined analysis are in reasonable agreement with those obtained from the standard analysis protocol. Likewise, the abbreviated analysis provides comparable values for the Ca(2+)-binding enthalpies. However, the streamlined analysis can yield divergent values for the Mg(2+)-binding enthalpies - particularly those for lower affinity sites. This shortcoming can be remedied, in large measure, by including data from a direct Ca(2+) titration in the presence of a high, fixed Mg(2+) concentration. Copyright © 2013. Published by Elsevier Inc.
Challier, Emilse; Lisa, María-Natalia; Nerli, Bibiana B; Calcaterra, Nora B; Armas, Pablo
2014-01-01
Cellular nucleic acid binding protein (CNBP) is a highly conserved multi-zinc knuckle protein that enhances c-MYC expression, is related to certain human muscular diseases and is required for proper rostral head development. CNBP binds to single-stranded DNA (ssDNA) and RNA and acts as nucleic acid chaperone. Despite the advances made concerning CNBP biological roles, a full knowledge about the structure-function relationship has not yet been achieved, likely due to difficulty in obtaining pure and tag-free CNBP. Here, we report a fast, simple, reproducible, and high-performance expression and purification protocol that provides recombinant tag-free CNBP from Escherichia coli cultures. We determined that tag-free CNBP binds its molecular targets with higher affinity than tagged-CNBP. Furthermore, fluorescence spectroscopy revealed the presence of a unique and conserved tryptophan, which is exposed to the solvent and involved, directly or indirectly, in nucleic acid binding. Size-exclusion HPLC revealed that CNBP forms homodimers independently of nucleic acid binding and coexist with monomers as non-interconvertible forms or in slow equilibrium. Circular dichroism spectroscopy showed that CNBP has a secondary structure dominated by random-coil and β-sheet coincident with the sequence-predicted repetitive zinc knuckles motifs, which folding is required for CNBP structural stability and biochemical activity. CNBP structural stability increased in the presence of single-stranded nucleic acid targets similar to other unstructured nucleic acid chaperones. Altogether, data suggest that CNBP is a flexible protein with interspersed structured zinc knuckles, and acquires a more rigid structure upon nucleic acid binding. Copyright © 2013 Elsevier Inc. All rights reserved.
Lim, M M; Hammock, E A D; Young, L J
2004-02-01
Receptor autoradiography using selective radiolabeled ligands allows visualization of brain receptor distribution and density on film. The resolution of specific brain regions on the film often can be difficult to discern owing to the general spread of the radioactive label and the lack of neuroanatomical landmarks on film. Receptor binding is a chemically harsh protocol that can render the tissue virtually unstainable by Nissl and other conventional stains used to delineate neuroanatomical boundaries of brain regions. We describe a method for acetylcholinesterase (AChE) staining of slides previously processed for receptor binding. AChE staining is a useful tool for delineating major brain nuclei and tracts. AChE staining on sections that have been processed for receptor autoradiography provides a direct comparison of brain regions for more precise neuroanatomical description. We report a detailed thiocholine protocol that is a modification of the Koelle-Friedenwald method to amplify the AChE signal in brain sections previously processed for autoradiography. We also describe several temporal and experimental factors that can affect the density and clarity of the AChE signal when using this protocol.
A Framework for Bounding Nonlocality of State Discrimination
NASA Astrophysics Data System (ADS)
Childs, Andrew M.; Leung, Debbie; Mančinska, Laura; Ozols, Maris
2013-11-01
We consider the class of protocols that can be implemented by local quantum operations and classical communication (LOCC) between two parties. In particular, we focus on the task of discriminating a known set of quantum states by LOCC. Building on the work in the paper Quantum nonlocality without entanglement (Bennett et al., Phys Rev A 59:1070-1091, 1999), we provide a framework for bounding the amount of nonlocality in a given set of bipartite quantum states in terms of a lower bound on the probability of error in any LOCC discrimination protocol. We apply our framework to an orthonormal product basis known as the domino states and obtain an alternative and simplified proof that quantifies its nonlocality. We generalize this result for similar bases in larger dimensions, as well as the “rotated” domino states, resolving a long-standing open question (Bennett et al., Phys Rev A 59:1070-1091, 1999).
NASA Astrophysics Data System (ADS)
Dong, Chen; Zhao, Shang-Hong; Li, Wei; Yang, Jian
2018-03-01
In this paper, by combining measurement-device-independent quantum key distribution (MDI-QKD) scheme with entangled photon sources, we present a modified MDI-QKD scheme with pairs of vector vortex(VV) beams, which shows a structure of hybrid entangled entanglement corresponding to intrasystem entanglement and intersystem entanglement. The former entanglement, which is entangled between polarization and orbit angular momentum within each VV beam, is adopted to overcome the polarization misalignment associated with random rotations in quantum key distribution. The latter entanglement, which is entangled between the two VV beams, is used to perform entangled-based MDI-QKD protocol with pair of VV beams to inherit the merit of long distance. The numerical simulations show that our modified scheme can tolerate 97dB with practical detectors. Furthermore, our modified protocol only needs to insert q-plates in practical experiment.
Hack-proof Synchronization Protocol for Multi-player Online Games
NASA Astrophysics Data System (ADS)
Fung, Yeung Siu; Lui, John C. S.
Modern multi-player online games are popular and attractive because they provide a sense of virtual world experience to users: players can interact with each other on the Internet but perceive a local area network responsiveness. To make this possible, most modern multi-player online games use similar networking architecture that aims to hide the effects of network latency, packet loss, and high variance of delay from players. Because real-time interactivity is a crucial feature from a player's point of view, any delay perceived by a player can affect his/her performance [16]. Therefore, the game client must be able to run and accept new user commands continuously regardless of the condition of the underlying communication channel, and that it will not stop responding because of waiting for update packets from other players. To make this possible, multi-player online games typically use protocols based on "dead-reckoning" [5, 6, 9] which allows loose synchronization between players.
Postselection technique for quantum channels with applications to quantum cryptography.
Christandl, Matthias; König, Robert; Renner, Renato
2009-01-16
We propose a general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems. Our main result is that, in order to prove that a certain property holds for an arbitrary input, it is sufficient to consider the case where the input is a particular de Finetti-type state, i.e., a state which consists of n identical and independent copies of an (unknown) state on a single subsystem. Our technique can be applied to the analysis of information-theoretic problems. For example, in quantum cryptography, we get a simple proof for the fact that security of a discrete-variable quantum key distribution protocol against collective attacks implies security of the protocol against the most general attacks. The resulting security bounds are tighter than previously known bounds obtained with help of the exponential de Finetti theorem.
Min-entropy uncertainty relation for finite-size cryptography
NASA Astrophysics Data System (ADS)
Ng, Nelly Huei Ying; Berta, Mario; Wehner, Stephanie
2012-10-01
Apart from their foundational significance, entropic uncertainty relations play a central role in proving the security of quantum cryptographic protocols. Of particular interest are therefore relations in terms of the smooth min-entropy for Bennett-Brassard 1984 (BB84) and six-state encodings. The smooth min-entropy Hminɛ(X/B) quantifies the negative logarithm of the probability for an attacker B to guess X, except with a small failure probability ɛ. Previously, strong uncertainty relations were obtained which are valid in the limit of large block lengths. Here, we prove an alternative uncertainty relation in terms of the smooth min-entropy that is only marginally less strong but has the crucial property that it can be applied to rather small block lengths. This paves the way for a practical implementation of many cryptographic protocols. As part of our proof we show tight uncertainty relations for a family of Rényi entropies that may be of independent interest.
Experimental measurement-device-independent quantum key distribution with uncharacterized encoding.
Wang, Chao; Wang, Shuang; Yin, Zhen-Qiang; Chen, Wei; Li, Hong-Wei; Zhang, Chun-Mei; Ding, Yu-Yang; Guo, Guang-Can; Han, Zheng-Fu
2016-12-01
Measurement-device-independent quantum key distribution (MDI QKD) is an efficient way to share secrets using untrusted measurement devices. However, the assumption on the characterizations of encoding states is still necessary in this promising protocol, which may lead to unnecessary complexity and potential loopholes in realistic implementations. Here, by using the mismatched-basis statistics, we present the first proof-of-principle experiment of MDI QKD with uncharacterized encoding sources. In this demonstration, the encoded states are only required to be constrained in a two-dimensional Hilbert space, and two distant parties (Alice and Bob) are resistant to state preparation flaws even if they have no idea about the detailed information of their encoding states. The positive final secure key rates of our system exhibit the feasibility of this novel protocol, and demonstrate its value for the application of secure communication with uncharacterized devices.
NASA Astrophysics Data System (ADS)
Tsao, Shih-Ming; Lai, Ji-Ching; Horng, Horng-Er; Liu, Tu-Chen; Hong, Chin-Yih
2017-04-01
Aptamers are oligonucleotides that can bind to specific target molecules. Most aptamers are generated using random libraries in the standard systematic evolution of ligands by exponential enrichment (SELEX). Each random library contains oligonucleotides with a randomized central region and two fixed primer regions at both ends. The fixed primer regions are necessary for amplifying target-bound sequences by PCR. However, these extra-sequences may cause non-specific bindings, which potentially interfere with good binding for random sequences. The Magnetic-Assisted Rapid Aptamer Selection (MARAS) is a newly developed protocol for generating single-strand DNA aptamers. No repeat selection cycle is required in the protocol. This study proposes and demonstrates a method to isolate aptamers for C-reactive proteins (CRP) from a randomized ssDNA library containing no fixed sequences at 5‧ and 3‧ termini using the MARAS platform. Furthermore, the isolated primer-free aptamer was sequenced and binding affinity for CRP was analyzed. The specificity of the obtained aptamer was validated using blind serum samples. The result was consistent with monoclonal antibody-based nephelometry analysis, which indicated that a primer-free aptamer has high specificity toward targets. MARAS is a feasible platform for efficiently generating primer-free aptamers for clinical diagnoses.
Kurcinski, Mateusz; Jamroz, Michal; Blaszczyk, Maciej; Kolinski, Andrzej; Kmiecik, Sebastian
2015-01-01
Protein–peptide interactions play a key role in cell functions. Their structural characterization, though challenging, is important for the discovery of new drugs. The CABS-dock web server provides an interface for modeling protein–peptide interactions using a highly efficient protocol for the flexible docking of peptides to proteins. While other docking algorithms require pre-defined localization of the binding site, CABS-dock does not require such knowledge. Given a protein receptor structure and a peptide sequence (and starting from random conformations and positions of the peptide), CABS-dock performs simulation search for the binding site allowing for full flexibility of the peptide and small fluctuations of the receptor backbone. This protocol was extensively tested over the largest dataset of non-redundant protein–peptide interactions available to date (including bound and unbound docking cases). For over 80% of bound and unbound dataset cases, we obtained models with high or medium accuracy (sufficient for practical applications). Additionally, as optional features, CABS-dock can exclude user-selected binding modes from docking search or to increase the level of flexibility for chosen receptor fragments. CABS-dock is freely available as a web server at http://biocomp.chem.uw.edu.pl/CABSdock. PMID:25943545
Hoffman, Elizabeth A.; Zaidi, Hussain; Shetty, Savera J.; Bekiranov, Stefan; Auble, David T.
2018-01-01
Formaldehyde crosslinking is widely used in combination with chromatin immunoprecipitation (ChIP) to measure the locations along DNA and relative levels of transcription factor (TF)-DNA interactions in vivo. However, the measurements that are typically made do not provide unambiguous information about the dynamic properties of these interactions. We have developed a method to estimate binding kinetic parameters from time-dependent formaldehyde crosslinking data, called crosslinking kinetics (CLK) analysis. Cultures of yeast cells are crosslinked with formaldehyde for various periods of time, yielding the relative ChIP signal at particular loci. We fit the data using the mass-action CLK model to extract kinetic parameters of the TF-chromatin interaction, including the on- and off-rates and crosslinking rate. From the on- and off-rate we obtain the occupancy and residence time. The following protocol is the second iteration of this method, CLKv2, updated with improved crosslinking and quenching conditions, more information about crosslinking rates, and systematic procedures for modeling the observed kinetic regimes. CLKv2 analysis has been applied to investigate the binding behavior of the TATA-binding protein (TBP), and a selected subset of other TFs. The protocol was developed using yeast cells, but may be applicable to cells from other organisms as well. PMID:29682595
Dhanda, Sandeep Kumar; Grifoni, Alba; Pham, John; Vaughan, Kerrie; Sidney, John; Peters, Bjoern; Sette, Alessandro
2018-01-01
Unwanted immune responses against protein therapeutics can reduce efficacy or lead to adverse reactions. T-cell responses are key in the development of such responses, and are directed against immunodominant regions within the protein sequence, often associated with binding to several allelic variants of HLA class II molecules (promiscuous binders). Herein, we report a novel computational strategy to predict 'de-immunized' peptides, based on previous studies of erythropoietin protein immunogenicity. This algorithm (or method) first predicts promiscuous binding regions within the target protein sequence and then identifies residue substitutions predicted to reduce HLA binding. Further, this method anticipates the effect of any given substitution on flanking peptides, thereby circumventing the creation of nascent HLA-binding regions. As a proof-of-principle, the algorithm was applied to Vatreptacog α, an engineered Factor VII molecule associated with unintended immunogenicity. The algorithm correctly predicted the two immunogenic peptides containing the engineered residues. As a further validation, we selected and evaluated the immunogenicity of seven substitutions predicted to simultaneously reduce HLA binding for both peptides, five control substitutions with no predicted reduction in HLA-binding capacity, and additional flanking region controls. In vitro immunogenicity was detected in 21·4% of the cultures of peptides predicted to have reduced HLA binding and 11·4% of the flanking regions, compared with 46% for the cultures of the peptides predicted to be immunogenic. This method has been implemented as an interactive application, freely available online at http://tools.iedb.org/deimmunization/. © 2017 John Wiley & Sons Ltd.
Mukhtar, Eiman; Adhami, Vaqar Mustafa; Sechi, Mario; Mukhtar, Hasan
2015-01-01
Microtubule targeting based therapies have revolutionized cancer treatment; however, resistance and side effects remain a major limitation. Therefore, novel strategies that can overcome these limitations are urgently needed. We made a novel discovery that fisetin, a hydroxyflavone, is a microtubule stabilizing agent. Fisetin binds to tubulin and stabilizes microtubules with binding characteristics far superior than paclitaxel. Surface plasmon resonance and computational docking studies suggested that fisetin binds to β-tubulin with superior affinity compared to paclitaxel. Fisetin treatment of human prostate cancer cells resulted in robust up-regulation of microtubule associated proteins (MAP)-2 and -4. In addition, fisetin treated cells were enriched in α-tubulin acetylation, an indication of stabilization of microtubules. Fisetin significantly inhibited PCa cell proliferation, migration, and invasion. Nudc, a protein associated with microtubule motor dynein/dynactin complex that regulates microtubule dynamics, was inhibited with fisetin treatment. Further, fisetin treatment of a P-glycoprotein overexpressing multidrug-resistant cancer cell line NCI/ADR-RES inhibited the viability and colony formation. Our results offer in vitro proof-of-concept for fisetin as a microtubule targeting agent. We suggest that fisetin could be developed as an adjuvant for treatment of prostate and other cancer types. PMID:26235140
Tsimafeyeu, Ilya; Daeyaert, Frits; Joos, Jean-Baptiste; Aken, Koen V; Ludes-Meyers, John; Byakhov, Mikhail; Tjulandin, Sergei
2016-01-01
Fibroblast growth factor (FGF) receptors (FGFRs) play a key role in tumor growth and angiogenesis. The present report describes our search for an extracellularly binding FGFR inhibitor using a combined molecular modeling and de novo design strategy. Based upon crystal structures of the receptor with its native ligand and knowledge of inhibiting peptides, we have developed a computational protocol that predicts the putative binding of a molecule to the extracellular domains of the receptor. This protocol, or scoring function, was used in combination with the de novo synthesis program 'SYNOPSIS' to generate high scoring and synthetically accessible compounds. Eight compounds belonging to 3 separate chemical classes were synthesized. One of these compounds, alofanib (RPT835), was found to be an effective inhibitor of the FGF/FGFR2 pathway. The preclinical in vitro data support an allosteric inhibition mechanism of RPT835. RPT835 potently inhibited growth of KATO III gastric cancer cells expressing FGFR2, with GI50 value of 10 nmol/L. These results provide strong rationale for the evaluation of compound in advanced cancers.
Kobayashi, Hiroki; Harada, Hiroko; Nakamura, Masaomi; Futamura, Yushi; Ito, Akihiro; Yoshida, Minoru; Iemura, Shun-Ichiro; Shin-Ya, Kazuo; Doi, Takayuki; Takahashi, Takashi; Natsume, Tohru; Imoto, Masaya; Sakakibara, Yasubumi
2012-04-05
Identification of the target proteins of bioactive compounds is critical for elucidating the mode of action; however, target identification has been difficult in general, mostly due to the low sensitivity of detection using affinity chromatography followed by CBB staining and MS/MS analysis. We applied our protocol of predicting target proteins combining in silico screening and experimental verification for incednine, which inhibits the anti-apoptotic function of Bcl-xL by an unknown mechanism. One hundred eighty-two target protein candidates were computationally predicted to bind to incednine by the statistical prediction method, and the predictions were verified by in vitro binding of incednine to seven proteins, whose expression can be confirmed in our cell system.As a result, 40% accuracy of the computational predictions was achieved successfully, and we newly found 3 incednine-binding proteins. This study revealed that our proposed protocol of predicting target protein combining in silico screening and experimental verification is useful, and provides new insight into a strategy for identifying target proteins of small molecules.
Salinas-Jazmín, Nohemi; González-González, Edith; Vásquez-Bochm, Luz X; Pérez-Tapia, Sonia M; Velasco-Velázquez, Marco A
2017-05-04
Therapeutic monoclonal antibodies (mAbs) are relevant to the treatment of different pathologies, including cancers. The development of biosimilar mAbs by pharmaceutical companies is a market opportunity, but it is also a strategy to increase drug accessibility and reduce therapy-associated costs. The protocols detailed here describe the evaluation of target binding and CDC induction by rituximab in Daudi cells. These two functions require different structural regions of the antibody and are relevant to the clinical effect induced by rituximab. The protocols allow the side-to-side comparison of a reference rituximab and a marketed rituximab biosimilar. The evaluated products showed differences both in target binding and CDC induction, suggesting that there are underlying physicochemical differences and highlighting the need to analyze the impact of those differences in the clinical setting. The methods reported here constitute simple and inexpensive in vitro models for the evaluation of the activity of rituximab biosimilars. Thus, they can be useful during biosimilar development, as well as for quality control in biosimilar production. Furthermore, the presented methods can be extrapolated to other therapeutic mAbs.
Alspach, Elise; Stewart, Sheila A.
2016-01-01
Immunoprecipitation and subsequent isolation of nucleic acids allows for the investigation of protein:nucleic acid interactions. RNA-binding protein immunoprecipitation (RIP) is used for the analysis of protein interactions with mRNA. Combining RIP with quantitative real-time PCR (qRT-PCR) further enhances the RIP technique by allowing for the quantitative assessment of RNA-binding protein interactions with their target mRNAs, and how these interactions change in different cellular settings. Here, we describe the immunoprecipitation of the RNA-binding protein AUF1 with several different factors associated with the senescence-associated secretory phenotype (SASP) (Alspach and Stewart, 2013), specifically IL6 and IL8. This protocol was originally published in Alspach et al. (2014). PMID:27453911
The Biomolecular Interaction Network Database and related tools 2005 update
Alfarano, C.; Andrade, C. E.; Anthony, K.; Bahroos, N.; Bajec, M.; Bantoft, K.; Betel, D.; Bobechko, B.; Boutilier, K.; Burgess, E.; Buzadzija, K.; Cavero, R.; D'Abreo, C.; Donaldson, I.; Dorairajoo, D.; Dumontier, M. J.; Dumontier, M. R.; Earles, V.; Farrall, R.; Feldman, H.; Garderman, E.; Gong, Y.; Gonzaga, R.; Grytsan, V.; Gryz, E.; Gu, V.; Haldorsen, E.; Halupa, A.; Haw, R.; Hrvojic, A.; Hurrell, L.; Isserlin, R.; Jack, F.; Juma, F.; Khan, A.; Kon, T.; Konopinsky, S.; Le, V.; Lee, E.; Ling, S.; Magidin, M.; Moniakis, J.; Montojo, J.; Moore, S.; Muskat, B.; Ng, I.; Paraiso, J. P.; Parker, B.; Pintilie, G.; Pirone, R.; Salama, J. J.; Sgro, S.; Shan, T.; Shu, Y.; Siew, J.; Skinner, D.; Snyder, K.; Stasiuk, R.; Strumpf, D.; Tuekam, B.; Tao, S.; Wang, Z.; White, M.; Willis, R.; Wolting, C.; Wong, S.; Wrong, A.; Xin, C.; Yao, R.; Yates, B.; Zhang, S.; Zheng, K.; Pawson, T.; Ouellette, B. F. F.; Hogue, C. W. V.
2005-01-01
The Biomolecular Interaction Network Database (BIND) (http://bind.ca) archives biomolecular interaction, reaction, complex and pathway information. Our aim is to curate the details about molecular interactions that arise from published experimental research and to provide this information, as well as tools to enable data analysis, freely to researchers worldwide. BIND data are curated into a comprehensive machine-readable archive of computable information and provides users with methods to discover interactions and molecular mechanisms. BIND has worked to develop new methods for visualization that amplify the underlying annotation of genes and proteins to facilitate the study of molecular interaction networks. BIND has maintained an open database policy since its inception in 1999. Data growth has proceeded at a tremendous rate, approaching over 100 000 records. New services provided include a new BIND Query and Submission interface, a Standard Object Access Protocol service and the Small Molecule Interaction Database (http://smid.blueprint.org) that allows users to determine probable small molecule binding sites of new sequences and examine conserved binding residues. PMID:15608229
Sequence-Based Prediction of RNA-Binding Residues in Proteins.
Walia, Rasna R; El-Manzalawy, Yasser; Honavar, Vasant G; Dobbs, Drena
2017-01-01
Identifying individual residues in the interfaces of protein-RNA complexes is important for understanding the molecular determinants of protein-RNA recognition and has many potential applications. Recent technical advances have led to several high-throughput experimental methods for identifying partners in protein-RNA complexes, but determining RNA-binding residues in proteins is still expensive and time-consuming. This chapter focuses on available computational methods for identifying which amino acids in an RNA-binding protein participate directly in contacting RNA. Step-by-step protocols for using three different web-based servers to predict RNA-binding residues are described. In addition, currently available web servers and software tools for predicting RNA-binding sites, as well as databases that contain valuable information about known protein-RNA complexes, RNA-binding motifs in proteins, and protein-binding recognition sites in RNA are provided. We emphasize sequence-based methods that can reliably identify interfacial residues without the requirement for structural information regarding either the RNA-binding protein or its RNA partner.
Sequence-Based Prediction of RNA-Binding Residues in Proteins
Walia, Rasna R.; EL-Manzalawy, Yasser; Honavar, Vasant G.; Dobbs, Drena
2017-01-01
Identifying individual residues in the interfaces of protein–RNA complexes is important for understanding the molecular determinants of protein–RNA recognition and has many potential applications. Recent technical advances have led to several high-throughput experimental methods for identifying partners in protein–RNA complexes, but determining RNA-binding residues in proteins is still expensive and time-consuming. This chapter focuses on available computational methods for identifying which amino acids in an RNA-binding protein participate directly in contacting RNA. Step-by-step protocols for using three different web-based servers to predict RNA-binding residues are described. In addition, currently available web servers and software tools for predicting RNA-binding sites, as well as databases that contain valuable information about known protein–RNA complexes, RNA-binding motifs in proteins, and protein-binding recognition sites in RNA are provided. We emphasize sequence-based methods that can reliably identify interfacial residues without the requirement for structural information regarding either the RNA-binding protein or its RNA partner. PMID:27787829
San Giorgi, Michel R M; Helder, Herman M; Lindeman, Robbert-Jan S; de Bock, Geertruida H; Dikkers, Frederik G
2016-10-01
Antireflux therapy is incorporated in many treatment protocols for recurrent respiratory papillomatosis (RRP) because gastroesophageal reflux (GERD) is thought to worsen the disease course of RRP. It is unclear if GERD really aggravates the disease course. The aims of this systematic review were to 1) evaluate incidence of GERD among RRP patients and 2) report if GERD changes the clinical course or tissue properties of RRP. A search was conducted in PubMed, Embase, and Google Scholar, following the methods of Preferred Reporting Items for Systematic Review and Meta-Analyses (PRISMA) guidelines. Articles with original data, published after January 1, 1990, on RRP with GERD as a determinant were eligible. There was no language restriction. Data on study design, study population, statistics, outcomes (incidence and influence of GERD), and risk of bias were collected and evaluated following PRISMA protocols. Of 1,277 articles, 19 were selected. Gastroesophageal reflux was objectified in 25% to 100% of RRP patients. Subjective GERD was present in 0% to 70% of patients. There is no proof that GERD aggravated the clinical course or tissue properties of RRP, as measured by the number of surgeries, severity scoring systems, or dysplasia. One study did find a higher chance of web formation in patients with anterior or posterior glottic papillomas who did not receive antireflux therapy, but these results should be interpreted with care due to the study's quality. There is insufficient proof that GERD does or does not aggravate the clinical course or tissue properties of RRP. Laryngoscope, 126:2330-2339, 2016. © 2016 The American Laryngological, Rhinological and Otological Society, Inc.
Larkey, Nicholas E; Almlie, C Kyle; Tran, Victoria; Egan, Marianne; Burrows, Sean M
2014-02-04
Design of rapid, selective, and sensitive DNA and ribonucleic acid (RNA) biosensors capable of minimizing false positives from nuclease degradation is crucial for translational research and clinical diagnostics. We present proof-of-principle studies of an innovative micro-ribonucleic acid (miRNA) reporter-probe biosensor that displaces a self-complementary reporter, while target miRNA binds to the probe. The freed reporter folds into a hairpin structure to induce a decrease in the fluorescent signal. The self-complementarity of the reporter facilitates the reduction of false positives from nuclease degradation. Nanomolar limits of detection and quantitation were capable with this proof-of-principle design. Detection of miRNA occurs within 10 min and does not require any additional hybridization, labeling, or rinsing steps. The potential for medical applications of the reporter-probe biosensor is demonstrated by selective detection of a cancer regulating microRNA, Lethal-7 (Let-7a). Mechanisms for transporting the biosensor across the cell membrane will be the focus of future work.
Smirnov, Asya; Solga, Michael D; Lannigan, Joanne; Criss, Alison K
2015-08-01
Recognition, binding, internalization, and elimination of pathogens and cell debris are important functions of professional as well as non-professional phagocytes. However, high-throughput methods for quantifying cell-associated particles and discriminating bound from internalized particles have been lacking. Here we describe a protocol for using imaging flow cytometry to quantify the attached and phagocytosed particles that are associated with a population of cells. Cells were exposed to fluorescent particles, fixed, and exposed to an antibody of a different fluorophore that recognizes the particles. The antibody is added without cell permeabilization, such that the antibody only binds extracellular particles. Cells with and without associated particles were identified by imaging flow cytometry. For each cell with associated particles, a spot count algorithm was employed to quantify the number of extracellular (double fluorescent) and intracellular (single fluorescent) particles per cell, from which the percent particle internalization was determined. The spot count algorithm was empirically validated by examining the fluorescence and phase contrast images acquired by the flow cytometer. We used this protocol to measure binding and internalization of the bacterium Neisseria gonorrhoeae by primary human neutrophils, using different bacterial variants and under different cellular conditions. The results acquired using imaging flow cytometry agreed with findings that were previously obtained using conventional immunofluorescence microscopy. This protocol provides a rapid, powerful method for measuring the association and internalization of any particle by any cell type. Copyright © 2015 Elsevier B.V. All rights reserved.
Testing warning messages on smokers’ cigarette packages: A standardized protocol
Brewer, Noel T.; Hall, Marissa G.; Lee, Joseph G. L.; Peebles, Kathryn; Noar, Seth M.; Ribisl, Kurt M.
2015-01-01
Purpose Lab experiments on cigarette warnings typically use a brief one-time exposure that is not paired with the cigarette packs smokers use every day, leaving open the question of how repeated warning exposure over several weeks may affect smokers. This proof of principle study sought to develop a new protocol for testing cigarette warnings that better reflects real-world exposure by presenting them on cigarette smokers’ own packs. Methods We tested a cigarette pack labeling protocol with 76 US smokers ages 18 and older. We applied graphic warnings to the front and back of smokers’ cigarette packs. Results Most smokers reported that at least 75% of the packs of cigarettes they smoked during the study had our warnings. Nearly all said they would participate in the study again. Using cigarette packs with the study warnings increased quit intentions (p<.05). Conclusion Our findings suggest a feasible pack labeling protocol with six steps: (1) schedule appointments at brief intervals; (2) determine typical cigarette consumption; (3) ask smokers to bring a supply of cigarette packs to study appointments; (4) apply labels to smokers’ cigarette packs; (5) provide participation incentives at the end of appointments; and (6) refer smokers to cessation services at end of the study. When used in randomized controlled trials in settings with real-world message exposure over time, this protocol may help identify the true impact of warnings and thus better inform tobacco product labeling policy. PMID:25564282
SARNAclust: Semi-automatic detection of RNA protein binding motifs from immunoprecipitation data
Dotu, Ivan; Adamson, Scott I.; Coleman, Benjamin; Fournier, Cyril; Ricart-Altimiras, Emma; Eyras, Eduardo
2018-01-01
RNA-protein binding is critical to gene regulation, controlling fundamental processes including splicing, translation, localization and stability, and aberrant RNA-protein interactions are known to play a role in a wide variety of diseases. However, molecular understanding of RNA-protein interactions remains limited; in particular, identification of RNA motifs that bind proteins has long been challenging, especially when such motifs depend on both sequence and structure. Moreover, although RNA binding proteins (RBPs) often contain more than one binding domain, algorithms capable of identifying more than one binding motif simultaneously have not been developed. In this paper we present a novel pipeline to determine binding peaks in crosslinking immunoprecipitation (CLIP) data, to discover multiple possible RNA sequence/structure motifs among them, and to experimentally validate such motifs. At the core is a new semi-automatic algorithm SARNAclust, the first unsupervised method to identify and deconvolve multiple sequence/structure motifs simultaneously. SARNAclust computes similarity between sequence/structure objects using a graph kernel, providing the ability to isolate the impact of specific features through the bulge graph formalism. Application of SARNAclust to synthetic data shows its capability of clustering 5 motifs at once with a V-measure value of over 0.95, while GraphClust achieves only a V-measure of 0.083 and RNAcontext cannot detect any of the motifs. When applied to existing eCLIP sets, SARNAclust finds known motifs for SLBP and HNRNPC and novel motifs for several other RBPs such as AGGF1, AKAP8L and ILF3. We demonstrate an experimental validation protocol, a targeted Bind-n-Seq-like high-throughput sequencing approach that relies on RNA inverse folding for oligo pool design, that can validate the components within the SLBP motif. Finally, we use this protocol to experimentally interrogate the SARNAclust motif predictions for protein ILF3. Our results support a newly identified partially double-stranded UUUUUGAGA motif similar to that known for the splicing factor HNRNPC. PMID:29596423
Biotemplated Synthesis of PZT Nanowires
2013-11-25
this same experimental protocol would be successful with other biotemplates. M13 bacteriophage was chosen as a second template because (1) it possesses...and (3) it can be customized to bind compounds of interest with tailorable specificities based on the phage display process.14 M13 is a virus that is...coefficients (d33 < 8 pm/V). 50 As negatively charged carboxyl groups can bind cations,51 M13 phages were genetically engineered to display glutamate
van der Linden, Helma; Austin, Tony; Talmon, Jan
2009-09-01
Future-proof EHR systems must be capable of interpreting information structures for medical concepts that were not available at the build-time of the system. The two-model approach of CEN 13606/openEHR using archetypes achieves this by separating generic clinical knowledge from domain-related knowledge. The presentation of this information can either itself be generic, or require design time awareness of the domain knowledge being employed. To develop a Graphical User Interface (GUI) that would be capable of displaying previously unencountered clinical data structures in a meaningful way. Through "reasoning by analogy" we defined an approach for the representation and implementation of "presentational knowledge". A proof-of-concept implementation was built to validate its implementability and to test for unanticipated issues. A two-model approach to specifying and generating a screen representation for archetype-based information, inspired by the two-model approach of archetypes, was developed. There is a separation between software-related display knowledge and domain-related display knowledge and the toolkit is designed with the reuse of components in mind. The approach leads to a flexible GUI that can adapt not only to information structures that had not been predefined within the receiving system, but also to novel ways of displaying the information. We also found that, ideally, the openEHR Archetype Definition Language should receive minor adjustments to allow for generic binding.
Targeting War-Sustaining Capability at Sea: Compatibility with Additional Protocol I
2009-07-01
however, it is an aspirational “model code ” proposed by a non- governmental organization, not a binding international agreement. See SAN REMO MANUAL...limits of the law of war at sea. Moreover, the Nuremburg court’s decision to convict Dönitz of violating international law but not to inflict... Nuremburg charged Dönitz with waging “unrestricted submarine warfare contrary to the Naval Protocol of 1936 . . . which reaffirmed the rules of submarine
The pepATTRACT web server for blind, large-scale peptide-protein docking.
de Vries, Sjoerd J; Rey, Julien; Schindler, Christina E M; Zacharias, Martin; Tuffery, Pierre
2017-07-03
Peptide-protein interactions are ubiquitous in the cell and form an important part of the interactome. Computational docking methods can complement experimental characterization of these complexes, but current protocols are not applicable on the proteome scale. pepATTRACT is a novel docking protocol that is fully blind, i.e. it does not require any information about the binding site. In various stages of its development, pepATTRACT has participated in CAPRI, making successful predictions for five out of seven protein-peptide targets. Its performance is similar or better than state-of-the-art local docking protocols that do require binding site information. Here we present a novel web server that carries out the rigid-body stage of pepATTRACT. On the peptiDB benchmark, the web server generates a correct model in the top 50 in 34% of the cases. Compared to the full pepATTRACT protocol, this leads to some loss of performance, but the computation time is reduced from ∼18 h to ∼10 min. Combined with the fact that it is fully blind, this makes the web server well-suited for large-scale in silico protein-peptide docking experiments. The rigid-body pepATTRACT server is freely available at http://bioserv.rpbs.univ-paris-diderot.fr/services/pepATTRACT. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.
Purification of FLAG-tagged Secreted Proteins from Mammalian Cells
Itakura, Eisuke; Chen, Changchun; de Bono, Mario
2017-01-01
This protocol describes a method for purifying glycosylated FLAG-tagged secreted proteins with disulfide bonds from mammalian cells. The purified products can be used for various applications, such as ligand binding assays. PMID:29075655
NASA Astrophysics Data System (ADS)
Grudinin, Sergei; Kadukova, Maria; Eisenbarth, Andreas; Marillet, Simon; Cazals, Frédéric
2016-09-01
The 2015 D3R Grand Challenge provided an opportunity to test our new model for the binding free energy of small molecules, as well as to assess our protocol to predict binding poses for protein-ligand complexes. Our pose predictions were ranked 3-9 for the HSP90 dataset, depending on the assessment metric. For the MAP4K dataset the ranks are very dispersed and equal to 2-35, depending on the assessment metric, which does not provide any insight into the accuracy of the method. The main success of our pose prediction protocol was the re-scoring stage using the recently developed Convex-PL potential. We make a thorough analysis of our docking predictions made with AutoDock Vina and discuss the effect of the choice of rigid receptor templates, the number of flexible residues in the binding pocket, the binding pocket size, and the benefits of re-scoring. However, the main challenge was to predict experimentally determined binding affinities for two blind test sets. Our affinity prediction model consisted of two terms, a pairwise-additive enthalpy, and a non pairwise-additive entropy. We trained the free parameters of the model with a regularized regression using affinity and structural data from the PDBBind database. Our model performed very well on the training set, however, failed on the two test sets. We explain the drawback and pitfalls of our model, in particular in terms of relative coverage of the test set by the training set and missed dynamical properties from crystal structures, and discuss different routes to improve it.
Assessment of a recombinant androgen receptor binding assay: initial steps towards validation.
Freyberger, Alexius; Weimer, Marc; Tran, Hoai-Son; Ahr, Hans-Jürgen
2010-08-01
Despite more than a decade of research in the field of endocrine active compounds with affinity for the androgen receptor (AR), still no validated recombinant AR binding assay is available, although recombinant AR can be obtained from several sources. With funding from the European Union (EU)-sponsored 6th framework project, ReProTect, we developed a model protocol for such an assay based on a simple AR binding assay recently developed at our institution. Important features of the protocol were the use of a rat recombinant fusion protein to thioredoxin containing both the hinge region and ligand binding domain (LBD) of the rat AR (which is identical to the human AR-LBD) and performance in a 96-well plate format. Besides two reference compounds [dihydrotestosterone (DHT), androstenedione] ten test compounds with different affinities for the AR [levonorgestrel, progesterone, prochloraz, 17alpha-methyltestosterone, flutamide, norethynodrel, o,p'-DDT, dibutylphthalate, vinclozolin, linuron] were used to explore the performance of the assay. At least three independent experiments per compound were performed. The AR binding properties of reference and test compounds were well detected, in terms of the relative ranking of binding affinities, there was good agreement with published data obtained from experiments using recombinant AR preparations. Irrespective of the chemical nature of the compound, individual IC(50)-values for a given compound varied by not more than a factor of 2.6. Our data demonstrate that the assay reliably ranked compounds with strong, weak, and no/marginal affinity for the AR with high accuracy. It avoids the manipulation and use of animals, as a recombinant protein is used and thus contributes to the 3R concept. On the whole, this assay is a promising candidate for further validation. Copyright 2009 Elsevier Inc. All rights reserved.
In Silico Screening for Inhibitors of P-Glycoprotein That Target the Nucleotide Binding Domains
Brewer, Frances K.; Follit, Courtney A.; Vogel, Pia D.
2014-01-01
Multidrug resistances and the failure of chemotherapies are often caused by the expression or overexpression of ATP-binding cassette transporter proteins such as the multidrug resistance protein, P-glycoprotein (P-gp). P-gp is expressed in the plasma membrane of many cell types and protects cells from accumulation of toxins. P-gp uses ATP hydrolysis to catalyze the transport of a broad range of mostly hydrophobic compounds across the plasma membrane and out of the cell. During cancer chemotherapy, the administration of therapeutics often selects for cells which overexpress P-gp, thereby creating populations of cancer cells resistant to a variety of chemically unrelated chemotherapeutics. The present study describes extremely high-throughput, massively parallel in silico ligand docking studies aimed at identifying reversible inhibitors of ATP hydrolysis that target the nucleotide-binding domains of P-gp. We used a structural model of human P-gp that we obtained from molecular dynamics experiments as the protein target for ligand docking. We employed a novel approach of subtractive docking experiments that identified ligands that bound predominantly to the nucleotide-binding domains but not the drug-binding domains of P-gp. Four compounds were found that inhibit ATP hydrolysis by P-gp. Using electron spin resonance spectroscopy, we showed that at least three of these compounds affected nucleotide binding to the transporter. These studies represent a successful proof of principle demonstrating the potential of targeted approaches for identifying specific inhibitors of P-gp. PMID:25270578
Wyhs, Nicolas; Walker, David; Giovinazzo, Hugh; Yegnasubramanian, Srinivasan; Nelson, William G
2014-08-01
Methylated DNA binding proteins such as Methyl-CpG Binding Domain Protein 2 (MBD2) can transduce DNA methylation alterations into a repressive signal by recruiting transcriptional co-repressor complexes. Interfering with MBD2 could lead to reactivation of tumor suppressor genes and therefore represents an attractive strategy for epigenetic therapy. We developed and compared fluorescence polarization (FP) and time-resolved fluorescence resonance energy transfer (TR-FRET)-based high-throughput screening (HTS) assays to identify small-molecule inhibitors of the interaction between the methyl binding domain of MBD2 (MBD2-MBD) and methylated DNA. Although both assays performed well in 96-well format, the TR-FRET assay (Z' factor = 0.58) emerged as a superior screening strategy compared with FP (Z' factor = 0.08) when evaluated in an HTS 384-well plate format. Using TR-FRET, we screened the Sigma LOPAC library for MBD2-MBD inhibitors and identified four compounds that also validated in a dose-response series. This included two known DNA intercalators (mitoxantrone and idarubicin) among two other inhibitory compounds (NF449 and aurintricarboxylic acid). All four compounds also inhibited the binding of SP-1, a transcription factor with a GC-rich binding sequence, to a methylated oligonucleotide, demonstrating that the activity was nonspecific. Our results provide proof of principle for using TR-FRET-based HTS to identify small-molecule inhibitors of MBD2 and other DNA-protein interactions. © 2014 Society for Laboratory Automation and Screening.
Mustafaoglu, Nur; Alves, Nathan J; Bilgicer, Basar
2015-07-01
The nucleotide binding site (NBS) is a highly conserved region between the variable light and heavy chains at the Fab domains of all antibodies, and a small molecule that we identified, indole-3-butyric acid (IBA), binds specifically to this site. Fab fragment, with its small size and simple production methods compared to intact antibody, is good candidate for use in miniaturized diagnostic devices and targeted therapeutic applications. However, commonly used modification techniques are not well suited for Fab fragments as they are often more delicate than intact antibodies. Fab fragments are of particular interest for sensor surface functionalization but immobilization results in damage to the antigen binding site and greatly reduced activity due to their truncated size that allows only a small area that can bind to surfaces without impeding antigen binding. In this study, we describe an NBS-UV photocrosslinking functionalization method (UV-NBS(Biotin) in which a Fab fragment is site-specifically biotinylated with an IBA-EG11-Biotin linker via UV energy exposure (1 J/cm(2)) without affecting its antigen binding activity. This study demonstrates successful immobilization of biotinylated Ebola detecting Fab fragment (KZ52 Fab fragment) via the UV-NBS(Biotin) method yielding 1031-fold and 2-fold better antigen detection sensitivity compared to commonly used immobilization methods: direct physical adsorption and NHS-Biotin functionalization, respectively. Utilization of the UV-NBS(Biotin) method for site-specific conjugation to Fab fragment represents a proof of concept use of Fab fragment for various diagnostic and therapeutic applications with numerous fluorescent probes, affinity molecules and peptides. © 2015 Wiley Periodicals, Inc.
Rainbow correlation imaging with macroscopic twin beam
NASA Astrophysics Data System (ADS)
Allevi, Alessia; Bondani, Maria
2017-06-01
We present the implementation of a correlation-imaging protocol that exploits both the spatial and spectral correlations of macroscopic twin-beam states generated by parametric downconversion. In particular, the spectral resolution of an imaging spectrometer coupled to an EMCCD camera is used in a proof-of-principle experiment to encrypt and decrypt a simple code to be transmitted between two parties. In order to optimize the trade-off between visibility and resolution, we provide the characterization of the correlation images as a function of the spatio-spectral properties of twin beams generated at different pump power values.
Taking a Concept to Commercialization: Designing Relevant Tests to Address Safety.
Ferrara, Lisa A
2016-04-01
Taking a product from concept to commercialization requires careful navigation of the regulatory pathway through a series of steps: (A) moving the idea through proof of concept and beyond; (B) evaluating new technologies that may provide added value to the idea; (C) designing appropriate test strategies and protocols; and (D) evaluating and mitigating risks. Moving an idea from the napkin stage of development to the final product requires a team effort. When finished, the product rarely resembles the original design, but careful steps throughout the product life cycle ensure that the product meets the vision.
Lodewyck, Jérôme; Debuisschert, Thierry; García-Patrón, Raúl; Tualle-Brouri, Rosa; Cerf, Nicolas J; Grangier, Philippe
2007-01-19
An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigated experimentally. By varying the interception fraction, one can implement a family of attacks where the eavesdropper totally controls the channel parameters. In general, such attacks add excess noise in the channel, and may also result in non-Gaussian output distributions. We implement and characterize the measurements needed to detect these attacks, and evaluate experimentally the information rates available to the legitimate users and the eavesdropper. The results are consistent with the optimality of Gaussian attacks resulting from the security proofs.
Spectral features of the body fluids of patients with benign and malignant prostate tumours
NASA Astrophysics Data System (ADS)
Atif, M.; Devanesan, S.; Farhat, K.; Rabah, D.; AlSalhi, M. S.; Masilamani, V.
2013-05-01
In this study, we present the results of fluorescence spectra of blood and urine to detect and discriminate between samples drawn from benign and malignant prostate patients and we find a very good demarcation in terms of spectral features. This preliminary study was carried out as a proof of concept, with limited samples of blood and urine from known cases of patients of BPH and CaP. In the near future it is expected that a detailed clinical validation will be done to establish it as a reliable cancer diagnosis protocol.
Rapid regulation of nuclear proteins by rapamycin-induced translocation in fission yeast
Ding, Lin; Laor, Dana; Weisman, Ronit; Forsburg, Susan L
2014-01-01
Genetic analysis of protein function requires a rapid means of inactivating the gene under study. Typically this exploits temperature sensitive mutations, or promoter shut-off techniques. We report the adaptation to Schizosaccharomyces pombe of the Anchor Away technique, originally designed in budding yeast (Haruki et al., 2008a). This method relies on a rapamycin-mediated interaction between the FRB and FKBP12 binding domains, to relocalize nuclear proteins of interest to the cytoplasm. We demonstrate a rapid nuclear depletion of abundant proteins as proof-of-principle. PMID:24733494
Freyberger, Alexius; Wilson, Vickie; Weimer, Marc; Tan, Shirlee; Tran, Hoai-Son; Ahr, Hans-Jürgen
2010-08-01
Despite about two decades of research in the field of endocrine active compounds, still no validated human recombinant (hr) estrogen receptor-alpha (ERalpha) binding assay is available, although hr-ERalpha is available from several sources. In a joint effort, US EPA and Bayer Schering Pharma with funding from the EU-sponsored 6th framework project, ReProTect, developed a model protocol for such a binding assay. Important features of this assay are the use of a full length hr-ERalpha and performance in a 96-well plate format. A full length hr-ERalpha was chosen, as it was considered to provide the most accurate and human-relevant results, whereas truncated receptors could perform differently. Besides three reference compounds [17beta-estradiol, norethynodrel, dibutylphthalate] nine test compounds with different affinities for the ERalpha [diethylstilbestrol (DES), ethynylestradiol, meso-hexestrol, equol, genistein, o,p'-DDT, nonylphenol, n-butylparaben, and corticosterone] were used to explore the performance of the assay. Three independent experiments per compound were performed on different days, and dilutions of test compounds from deep-frozen stocks, solutions of radiolabeled ligand and receptor preparation were freshly prepared for each experiment. The ERalpha binding properties of reference and test compounds were well detected. As expected dibutylphthalate and corticosterone were non-binders in this assay. In terms of the relative ranking of binding affinities, there was good agreement with published data obtained from experiments using a human recombinant ERalpha ligand binding domain. Irrespective of the chemical nature of the compound, individual IC(50)-values for a given compound varied by not more than a factor of 2.5. Our data demonstrate that the assay was robust and reliably ranked compounds with strong, weak, and no affinity for the ERalpha with high accuracy. It avoids the manipulation and use of animals, i.e., the preparation of uterine cytosol as receptor source from ovariectomized rats, as a recombinant protein is used and thus contributes to the 3R concept (reduce, replace, and refine). Furthermore, in contrast to other assays, this assay could be adjusted to an intermediate/high throughput format. On the whole, this assay is a promising candidate for further validation. Copyright 2010 Elsevier Inc. All rights reserved.
Wang, Yu-Kai; Zhu, Wan-Wan; Wu, Meng-Hua; Wu, Yi-Hui; Liu, Zheng-Xin; Liang, Ling-Min; Sheng, Chao; Hao, Jie; Wang, Liu; Li, Wei; Zhou, Qi; Hu, Bao-Yang
2018-06-07
Clinical application of stem cell derivatives requires clinical-grade cells and sufficient preclinical proof of safety and efficacy, preferably in primates. We previously successfully established a clinical-grade human parthenogenetic embryonic stem cell (hPESC) line, but the suitability of its subtype-specific progenies for therapy is not clear. Here, we compared the function of clinical-grade hPESC-derived midbrain dopaminergic (DA) neurons in two canonical protocols in a primate Parkinson's disease (PD) model. We found that the grafts did not form tumors and produced variable but apparent behavioral improvement for at least 24 months in most monkeys in both groups. In addition, a slight DA increase in the striatum correlates with significant functional improvement. These results demonstrated that clinical-grade hPESCs can serve as a reliable source of cells for PD treatment. Our proof-of-concept findings provide preclinical data for China's first ESC-based phase I/IIa clinical study of PD (ClinicalTrials.gov number NCT03119636). Copyright © 2018 The Authors. Published by Elsevier Inc. All rights reserved.
Telehealth: voice therapy using telecommunications technology.
Mashima, Pauline A; Birkmire-Peters, Deborah P; Syms, Mark J; Holtel, Michael R; Burgess, Lawrence P A; Peters, Leslie J
2003-11-01
Telehealth offers the potential to meet the needs of underserved populations in remote regions. The purpose of this study was a proof-of-concept to determine whether voice therapy can be delivered effectively remotely. Treatment outcomes were evaluated for a vocal rehabilitation protocol delivered under 2 conditions: with the patient and clinician interacting within the same room (conventional group) and with the patient and clinician in separate rooms, interacting in real time via a hard-wired video camera and monitor (video teleconference group). Seventy-two patients with voice disorders served as participants. Based on evaluation by otolaryngologists, 31 participants were diagnosed with vocal nodules, 29 were diagnosed with edema, 9 were diagnosed with unilateral vocal fold paralysis, and 3 presented with vocal hyperfunction with no laryngeal pathology. Fifty-one participants (71%) completed the vocal rehabilitation protocol. Outcome measures included perceptual judgments of voice quality, acoustic analyses of voice, patient satisfaction ratings, and fiber-optic laryngoscopy. There were no differences in outcome measures between the conventional group and the remote video teleconference group. Participants in both groups showed positive changes on all outcome measures after completing the vocal rehabilitation protocol. Reasons for participants discontinuing therapy prematurely provided support for the telehealth model of service delivery.
Benchmarking for On-Scalp MEG Sensors.
Xie, Minshu; Schneiderman, Justin F; Chukharkin, Maxim L; Kalabukhov, Alexei; Riaz, Bushra; Lundqvist, Daniel; Whitmarsh, Stephen; Hamalainen, Matti; Jousmaki, Veikko; Oostenveld, Robert; Winkler, Dag
2017-06-01
We present a benchmarking protocol for quantitatively comparing emerging on-scalp magnetoencephalography (MEG) sensor technologies to their counterparts in state-of-the-art MEG systems. As a means of validation, we compare a high-critical-temperature superconducting quantum interference device (high T c SQUID) with the low- T c SQUIDs of an Elekta Neuromag TRIUX system in MEG recordings of auditory and somatosensory evoked fields (SEFs) on one human subject. We measure the expected signal gain for the auditory-evoked fields (deeper sources) and notice some unfamiliar features in the on-scalp sensor-based recordings of SEFs (shallower sources). The experimental results serve as a proof of principle for the benchmarking protocol. This approach is straightforward, general to various on-scalp MEG sensors, and convenient to use on human subjects. The unexpected features in the SEFs suggest on-scalp MEG sensors may reveal information about neuromagnetic sources that is otherwise difficult to extract from state-of-the-art MEG recordings. As the first systematically established on-scalp MEG benchmarking protocol, magnetic sensor developers can employ this method to prove the utility of their technology in MEG recordings. Further exploration of the SEFs with on-scalp MEG sensors may reveal unique information about their sources.
RSA-Based Password-Authenticated Key Exchange, Revisited
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
Mason, Anne B; Judson, Gregory L; Bravo, Maria Cristina; Edelstein, Andrew; Byrne, Shaina L; James, Nicholas G; Roush, Eric D; Fierke, Carol A; Bobst, Cedric E; Kaltashov, Igor A; Daughtery, Margaret A
2008-09-16
The murine inhibitor of carbonic anhydrase (mICA) is a member of the superfamily related to the bilobal iron transport protein transferrin (TF), which binds a ferric ion within a cleft in each lobe. Although the gene encoding ICA in humans is classified as a pseudogene, an apparently functional ICA gene has been annotated in mice, rats, cows, pigs, and dogs. All ICAs lack one (or more) of the amino acid ligands in each lobe essential for high-affinity coordination of iron and the requisite synergistic anion, carbonate. The reason why ICA family members have lost the ability to bind iron is potentially related to acquiring a new function(s), one of which is inhibition of certain carbonic anhydrase (CA) isoforms. A recombinant mutant of the mICA (W124R/S188Y) was created with the goal of restoring the ligands required for both anion (Arg124) and iron (Tyr188) binding in the N-lobe. Absorption and fluorescence spectra definitively show that the mutant binds ferric iron in the N-lobe. Electrospray ionization mass spectrometry confirms the presence of both ferric iron and carbonate. At the putative endosomal pH of 5.6, iron is released by two slow processes indicative of high-affinity coordination. Induction of specific iron binding implies that (1) the structure of mICA resembles those of other TF family members and (2) the N-lobe can adopt a conformation in which the cleft closes when iron binds. Because the conformational change in the N-lobe indicated by metal binding does not impact the inhibitory activity of mICA, inhibition of CA was tentatively assigned to the C-lobe. Proof of this assignment is provided by limited trypsin proteolysis of porcine ICA.
Lipid Microarray Biosensor for Biotoxin Detection.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singh, Anup K.; Throckmorton, Daniel J.; Moran-Mirabal, Jose C.
2006-05-01
We present the use of micron-sized lipid domains, patterned onto planar substrates and within microfluidic channels, to assay the binding of bacterial toxins via total internal reflection fluorescence microscopy (TIRFM). The lipid domains were patterned using a polymer lift-off technique and consisted of ganglioside-populated DSPC:cholesterol supported lipid bilayers (SLBs). Lipid patterns were formed on the substrates by vesicle fusion followed by polymer lift-off, which revealed micron-sized SLBs containing either ganglioside GT1b or GM1. The ganglioside-populated SLB arrays were then exposed to either Cholera toxin subunit B (CTB) or Tetanus toxin fragment C (TTC). Binding was assayed on planar substrates bymore » TIRFM down to 1 nM concentration for CTB and 100 nM for TTC. Apparent binding constants extracted from three different models applied to the binding curves suggest that binding of a protein to a lipid-based receptor is strongly affected by the lipid composition of the SLB and by the substrate on which the bilayer is formed. Patterning of SLBs inside microfluidic channels also allowed the preparation of lipid domains with different compositions on a single device. Arrays within microfluidic channels were used to achieve segregation and selective binding from a binary mixture of the toxin fragments in one device. The binding and segregation within the microfluidic channels was assayed with epifluorescence as proof of concept. We propose that the method used for patterning the lipid microarrays on planar substrates and within microfluidic channels can be easily adapted to proteins or nucleic acids and can be used for biosensor applications and cell stimulation assays under different flow conditions. KEYWORDS. Microarray, ganglioside, polymer lift-off, cholera toxin, tetanus toxin, TIRFM, binding constant.4« less
NASA Astrophysics Data System (ADS)
Lu, Hoang D.; Yang, Shirley S.; Wilson, Brian K.; McManus, Simon A.; Chen, Christopher V. H.-H.; Prud'homme, Robert K.
2017-04-01
Antimicrobial resistance is a healthcare problem of increasing significance, and there is increasing interest in developing new tools to address bacterial infections. Bacteria-targeting nanoparticles hold promise to improve drug efficacy, compliance, and safety. In addition, nanoparticles can also be used for novel applications, such as bacterial imaging or bioseperations. We here present the use of a scalable block-copolymer-directed self-assembly process, Flash NanoPrecipitation, to form zinc(II)-bis(dipicolylamine) modified nanoparticles that bind to both Gram-positive and Gram-negative bacteria with specificity. Particles have tunable surface ligand densities that change particle avidity and binding efficacy. A variety of materials can be encapsulated into the core of the particles, such as optical dyes or iron oxide colloids, to produce imageable and magnetically active bacterial targeting constructs. As a proof-of-concept, these particles are used to bind and separate bacteria from solution in a magnetic column. Magnetic manipulation and separation would translate to a platform for pathogen identification or removal. These magnetic and targeted nanoparticles enable new methods to address bacterial infections.
Mobile magnetic particles as solid-supports for rapid surface-based bioanalysis in continuous flow.
Peyman, Sally A; Iles, Alexander; Pamme, Nicole
2009-11-07
An extremely versatile microfluidic device is demonstrated in which multi-step (bio)chemical procedures can be performed in continuous flow. The system operates by generating several co-laminar flow streams, which contain reagents for specific (bio)reactions across a rectangular reaction chamber. Functionalized magnetic microparticles are employed as mobile solid-supports and are pulled from one side of the reaction chamber to the other by use of an external magnetic field. As the particles traverse the co-laminar reagent streams, binding and washing steps are performed on their surface in one operation in continuous flow. The applicability of the platform was first demonstrated by performing a proof-of-principle binding assay between streptavidin coated magnetic particles and biotin in free solution with a limit of detection of 20 ng mL(-1) of free biotin. The system was then applied to a mouse IgG sandwich immunoassay as a first example of a process involving two binding steps and two washing steps, all performed within 60 s, a fraction of the time required for conventional testing.
Hexameric supramolecular scaffold orients carbohydrates to sense bacteria.
Grünstein, Dan; Maglinao, Maha; Kikkeri, Raghavendra; Collot, Mayeul; Barylyuk, Konstantin; Lepenies, Bernd; Kamena, Faustin; Zenobi, Renato; Seeberger, Peter H
2011-09-07
Carbohydrates are integral to biological signaling networks and cell-cell interactions, yet the detection of discrete carbohydrate-lectin interactions remains difficult since binding is generally weak. A strategy to overcome this problem is to create multivalent sensors, where the avidity rather than the affinity of the interaction is important. Here we describe the development of a series of multivalent sensors that self-assemble via hydrophobic supramolecular interactions. The multivalent sensors are comprised of a fluorescent ruthenium(II) core surrounded by a heptamannosylated β-cyclodextrin scaffold. Two additional series of complexes were synthesized as proof-of-principle for supramolecular self-assembly, the fluorescent core alone and the core plus β-cyclodextrin. Spectroscopic analyses confirmed that the three mannosylated sensors displayed 14, 28, and 42 sugar units, respectively. Each complex adopted original and unique spatial arrangements. The sensors were used to investigate the influence of carbohydrate spatial arrangement and clustering on the mechanistic and qualitative properties of lectin binding. Simple visualization of binding between a fluorescent, multivalent mannose complex and the Escherichia coli strain ORN178 that possesses mannose-specific receptor sites illustrates the potential for these complexes as biosensors.
De Silva, Channa R.; Vagner, Josef; Lynch, Ronald; Gillies, Robert J.; Hruby, Victor J.
2010-01-01
Lanthanide-based luminescent ligand binding assays are superior to traditional radiolabel assays due to improved sensitivity and affordability in high throughput screening while eliminating the use of radioactivity. Despite significant progress using lanthanide(III)-coordinated chelators such as DTPA derivatives, dissociation-enhanced lanthanide fluoroimmunoassays (DELFIA) have not yet been successfully used with more stable chelators, e.g. DOTA derivatives, due to the incomplete release of lanthanide(III) ions from the complex. Here, a modified and an optimized DELFIA procedure incorporating an acid treatment protocol is introduced for use with Eu(III)-DOTA labeled peptides. Complete release of Eu(III) ions from DOTA labeled ligands was observed using hydrochloric acid (2.0 M) prior to the luminescent enhancement step. NDP-α-MSH labeled with Eu(III)-DOTA was synthesized and the binding affinity to cells overexpressing the human melanocortin-4 receptors (hMC4R) was evaluated using the modified protocol. Binding data indicate that the Eu(III)-DOTA linked peptide bound to these cells with an affinity similar to its DTPA analogue. The modified DELFIA procedure was further used to monitor the binding of an Eu(III)-DOTA labeled heterobivalent peptide to the cells expressing both hMC4R and CCK-2 (Cholecystokinin) receptors. The modified assay provides superior results and is appropriate for high-throughput screening of ligand libraries. PMID:19852924
Mizwicki, Mathew T.; Menegaz, Danusa; Yaghmaei, Sepideh; Henry, Helen L.; Norman, Anthony W.
2010-01-01
Molecular modeling results indicate that the VDR contains two overlapping ligand binding pockets (LBP). Differential ligand stability and fractional occupancy of the two LBP has been physiochemically linked to the regulation of VDR-dependent genomic and non-genomic cellular responses. The purpose of this report is to develop an unbiased molecular modeling protocol that serves as a good starting point in simulating the dynamic interaction between 1α,25(OH)2-vitamin D3 (1,25D3) and the VDR LBP. To accomplish this goal, the flexible docking protocol developed allowed for flexibility in the VDR ligand and the VDR atoms that form the surfaces of the VDR LBP. This approach blindly replicated the 1,25D3 conformation and side-chain dynamics observed in the VDR x-ray structure. The results are also consistent with the previously published tenants of the vitamin D sterol (VDS)-VDR conformational ensemble model. Furthermore, we used flexible docking in combination with whole cell patch clamp electrophysiology and steroid competition assays to demonstrate that a) new non-vitamin D VDR ligands show a different pocket selectivity when compared to 1,25D3 that is qualitatively consistent with their ability to stimulate chloride channels and b) a new route of ligand binding provides a novel hypothesis describing the structural nuances that underlie hypercalceamia. PMID:20398762
Kurcinski, Mateusz; Jamroz, Michal; Blaszczyk, Maciej; Kolinski, Andrzej; Kmiecik, Sebastian
2015-07-01
Protein-peptide interactions play a key role in cell functions. Their structural characterization, though challenging, is important for the discovery of new drugs. The CABS-dock web server provides an interface for modeling protein-peptide interactions using a highly efficient protocol for the flexible docking of peptides to proteins. While other docking algorithms require pre-defined localization of the binding site, CABS-dock does not require such knowledge. Given a protein receptor structure and a peptide sequence (and starting from random conformations and positions of the peptide), CABS-dock performs simulation search for the binding site allowing for full flexibility of the peptide and small fluctuations of the receptor backbone. This protocol was extensively tested over the largest dataset of non-redundant protein-peptide interactions available to date (including bound and unbound docking cases). For over 80% of bound and unbound dataset cases, we obtained models with high or medium accuracy (sufficient for practical applications). Additionally, as optional features, CABS-dock can exclude user-selected binding modes from docking search or to increase the level of flexibility for chosen receptor fragments. CABS-dock is freely available as a web server at http://biocomp.chem.uw.edu.pl/CABSdock. © The Author(s) 2015. Published by Oxford University Press on behalf of Nucleic Acids Research.
Measurement of drug-target engagement in live cells by two-photon fluorescence anisotropy imaging.
Vinegoni, Claudio; Fumene Feruglio, Paolo; Brand, Christian; Lee, Sungon; Nibbs, Antoinette E; Stapleton, Shawn; Shah, Sunil; Gryczynski, Ignacy; Reiner, Thomas; Mazitschek, Ralph; Weissleder, Ralph
2017-07-01
The ability to directly image and quantify drug-target engagement and drug distribution with subcellular resolution in live cells and whole organisms is a prerequisite to establishing accurate models of the kinetics and dynamics of drug action. Such methods would thus have far-reaching applications in drug development and molecular pharmacology. We recently presented one such technique based on fluorescence anisotropy, a spectroscopic method based on polarization light analysis and capable of measuring the binding interaction between molecules. Our technique allows the direct characterization of target engagement of fluorescently labeled drugs, using fluorophores with a fluorescence lifetime larger than the rotational correlation of the bound complex. Here we describe an optimized protocol for simultaneous dual-channel two-photon fluorescence anisotropy microscopy acquisition to perform drug-target measurements. We also provide the necessary software to implement stream processing to visualize images and to calculate quantitative parameters. The assembly and characterization part of the protocol can be implemented in 1 d. Sample preparation, characterization and imaging of drug binding can be completed in 2 d. Although currently adapted to an Olympus FV1000MPE microscope, the protocol can be extended to other commercial or custom-built microscopes.
Digitized molecular diagnostics: reading disk-based bioassays with standard computer drives.
Li, Yunchao; Ou, Lily M L; Yu, Hua-Zhong
2008-11-01
We report herein a digital signal readout protocol for screening disk-based bioassays with standard optical drives of ordinary desktop/notebook computers. Three different types of biochemical recognition reactions (biotin-streptavidin binding, DNA hybridization, and protein-protein interaction) were performed directly on a compact disk in a line array format with the help of microfluidic channel plates. Being well-correlated with the optical darkness of the binding sites (after signal enhancement by gold nanoparticle-promoted autometallography), the reading error levels of prerecorded audio files can serve as a quantitative measure of biochemical interaction. This novel readout protocol is about 1 order of magnitude more sensitive than fluorescence labeling/scanning and has the capability of examining multiplex microassays on the same disk. Because no modification to either hardware or software is needed, it promises a platform technology for rapid, low-cost, and high-throughput point-of-care biomedical diagnostics.
Ghodbane, Ramzi; Asmar, Shady; Betzner, Marlena; Linet, Marie; Pierquin, Joseph; Raoult, Didier; Drancourt, Michel
2015-08-01
Culture remains the cornerstone of diagnosis for pulmonary tuberculosis, but the fastidiousness of Mycobacterium tuberculosis may delay culture-based diagnosis for weeks. We evaluated the performance of real-time high-resolution imaging for the rapid detection of M. tuberculosis colonies growing on a solid medium. A total of 50 clinical specimens, including 42 sputum specimens, 4 stool specimens, 2 bronchoalveolar lavage fluid specimens, and 2 bronchial aspirate fluid specimens were prospectively inoculated into (i) a commercially available Middlebrook broth and evaluated for mycobacterial growth indirectly detected by measuring oxygen consumption (standard protocol) and (ii) a home-made solid medium incubated in an incubator featuring real-time high-resolution imaging of colonies (real-time protocol). Isolates were identified by Ziehl-Neelsen staining and matrix-assisted laser desorption ionization-time of flight mass spectrometry. Use of the standard protocol yielded 14/50 (28%) M. tuberculosis isolates, which is not significantly different from the 13/50 (26%) M. tuberculosis isolates found using the real-time protocol (P = 1.00 by Fisher's exact test), and the contamination rate of 1/50 (2%) was not significantly different from the contamination rate of 2/50 (4%) using the real-time protocol (P = 1.00). The real-time imaging protocol showed a 4.4-fold reduction in time to detection, 82 ± 54 h versus 360 ± 142 h (P < 0.05). These preliminary data give the proof of concept that real-time high-resolution imaging of M. tuberculosis colonies is a new technology that shortens the time to growth detection and the laboratory diagnosis of pulmonary tuberculosis. Copyright © 2015, American Society for Microbiology. All Rights Reserved.
NASA Astrophysics Data System (ADS)
Suzuki, Noriaki
Genetically engineered proteins for inorganics (GEPIs) belong to a new class of polypeptides that are designed to have specific affinities to inorganic materials. A "gold binding protein (GBP)" was chosen as a model protein for GEPIs to study the molecular origins of binding specificity to gold using Time-of-flight secondary ion mass spectrometry (TOF-SIMS) and X-ray photoelectron spectroscopy (XPS). TOF-SIMS, a surface-sensitive analytical instrument with extremely high mass resolutions, provides information on specific amino acid-surface interactions. We used "principal component analysis (PCA)" to analyze the data. We also introduced a new multivariate technique, "hierarchical cluster analysis (HCA)" to organize the data into meaningful structures by measuring a degree of "similarity" and "dissimilarity" of the data. This report discusses a combined use of PCA and HCA to elucidate the binding specificity of GBP to Au. Based on the knowledge gained from TOF-SIMS measurements, we further investigated the nature of the interaction between selected amino acids and noble metal surfaces by using X-ray photoelectron spectroscopy (XPS). We developed a unique capability to introduce water vapor during the adsorption of a single amino acid and applied this method to study the intrinsic nature of sidechain/Au interactions. To further apply this unique research protocol, we characterized another type of GEPI, "quartz binding protein (QBP)," to identify the possible binding sites. This thesis research aims to provide experimental protocols for analyzing short peptide-substrate interface from complex spectroscopic data by using multivariate analysis techniques.
Barkan, David T; Cheng, Xiao-Li; Celino, Herodion; Tran, Tran T; Bhandari, Ashok; Craik, Charles S; Sali, Andrej; Smythe, Mark L
2016-11-23
Disulfide-rich peptides (DRPs) are found throughout nature. They are suitable scaffolds for drug development due to their small cores, whose disulfide bonds impart extraordinary chemical and biological stability. A challenge in developing a DRP therapeutic is to engineer binding to a specific target. This challenge can be overcome by (i) sampling the large sequence space of a given scaffold through a phage display library and by (ii) panning multiple libraries encoding structurally distinct scaffolds. Here, we implement a protocol for defining these diverse scaffolds, based on clustering structurally defined DRPs according to their conformational similarity. We developed and applied a hierarchical clustering protocol based on DRP structural similarity, followed by two post-processing steps, to classify 806 unique DRP structures into 81 clusters. The 20 most populated clusters comprised 85% of all DRPs. Representative scaffolds were selected from each of these clusters; the representatives were structurally distinct from one another, but similar to other DRPs in their respective clusters. To demonstrate the utility of the clusters, phage libraries were constructed for three of the representative scaffolds and panned against interleukin-23. One library produced a peptide that bound to this target with an IC 50 of 3.3 μM. Most DRP clusters contained members that were diverse in sequence, host organism, and interacting proteins, indicating that cluster members were functionally diverse despite having similar structure. Only 20 peptide scaffolds accounted for most of the natural DRP structural diversity, providing suitable starting points for seeding phage display experiments. Through selection of the scaffold surface to vary in phage display, libraries can be designed that present sequence diversity in architecturally distinct, biologically relevant combinations of secondary structures. We supported this hypothesis with a proof-of-concept experiment in which three phage libraries were constructed and panned against the IL-23 target, resulting in a single-digit μM hit and suggesting that a collection of libraries based on the full set of 20 scaffolds increases the potential to identify efficiently peptide binders to a protein target in a drug discovery program.
Relative binding affinity prediction of farnesoid X receptor in the D3R Grand Challenge 2 using FEP.
Schindler, Christina; Rippmann, Friedrich; Kuhn, Daniel
2018-01-01
Physics-based free energy simulations have increasingly become an important tool for predicting binding affinity and the recent introduction of automated protocols has also paved the way towards a more widespread use in the pharmaceutical industry. The D3R 2016 Grand Challenge 2 provided an opportunity to blindly test the commercial free energy calculation protocol FEP+ and assess its performance relative to other affinity prediction methods. The present D3R free energy prediction challenge was built around two experimental data sets involving inhibitors of farnesoid X receptor (FXR) which is a promising anticancer drug target. The FXR binding site is predominantly hydrophobic with few conserved interaction motifs and strong induced fit effects making it a challenging target for molecular modeling and drug design. For both data sets, we achieved reasonable prediction accuracy (RMSD ≈ 1.4 kcal/mol, rank 3-4 according to RMSD out of 20 submissions) comparable to that of state-of-the-art methods in the field. Our D3R results boosted our confidence in the method and strengthen our desire to expand its applications in future in-house drug design projects.
Relative binding affinity prediction of farnesoid X receptor in the D3R Grand Challenge 2 using FEP+
NASA Astrophysics Data System (ADS)
Schindler, Christina; Rippmann, Friedrich; Kuhn, Daniel
2018-01-01
Physics-based free energy simulations have increasingly become an important tool for predicting binding affinity and the recent introduction of automated protocols has also paved the way towards a more widespread use in the pharmaceutical industry. The D3R 2016 Grand Challenge 2 provided an opportunity to blindly test the commercial free energy calculation protocol FEP+ and assess its performance relative to other affinity prediction methods. The present D3R free energy prediction challenge was built around two experimental data sets involving inhibitors of farnesoid X receptor (FXR) which is a promising anticancer drug target. The FXR binding site is predominantly hydrophobic with few conserved interaction motifs and strong induced fit effects making it a challenging target for molecular modeling and drug design. For both data sets, we achieved reasonable prediction accuracy (RMSD ≈ 1.4 kcal/mol, rank 3-4 according to RMSD out of 20 submissions) comparable to that of state-of-the-art methods in the field. Our D3R results boosted our confidence in the method and strengthen our desire to expand its applications in future in-house drug design projects.
Nakato, Ryuichiro; Itoh, Tahehiko; Shirahige, Katsuhiko
2013-07-01
Chromatin immunoprecipitation with high-throughput sequencing (ChIP-seq) can identify genomic regions that bind proteins involved in various chromosomal functions. Although the development of next-generation sequencers offers the technology needed to identify these protein-binding sites, the analysis can be computationally challenging because sequencing data sometimes consist of >100 million reads/sample. Herein, we describe a cost-effective and time-efficient protocol that is generally applicable to ChIP-seq analysis; this protocol uses a novel peak-calling program termed DROMPA to identify peaks and an additional program, parse2wig, to preprocess read-map files. This two-step procedure drastically reduces computational time and memory requirements compared with other programs. DROMPA enables the identification of protein localization sites in repetitive sequences and efficiently identifies both broad and sharp protein localization peaks. Specifically, DROMPA outputs a protein-binding profile map in pdf or png format, which can be easily manipulated by users who have a limited background in bioinformatics. © 2013 The Authors Genes to Cells © 2013 by the Molecular Biology Society of Japan and Wiley Publishing Asia Pty Ltd.
Forskolin-free cAMP assay for Gi-coupled receptors.
Gilissen, Julie; Geubelle, Pierre; Dupuis, Nadine; Laschet, Céline; Pirotte, Bernard; Hanson, Julien
2015-12-01
G protein-coupled receptors (GPCRs) represent the most successful receptor family for treating human diseases. Many are poorly characterized with few ligands reported or remain completely orphans. Therefore, there is a growing need for screening-compatible and sensitive assays. Measurement of intracellular cyclic AMP (cAMP) levels is a validated strategy for measuring GPCRs activation. However, agonist ligands for Gi-coupled receptors are difficult to track because inducers such as forskolin (FSK) must be used and are sources of variations and errors. We developed a method based on the GloSensor system, a kinetic assay that consists in a luciferase fused with cAMP binding domain. As a proof of concept, we selected the succinate receptor 1 (SUCNR1 or GPR91) which could be an attractive drug target. It has never been validated as such because very few ligands have been described. Following analyses of SUCNR1 signaling pathways, we show that the GloSensor system allows real time, FSK-free detection of an agonist effect. This FSK-free agonist signal was confirmed on other Gi-coupled receptors such as CXCR4. In a test screening on SUCNR1, we compared the results obtained with a FSK vs FSK-free protocol and were able to identify agonists with both methods but with fewer false positives when measuring the basal levels. In this report, we validate a cAMP-inducer free method for the detection of Gi-coupled receptors agonists compatible with high-throughput screening. This method will facilitate the study and screening of Gi-coupled receptors for active ligands. Copyright © 2015 Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Xu, Xiaochun; Kang, Soyoung; Navarro-Comes, Eric; Wang, Yu; Liu, Jonathan T. C.; Tichauer, Kenneth M.
2018-03-01
Intraoperative tumor/surgical margin assessment is required to achieve higher tumor resection rate in breast-conserving surgery. Though current histology provides incomparable accuracy in margin assessment, thin tissue sectioning and the limited field of view of microscopy makes histology too time-consuming for intraoperative applications. If thick tissue, wide-field imaging can provide an acceptable assessment of tumor cells at the surface of resected tissues, an intraoperative protocol can be developed to guide the surgery and provide immediate feedback for surgeons. Topical staining of margins with cancer-targeted molecular imaging agents has the potential to provide the sensitivity needed to see microscopic cancer on a wide-field image; however, diffusion and nonspecific retention of imaging agents in thick tissue can significantly diminish tumor contrast with conventional methods. Here, we present a mathematical model to accurately simulate nonspecific retention, binding, and diffusion of imaging agents in thick tissue topical staining to guide and optimize future thick tissue staining and imaging protocol. In order to verify the accuracy and applicability of the model, diffusion profiles of cancer targeted and untargeted (control) nanoparticles at different staining times in A431 tumor xenografts were acquired for model comparison and tuning. The initial findings suggest the existence of nonspecific retention in the tissue, especially at the tissue surface. The simulator can be used to compare the effect of nonspecific retention, receptor binding and diffusion under various conditions (tissue type, imaging agent) and provides optimal staining and imaging protocols for targeted and control imaging agent.
Raveh, Barak; London, Nir; Zimmerman, Lior; Schueler-Furman, Ora
2011-04-29
Flexible peptides that fold upon binding to another protein molecule mediate a large number of regulatory interactions in the living cell and may provide highly specific recognition modules. We present Rosetta FlexPepDock ab-initio, a protocol for simultaneous docking and de-novo folding of peptides, starting from an approximate specification of the peptide binding site. Using the Rosetta fragments library and a coarse-grained structural representation of the peptide and the receptor, FlexPepDock ab-initio samples efficiently and simultaneously the space of possible peptide backbone conformations and rigid-body orientations over the receptor surface of a given binding site. The subsequent all-atom refinement of the coarse-grained models includes full side-chain modeling of both the receptor and the peptide, resulting in high-resolution models in which key side-chain interactions are recapitulated. The protocol was applied to a benchmark in which peptides were modeled over receptors in either their bound backbone conformations or in their free, unbound form. Near-native peptide conformations were identified in 18/26 of the bound cases and 7/14 of the unbound cases. The protocol performs well on peptides from various classes of secondary structures, including coiled peptides with unusual turns and kinks. The results presented here significantly extend the scope of state-of-the-art methods for high-resolution peptide modeling, which can now be applied to a wide variety of peptide-protein interactions where no prior information about the peptide backbone conformation is available, enabling detailed structure-based studies and manipulation of those interactions. © 2011 Raveh et al.
Raveh, Barak; London, Nir; Zimmerman, Lior; Schueler-Furman, Ora
2011-01-01
Flexible peptides that fold upon binding to another protein molecule mediate a large number of regulatory interactions in the living cell and may provide highly specific recognition modules. We present Rosetta FlexPepDock ab-initio, a protocol for simultaneous docking and de-novo folding of peptides, starting from an approximate specification of the peptide binding site. Using the Rosetta fragments library and a coarse-grained structural representation of the peptide and the receptor, FlexPepDock ab-initio samples efficiently and simultaneously the space of possible peptide backbone conformations and rigid-body orientations over the receptor surface of a given binding site. The subsequent all-atom refinement of the coarse-grained models includes full side-chain modeling of both the receptor and the peptide, resulting in high-resolution models in which key side-chain interactions are recapitulated. The protocol was applied to a benchmark in which peptides were modeled over receptors in either their bound backbone conformations or in their free, unbound form. Near-native peptide conformations were identified in 18/26 of the bound cases and 7/14 of the unbound cases. The protocol performs well on peptides from various classes of secondary structures, including coiled peptides with unusual turns and kinks. The results presented here significantly extend the scope of state-of-the-art methods for high-resolution peptide modeling, which can now be applied to a wide variety of peptide-protein interactions where no prior information about the peptide backbone conformation is available, enabling detailed structure-based studies and manipulation of those interactions. PMID:21572516
Tomaselli, Simona; Giovanella, Umberto; Pagano, Katiuscia; Leone, Giuseppe; Zanzoni, Serena; Assfalg, Michael; Meinardi, Francesco; Molinari, Henriette; Botta, Chiara; Ragona, Laura
2013-10-14
New strategies are requested for the preparation of bioinspired host-guest complexes to be employed in technologically relevant applications, as sensors and optoelectronic devices. We report here a new approach employing a single monomeric protein as host for the strongly fluorescent rhodamine dye. The selected protein, belonging to the intracellular lipid binding protein family, fully encapsulates one rhodamine molecule inside its cavity forming a host-guest complex stabilized by H and π-hydrogen bonds, a salt bridge, and favorable hydrophobic contacts, as revealed by the NMR derived structural model. The protein-dye solutions are easily processable and form homogeneous thin films exhibiting excellent photophysical and morphological properties, as derived from photoluminescence and AFM data. The obtained results represent the proof of concept of the viability of this bio host-guest system for the development of bioinspired optoelectronic devices.
Graaf, Matthew D; Marquez, Bernadette V; Yeh, Nai-Hua; Lapi, Suzanne E; Moeller, Kevin D
2016-10-21
Cu(I)-catalyzed "click" reactions cannot be performed on a borate ester derived polymer coating on a microelectrode array because the Cu(II) precursor for the catalyst triggers background reactions between both acetylene and azide groups with the polymer surface. Fortunately, the Cu(II)-background reaction can itself be used to site-selectively add the acetylene and azide nucleophiles to the surface of the array. In this way, molecules previously functionalized for use in "click" reactions can be added directly to the array. In a similar fashion, activated esters can be added site-selectively to a borate ester coated array. The new chemistry can be used to explore new biological interactions on the arrays. Specifically, the binding of a v107 derived peptide with both human and murine VEGF was probed using a functionalized microelectrode array.
Bog, Uwe; Laue, Thomas; Grossmann, Tobias; Beck, Torsten; Wienhold, Tobias; Richter, Benjamin; Hirtz, Michael; Fuchs, Harald; Kalt, Heinz; Mappes, Timo
2013-07-21
We report on a novel approach to realize on-chip microlasers, by applying highly localized and material-saving surface functionalization of passive photonic whispering gallery mode microresonators. We apply dip-pen nanolithography on a true three-dimensional structure. We coat solely the light-guiding circumference of pre-fabricated poly(methyl methacrylate) resonators with a multifunctional molecular ink. The functionalization is performed in one single fabrication step and simultaneously provides optical gain as well as molecular binding selectivity. This allows for a direct and flexible realization of on-chip microlasers, which can be utilized as biosensors in optofluidic lab-on-a-chip applications. In a proof-of-concept we show how this highly localized molecule deposition suffices for low-threshold lasing in air and water, and demonstrate the capability of the ink-lasers as biosensors in a biotin-streptavidin binding experiment.
Rapid identification of genes controlling virulence and immunity in malaria parasites
Xangsayarath, Phonepadith; Tang, Jianxia; Yahata, Kazuhide; Zoungrana, Augustin; Mitaka, Hayato; Acharjee, Arita; Datta, Partha P.; Hunt, Paul; Carter, Richard; Kaneko, Osamu; Mustonen, Ville; Pain, Arnab
2017-01-01
Identifying the genetic determinants of phenotypes that impact disease severity is of fundamental importance for the design of new interventions against malaria. Here we present a rapid genome-wide approach capable of identifying multiple genetic drivers of medically relevant phenotypes within malaria parasites via a single experiment at single gene or allele resolution. In a proof of principle study, we found that a previously undescribed single nucleotide polymorphism in the binding domain of the erythrocyte binding like protein (EBL) conferred a dramatic change in red blood cell invasion in mutant rodent malaria parasites Plasmodium yoelii. In the same experiment, we implicated merozoite surface protein 1 (MSP1) and other polymorphic proteins, as the major targets of strain-specific immunity. Using allelic replacement, we provide functional validation of the substitution in the EBL gene controlling the growth rate in the blood stages of the parasites. PMID:28704525
Click Chemistry Mediated Functionalization of Vertical Nanowires for Biological Applications.
Vutti, Surendra; Schoffelen, Sanne; Bolinsson, Jessica; Buch-Månson, Nina; Bovet, Nicolas; Nygård, Jesper; Martinez, Karen L; Meldal, Morten
2016-01-11
Semiconductor nanowires (NWs) are gaining significant importance in various biological applications, such as biosensing and drug delivery. Efficient and controlled immobilization of biomolecules on the NW surface is crucial for many of these applications. Here, we present for the first time the use of the Cu(I) -catalyzed alkyne-azide cycloaddition and its strain-promoted variant for the covalent functionalization of vertical NWs with peptides and proteins. The potential of the approach was demonstrated in two complementary applications of measuring enzyme activity and protein binding, which is of general interest for biological studies. The attachment of a peptide substrate provided NW arrays for the detection of protease activity. In addition, green fluorescent protein was immobilized in a site-specific manner and recognized by antibody binding to demonstrate the proof-of-concept for the use of covalently modified NWs for diagnostic purposes using minute amounts of material. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Turning mirror-image oligonucleotides into drugs: the evolution of Spiegelmer(®) therapeutics.
Vater, Axel; Klussmann, Sven
2015-01-01
Spiegelmers are synthetic target-binding oligonucleotides built from non-natural l-nucleotides. Like aptamers, Spiegelmers fold into distinct shapes that bind the targets with high affinity and selectivity. Furthermore, the mirror-image configuration confers plasma stability and immunological passivity. Various Spiegelmers against pharmacologically attractive targets were shown to be efficacious in animal models. Three Spiegelmer candidates: emapticap pegol (NOX-E36; anti-CCL2), olaptesed pegol (NOX-A12; anti-CXCL12) and lexaptepid pegol (NOX-H94; anti-hepcidin), underwent regulatory safety studies, demonstrated good safety profiles in healthy volunteers and were taken into Phase IIa studies in patients. Proof-of-concept for emapticap pegol has recently been demonstrated in diabetic nephropathy patients. Furthermore, promising interim Phase IIa data of olaptesed pegol and lexapteptid pegol also suggest efficacy in the respective patient populations. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.
Brindle, Nicholas P J; Sale, Julian E; Arakawa, Hiroshi; Buerstedde, Jean-Marie; Nuamchit, Teonchit; Sharma, Shikha; Steele, Kathryn H
2013-11-15
Tie2 is a receptor tyrosine kinase that is essential for the development and maintenance of blood vessels through binding the soluble ligands angiopoietin 1 (Ang1) and 2 (Ang2). Ang1 is constitutively produced by perivascular cells and is protective of the adult vasculature. Ang2 plays an important role in blood vessel formation and is normally expressed during development. However, its re-expression in disease states, including cancer and sepsis, results in destabilization of blood vessels contributing to the pathology of these conditions. Ang2 is thus an attractive therapeutic target. Here we report the directed evolution of a ligand trap for Ang2 by harnessing the B cell somatic hypermutation machinery and coupling this to selectable cell surface display of a Tie2 ectodomain. Directed evolution produced an unexpected combination of mutations resulting in loss of Ang1 binding but maintenance of Ang2 binding. A soluble form of the evolved ectodomain binds Ang2 but not Ang1. Furthermore, the soluble evolved ectodomain blocks Ang2 effects on endothelial cells without interfering with Ang1 activity. Our study has created a novel Ang2 ligand trap and provided proof of concept for combining surface display and exogenous gene diversification in B cells for evolution of a non-immunoglobulin target.
Mukhtar, Eiman; Adhami, Vaqar Mustafa; Sechi, Mario; Mukhtar, Hasan
2015-10-28
Microtubule targeting based therapies have revolutionized cancer treatment; however, resistance and side effects remain a major limitation. Therefore, novel strategies that can overcome these limitations are urgently needed. We made a novel discovery that fisetin, a hydroxyflavone, is a microtubule stabilizing agent. Fisetin binds to tubulin and stabilizes microtubules with binding characteristics far superior than paclitaxel. Surface plasmon resonance and computational docking studies suggested that fisetin binds to β-tubulin with superior affinity compared to paclitaxel. Fisetin treatment of human prostate cancer cells resulted in robust up-regulation of microtubule associated proteins (MAP)-2 and -4. In addition, fisetin treated cells were enriched in α-tubulin acetylation, an indication of stabilization of microtubules. Fisetin significantly inhibited PCa cell proliferation, migration, and invasion. Nudc, a protein associated with microtubule motor dynein/dynactin complex that regulates microtubule dynamics, was inhibited with fisetin treatment. Further, fisetin treatment of a P-glycoprotein overexpressing multidrug-resistant cancer cell line NCI/ADR-RES inhibited the viability and colony formation. Our results offer in vitro proof-of-concept for fisetin as a microtubule targeting agent. We suggest that fisetin could be developed as an adjuvant for treatment of prostate and other cancer types. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Chiaraviglio, Lucius
2014-01-01
Abstract Interpretation of high throughput screening (HTS) data in cell-based assays may be confounded by cytotoxic properties of screening compounds. Therefore, assessing cell toxicity in real time during the HTS process itself would be highly advantageous. Here, we investigate the potential of putatively impermeant, fluorescent, DNA-binding dyes to give cell toxicity readout during HTS. Amongst 19 DNA-binding dyes examined, three classes were identified that were (1) permeant, (2) cytotoxic, or (3) neither permeant nor cytotoxic during 3-day incubation with a macrophage cell line. In the last class, four dyes (SYTOX Green, CellTox Green, GelGreen, and EvaGreen) gave highly robust cytotoxicity data in 384-well screening plates. As proof of principle, successful combination with a luminescence-based assay in HTS format was demonstrated. Here, both intracellular growth of Legionella pneumophila (luminescence) and host cell viability (SYTOX Green exclusion) were assayed in the same screening well. Incorporation of membrane-impermeant, DNA-binding, fluorescent dyes in HTS assays should prove useful by allowing evaluation of cytotoxicity in real time, eliminating reagent addition steps and effort associated with endpoint cell viability analysis, and reducing the need for follow-up cytotoxicity screening. PMID:24831788
Recombinant phage probes for Listeria monocytogenes
NASA Astrophysics Data System (ADS)
Carnazza, S.; Gioffrè, G.; Felici, F.; Guglielmino, S.
2007-10-01
Monitoring of food and environmental samples for biological threats, such as Listeria monocytogenes, requires probes that specifically bind biological agents and ensure their immediate and efficient detection. There is a need for robust and inexpensive affinity probes as an alternative to antibodies. These probes may be recruited from random peptide libraries displayed on filamentous phage. In this study, we selected from two phage peptide libraries phage clones displaying peptides capable of specific and strong binding to the L. monocytogenes cell surface. The ability of isolated phage clones to interact specifically with L. monocytogenes was demonstrated using enzyme-linked immunosorbent assay (ELISA) and confirmed by co-precipitation assay. We also assessed the sensitivity of phage-bacteria binding by PCR on phage-captured Listeria cells, which could be detected at a concentration of 104 cells ml-1. In addition, as proof-of-concept, we tested the possibility of immobilizing the affinity-selected phages to a putative biosensor surface. The quality of phage deposition was monitored by ELISA and fluorescent microscopy. Phage-bacterial binding was confirmed by high power optical phase contrast microscopy. Overall, the results of this work validate the concept of affinity-selected recombinant filamentous phages as probes for detecting and monitoring bacterial agents under any conditions that warrant their recognition, including in food products.
Qiu, Li Yan; Koenderink, Jan B; Swarts, Herman G P; Willems, Peter H G M; De Pont, Jan Joep H H M
2003-11-21
Ouabain is a glycoside that binds to and inhibits the action of Na+,K+-ATPase. Little is known, however, about the specific requirements of the protein surface for glycoside binding. Using chimeras of gastric H+,K+-ATPase and Na+,K+-ATPase, we demonstrated previously that the combined presence of transmembrane hairpins M3-M4 and M5-M6 of Na+,K+-ATPase in a backbone of H+,K+-ATPase (HN34/56) is both required and sufficient for high affinity ouabain binding. Since replacement of transmembrane hairpin M3-M4 by the N terminus up to transmembrane segment 3 (HNN3/56) resulted in a low affinity ouabain binding, hairpin M5-M6 seems to be essential for ouabain binding. To assess which residues of M5-M6 are required for ouabain action, we divided this transmembrane hairpin in seven parts and individually replaced these parts by the corresponding sequences of H+,K+-ATPase in chimera HN34/56. Three of these chimeras failed to bind ouabain following expression in Xenopus laevis oocytes. Altogether, these three chimeras contained 7 amino acids that were specific for Na+,K+-ATPase. Individual replacement of these 7 amino acids by the corresponding amino acids in H+,K+-ATPase revealed a dramatic loss of ouabain binding for F783Y, T797C, and D804E. As a proof of principle, the Na+,K+-ATPase equivalents of these 3 amino acids were introduced in different combinations in chimera HN34. The presence of all 3 amino acids appeared to be required for ouabain action. Docking of ouabain onto a three-dimensional-model of Na+,K+-ATPase suggests that Asp804, in contrast to Phe783 and Thr797, does not actually form part of the ouabain-binding pocket. Most likely, the presence of this amino acid is required for adopting of the proper conformation for ouabain binding.
Selection of the simplest RNA that binds isoleucine
LOZUPONE, CATHERINE; CHANGAYIL, SHANKAR; MAJERFELD, IRENE; YARUS, MICHAEL
2003-01-01
We have identified the simplest RNA binding site for isoleucine using selection-amplification (SELEX), by shrinking the size of the randomized region until affinity selection is extinguished. Such a protocol can be useful because selection does not necessarily make the simplest active motif most prominent, as is often assumed. We find an isoleucine binding site that behaves exactly as predicted for the site that requires fewest nucleotides. This UAUU motif (16 highly conserved positions; 27 total), is also the most abundant site in successful selections on short random tracts. The UAUU site, now isolated independently at least 63 times, is a small asymmetric internal loop. Conserved loop sequences include isoleucine codon and anticodon triplets, whose nucleotides are required for amino acid binding. This reproducible association between isoleucine and its coding sequences supports the idea that the genetic code is, at least in part, a stereochemical residue of the most easily isolated RNA–amino acid binding structures. PMID:14561881
A Spectrophotometric Assay Optimizing Conditions for Pepsin Activity.
ERIC Educational Resources Information Center
Harding, Ethelynda E.; Kimsey, R. Scott
1998-01-01
Describes a laboratory protocol optimizing the conditions for the assay of pepsin activity using the Coomasie Blue dye binding assay of protein concentration. The dye bonds through strong, noncovalent interactions to basic and aromatic amino acid residues. (DDR)
Letessier, Wilfried; Demaret, Julie; Gossez, Morgane; Allam, Camille; Venet, Fabienne; Rimmelé, Thomas; Monneret, Guillaume
2018-04-01
Functional testing protocols are thought to be the gold standard for the exploration of the immune system. However, in terms of routine analysis, they present numerous drawbacks and consequently their use is mainly limited to research applications. In the clinical context of septic shock, characterized by marked lymphocyte alterations, a new approach for lymphocyte intracellular cytokine measurement in whole blood upon was evaluated in a proof-of-concept study. Following lymphocyte activation, simultaneous intracellular labeling of Interferon-γ (IFN-γ), Tumor Necrosis Factor-α (TNF-α), and Interleukin-2 (IL-2) was performed in CD4 + and CD8 + T cells (identified by surface marking). The analysis was carried out by flow cytometry (6 colors). Results obtained in septic patients (n=22) were compared to those of healthy volunteers (n=8). Independently of lymphopenia, there were significant differences between groups. In particular there was significant decrease in the production of IL-2 and TNF-α in septic patients, while the production of IFN-γ was not significantly altered. Polyfunctional results showed that patients presented with increased percentages of triple negative lymphocytes. In contrast, volunteers had higher proportions of triple positive cells. The approach could be performed in a robust and consistent way, taking 4.5h to complete. Moreover, clear differences could be observed between clinical groups with this modified method. These characteristics illustrate the potential of this novel whole blood protocol for clinical applications. However, further research is required to determine the applicability compared to alternative test and to evaluate clinical performances in larger cohorts of patients. Copyright © 2017 Elsevier Ltd. All rights reserved.
Almeida, Afonso R; Correia, Daniel V; Fernandes-Platzgummer, Ana; da Silva, Cláudia L; da Silva, Maria Gomes; Anjos, Diogo Remechido; Silva-Santos, Bruno
2016-12-01
The Vδ1 + subset of γδ T lymphocytes is a promising candidate for cancer immunotherapy, but the lack of suitable expansion/differentiation methods has precluded therapeutic application. We set out to develop and test (preclinically) a Vδ1 + T-cell-based protocol that is good manufacturing practice compatible and devoid of feeder cells for prompt clinical translation. We tested multiple combinations of clinical-grade agonist antibodies and cytokines for their capacity to expand and differentiate (more than 2-3 weeks) Vδ1 + T cells from the peripheral blood of healthy donors and patients with chronic lymphocytic leukemia (CLL). We characterized the phenotype and functional potential of the final cellular product, termed Delta One T (DOT) cells, in vitro and in vivo (xenograft models of CLL). We describe a very robust two-step protocol for the selective expansion (up to 2,000-fold in large clinical-grade cell culture bags) and differentiation of cytotoxic Vδ1 + (DOT) cells. These expressed the natural cytotoxicity receptors, NKp30 and NKp44, which synergized with the T-cell receptor to mediate leukemia cell targeting in vitro When transferred in vivo, DOT cells infiltrated tumors and peripheral organs, and persisted until the end of the analysis without showing signs of loss of function; indeed, DOT cells proliferated and produced abundant IFNγ and TNFα, but importantly no IL17, in vivo Critically, DOT cells were capable of inhibiting tumor growth and preventing dissemination in xenograft models of CLL. We provide a clinical-grade method and the preclinical proof of principle for application of a new cellular product, DOT cells, in adoptive immunotherapy of CLL. Clin Cancer Res; 22(23); 5795-804. ©2016 AACR. ©2016 American Association for Cancer Research.
Testing warning messages on smokers' cigarette packages: a standardised protocol.
Brewer, Noel T; Hall, Marissa G; Lee, Joseph G L; Peebles, Kathryn; Noar, Seth M; Ribisl, Kurt M
2016-03-01
Lab experiments on cigarette warnings typically use a brief one-time exposure that is not paired with the cigarette packs smokers use every day, leaving open the question of how repeated warning exposure over several weeks may affect smokers. This proof of principle study sought to develop a new protocol for testing cigarette warnings that better reflects real-world exposure by presenting them on cigarette smokers' own packs. We tested a cigarette pack labelling protocol with 76 US smokers ages 18 and older. We applied graphic warnings to the front and back of smokers' cigarette packs. Most smokers reported that at least 75% of the packs of cigarettes they smoked during the study had our warnings. Nearly all said they would participate in the study again. Using cigarette packs with the study warnings increased quit intentions (p<0.05). Our findings suggest a feasible pack labelling protocol with six steps: (1) schedule appointments at brief intervals; (2) determine typical cigarette consumption; (3) ask smokers to bring a supply of cigarette packs to study appointments; (4) apply labels to smokers' cigarette packs; (5) provide participation incentives at the end of appointments; and (6) refer smokers to cessation services at end of the study. When used in randomised controlled trials in settings with real-world message exposure over time, this protocol may help identify the true impact of warnings and thus better inform tobacco product labelling policy. NCT02247908. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
DiFranza, J.; Savageau, J.; Bouchard, J.
2001-01-01
OBJECTIVE—To determine if the standard compliance check protocol is a valid measure of the experience of underage smokers when purchasing tobacco in unfamiliar communities. SETTING—160 tobacco outlets in eight Massachusetts communities where underage tobacco sales laws are vigorously enforced. PROCEDURE—Completed purchase rates were compared between underage smokers who behaved normally and inexperienced non-smoking youths who were not allowed to lie or present proof of age (ID). RESULTS—The "smoker protocol" increased the likelihood of a sale nearly sixfold over that for the non-smokers (odds ratio (OR) 5.7, 95% confidence interval (CI) 1.5 to 22). When the youths presented an ID with an underage birth date, the odds of a completed sale increased dramatically (OR 27, 95% CI 3.4 to 212). Clerks judged to be under 21 years of age were seven times more likely to make an illegal sale (OR 7.6, 95% CI 2.4 to 24.0). CONCLUSIONS—Commonly used compliance check protocols are too artificial to reflect accurately the experience of underage smokers. The validity of compliance checks might be improved by having youths present ID, and by employing either tobacco users, or non-tobacco users who are sufficiently experienced to mimic the self confidence exhibited by tobacco users in this situation. Consideration should be given to prohibiting the sale of tobacco by individuals under 21 years of age. Keywords: compliance check protocol; underage smokers PMID:11544386
Targeting the UPR to Circumvent Endocrine Resistance in Breast Cancer
2015-10-01
were submitted for the screen. Kinase assay protocol (DiscoverX): For most assays, kinase-tagged T7 phage strains were grown in parallel in 24-well...blocks in an E. coli host derived from the BL21 strain. E. coli were grown to log-phase and infected with T7 phage from a frozen stock (multiplicity of...unbound ligand and to reduce non-specific phage binding. Binding reactions were assembled by combining kinases, liganded affinity beads, and test
Binding Assays Using Recombinant SH2 Domains: Far-Western, Pull-Down, and Fluorescence Polarization.
Machida, Kazuya; Liu, Bernard
2017-01-01
Recognition of phosphotyrosine-containing sequences by SH2 domains confers specificity in tyrosine kinase pathways. By assessing interactions between isolated SH2 domains and their binding proteins, it is possible to gain insight into otherwise inaccessible complex cellular systems. Far-Western, pull-down, and fluorescence polarization (FP) have been frequently used for characterization of phosphotyrosine signaling. Here, we outline standard protocols for these established assays using recombinant SH2 domain, emphasizing the importance of appropriate sample preparation and assay controls.
Brito, Maíra M; Lúcio, Cristina F; Angrimani, Daniel S R; Losano, João Diego A; Dalmazzo, Andressa; Nichi, Marcílio; Vannucchi, Camila I
2017-01-02
In addition to the existence of several cryopreservation protocols, no systematic research has been carried out in order to confirm the suitable protocol for canine sperm. This study aims to assess the effect of adding 5% glycerol during cryopreservation at 37°C (one-step) and 5°C (two-steps), in addition of testing two thawing protocols (37°C for 30 seconds, and 70°C for 8 seconds). We used 12 sperm samples divided into four experimental groups: Single-Step - Slow Thawing Group; Two-Step - Slow Thawing Group; Single-Step - Fast Thawing Group; and Two-Step - Fast Thawing Group. Frozen-thawed samples were submitted to automated analysis of sperm motility, evaluation of plasmatic membrane integrity, acrosomal integrity, mitochondrial activity, sperm morphology, sperm susceptibility to oxidative stress, and sperm binding assay to perivitellinic membrane of chicken egg yolk. Considering the comparison between freezing protocols, no statistical differences were verified for any of the response variables. When comparison between thawing protocols was performed, slow thawing protocol presented higher sperm count bound to perivitelline membrane of chicken egg yolk, compared to fast thawing protocol. Regardless of the freezing process, the slow thawing protocol can be recommended for the large scale cryopreservation of canine semen, since it shows a consistent better functional result.
Mizutani, Yuka; Kuga, Daisuke; Iida, Machiko; Ushida, Kaori; Takagi, Tsuyoshi; Tokita, Yoshihito; Takahashi, Masahide; Asai, Masato
2018-01-01
The actin binding protein girdin is a cytosolic protein that is required for actin remodeling to trigger cell migration in various tissues. Girdin is phosphorylated by both receptor and non-receptor tyrosine kinases at tyrosine 1798. Omori et al. developed site- and phosphorylation status-specific antibodies against human girdin at tyrosine-1798 (pY1798), which specifically bind to phosphorylated tyrosine-1798, but not to unphosphorylated tyrosine-1798. pY1798 antibodies have been used to specifically label tuft cells (TCs) that are present in mammalian gastrointestinal tissues, but the function of these cells is unclear. This protocol allows the robust visualization of TCs in the jejunum using pY1798 antibodies and immunofluorescence. To ensure successful and simple TC visualization, this protocol includes two histological techniques: production of free-floating cryosections from gelatin-filled jejunum tissue, and low-temperature antigen retrieval at 50 °C for 3 h. Filling the jejunum with gelatin maintains the shape of free-floating sections throughout the staining procedure, whereas low-temperature antigen retrieval ensures robust signals from TCs. Successful use of this protocol results in pY1798 staining of TCs distributed from villus tip to crypt. Stained TCs have a spool-shaped soma and fluorescent signals condense at the lumenal tip, which corresponds to the protruding 'tuft.' Phalloidin staining colocalized with pY1798-positive TCs at the thickened brush border, and corresponds to a rootlet mass extending from the TC tuft. This protocol could be used to examine TCs in human biopsy samples collected with gastrointestinal endoscopes. Furthermore, TCs were recently reported to accumulate following parasite infection in mice, suggesting that this protocol could have applications for diagnosis of parasite infections in the human gut. PMID:29630055
Mizutani, Yuka; Kuga, Daisuke; Iida, Machiko; Ushida, Kaori; Takagi, Tsuyoshi; Tokita, Yoshihito; Takahashi, Masahide; Asai, Masato
2018-03-21
The actin binding protein girdin is a cytosolic protein that is required for actin remodeling to trigger cell migration in various tissues. Girdin is phosphorylated by both receptor and non-receptor tyrosine kinases at tyrosine 1798. Omori et al. developed site- and phosphorylation status-specific antibodies against human girdin at tyrosine-1798 (pY1798), which specifically bind to phosphorylated tyrosine-1798, but not to unphosphorylated tyrosine-1798. pY1798 antibodies have been used to specifically label tuft cells (TCs) that are present in mammalian gastrointestinal tissues, but the function of these cells is unclear. This protocol allows the robust visualization of TCs in the jejunum using pY1798 antibodies and immunofluorescence. To ensure successful and simple TC visualization, this protocol includes two histological techniques: production of free-floating cryosections from gelatin-filled jejunum tissue, and low-temperature antigen retrieval at 50 °C for 3 h. Filling the jejunum with gelatin maintains the shape of free-floating sections throughout the staining procedure, whereas low-temperature antigen retrieval ensures robust signals from TCs. Successful use of this protocol results in pY1798 staining of TCs distributed from villus tip to crypt. Stained TCs have a spool-shaped soma and fluorescent signals condense at the lumenal tip, which corresponds to the protruding 'tuft.' Phalloidin staining colocalized with pY1798-positive TCs at the thickened brush border, and corresponds to a rootlet mass extending from the TC tuft. This protocol could be used to examine TCs in human biopsy samples collected with gastrointestinal endoscopes. Furthermore, TCs were recently reported to accumulate following parasite infection in mice, suggesting that this protocol could have applications for diagnosis of parasite infections in the human gut.
Optimal control of complex atomic quantum systems
van Frank, S.; Bonneau, M.; Schmiedmayer, J.; Hild, S.; Gross, C.; Cheneau, M.; Bloch, I.; Pichler, T.; Negretti, A.; Calarco, T.; Montangero, S.
2016-01-01
Quantum technologies will ultimately require manipulating many-body quantum systems with high precision. Cold atom experiments represent a stepping stone in that direction: a high degree of control has been achieved on systems of increasing complexity. However, this control is still sub-optimal. In many scenarios, achieving a fast transformation is crucial to fight against decoherence and imperfection effects. Optimal control theory is believed to be the ideal candidate to bridge the gap between early stage proof-of-principle demonstrations and experimental protocols suitable for practical applications. Indeed, it can engineer protocols at the quantum speed limit – the fastest achievable timescale of the transformation. Here, we demonstrate such potential by computing theoretically and verifying experimentally the optimal transformations in two very different interacting systems: the coherent manipulation of motional states of an atomic Bose-Einstein condensate and the crossing of a quantum phase transition in small systems of cold atoms in optical lattices. We also show that such processes are robust with respect to perturbations, including temperature and atom number fluctuations. PMID:27725688
Optimal control of complex atomic quantum systems.
van Frank, S; Bonneau, M; Schmiedmayer, J; Hild, S; Gross, C; Cheneau, M; Bloch, I; Pichler, T; Negretti, A; Calarco, T; Montangero, S
2016-10-11
Quantum technologies will ultimately require manipulating many-body quantum systems with high precision. Cold atom experiments represent a stepping stone in that direction: a high degree of control has been achieved on systems of increasing complexity. However, this control is still sub-optimal. In many scenarios, achieving a fast transformation is crucial to fight against decoherence and imperfection effects. Optimal control theory is believed to be the ideal candidate to bridge the gap between early stage proof-of-principle demonstrations and experimental protocols suitable for practical applications. Indeed, it can engineer protocols at the quantum speed limit - the fastest achievable timescale of the transformation. Here, we demonstrate such potential by computing theoretically and verifying experimentally the optimal transformations in two very different interacting systems: the coherent manipulation of motional states of an atomic Bose-Einstein condensate and the crossing of a quantum phase transition in small systems of cold atoms in optical lattices. We also show that such processes are robust with respect to perturbations, including temperature and atom number fluctuations.
Iuso, Arcangela; Repp, Birgit; Biagosch, Caroline; Terrile, Caterina; Prokisch, Holger
2017-01-01
Working with isolated mitochondria is the gold standard approach to investigate the function of the electron transport chain in tissues, free from the influence of other cellular factors. In this chapter, we outline a detailed protocol to measure the rate of oxygen consumption (OCR) with the high-throughput analyzer Seahorse XF96. More importantly, this protocol wants to provide practical tips for handling many different samples at once, and take a real advantage of using a high-throughput system. As a proof of concept, we have isolated mitochondria from brain, heart, liver, muscle, kidney, and lung of a wild-type mouse, and measured basal respiration (State II), ADP-stimulated respiration (State III), non-ADP-stimulated respiration (State IV o ), and FCCP-stimulated respiration (State III u ) using respiratory substrates specific to the respiratory chain complex I (RCCI) and complex II (RCCII). Mitochondrial purification and Seahorse runs were performed in less than eight working hours.
Unconditional security of entanglement-based continuous-variable quantum secret sharing
NASA Astrophysics Data System (ADS)
Kogias, Ioannis; Xiang, Yu; He, Qiongyi; Adesso, Gerardo
2017-01-01
The need for secrecy and security is essential in communication. Secret sharing is a conventional protocol to distribute a secret message to a group of parties, who cannot access it individually but need to cooperate in order to decode it. While several variants of this protocol have been investigated, including realizations using quantum systems, the security of quantum secret sharing schemes still remains unproven almost two decades after their original conception. Here we establish an unconditional security proof for entanglement-based continuous-variable quantum secret sharing schemes, in the limit of asymptotic keys and for an arbitrary number of players. We tackle the problem by resorting to the recently developed one-sided device-independent approach to quantum key distribution. We demonstrate theoretically the feasibility of our scheme, which can be implemented by Gaussian states and homodyne measurements, with no need for ideal single-photon sources or quantum memories. Our results contribute to validating quantum secret sharing as a viable primitive for quantum technologies.
In Situ Quantification of [Re(CO)3]+ by Fluorescence Spectroscopy in Simulated Hanford Tank Waste.
Branch, Shirmir D; French, Amanda D; Lines, Amanda M; Rapko, Brian M; Heineman, William R; Bryan, Samuel A
2018-02-06
A pretreatment protocol is presented that allows for the quantitative conversion and subsequent in situ spectroscopic analysis of [Re(CO) 3 ] + species in simulated Hanford tank waste. In this test case, the nonradioactive metal rhenium is substituted for technetium (Tc-99), a weak beta emitter, to demonstrate proof of concept for a method to measure a nonpertechnetate form of technetium in Hanford tank waste. The protocol encompasses adding a simulated waste sample containing the nonemissive [Re(CO) 3 ] + species to a developer solution that enables the rapid, quantitative conversion of the nonemissive species to a luminescent species which can then be detected spectroscopically. The [Re(CO) 3 ] + species concentration in an alkaline, simulated Hanford tank waste supernatant can be quantified by the standard addition method. In a test case, the [Re(CO) 3 ] + species was measured to be at a concentration of 38.9 μM, which was a difference of 2.01% from the actual concentration of 39.7 μM.
2015-01-01
Chemoenzymatic dynamic kinetic resolution (DKR) constitutes a convenient and efficient method to access enantiomerically pure alcohol and amine derivatives. This Perspective highlights the work carried out within this field during the past two decades and pinpoints important avenues for future research. First, the Perspective will summarize the more developed area of alcohol DKR, by delineating the way from the earliest proof-of-concept protocols to the current state-of-the-art systems that allows for the highly efficient and selective preparation of a wide range of enantiomerically pure alcohol derivatives. Thereafter, the Perspective will focus on the more challenging DKR of amines, by presenting the currently available homogeneous and heterogeneous methods and their respective limitations. In these two parts, significant attention will be dedicated to the design of efficient racemization methods as an important means of developing milder DKR protocols. In the final part of the Perspective, a brief overview of the research that has been devoted toward improving enzymes as biocatalysts is presented. PMID:25730714
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-11
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.
Lieberman, Ori J; Orr, Mona W; Wang, Yan; Lee, Vincent T
2014-01-17
The rise of bacterial resistance to traditional antibiotics has motivated recent efforts to identify new drug candidates that target virulence factors or their regulatory pathways. One such antivirulence target is the cyclic-di-GMP (cdiGMP) signaling pathway, which regulates biofilm formation, motility, and pathogenesis. Pseudomonas aeruginosa is an important opportunistic pathogen that utilizes cdiGMP-regulated polysaccharides, including alginate and pellicle polysaccharide (PEL), to mediate virulence and antibiotic resistance. CdiGMP activates PEL and alginate biosynthesis by binding to specific receptors including PelD and Alg44. Mutations that abrogate cdiGMP binding to these receptors prevent polysaccharide production. Identification of small molecules that can inhibit cdiGMP binding to the allosteric sites on these proteins could mimic binding defective mutants and potentially reduce biofilm formation or alginate secretion. Here, we report the development of a rapid and quantitative high-throughput screen for inhibitors of protein-cdiGMP interactions based on the differential radial capillary action of ligand assay (DRaCALA). Using this approach, we identified ebselen as an inhibitor of cdiGMP binding to receptors containing an RxxD domain including PelD and diguanylate cyclases (DGC). Ebselen reduces diguanylate cyclase activity by covalently modifying cysteine residues. Ebselen oxide, the selenone analogue of ebselen, also inhibits cdiGMP binding through the same covalent mechanism. Ebselen and ebselen oxide inhibit cdiGMP regulation of biofilm formation and flagella-mediated motility in P. aeruginosa through inhibition of diguanylate cyclases. The identification of ebselen provides a proof-of-principle that a DRaCALA high-throughput screening approach can be used to identify bioactive agents that reverse regulation of cdiGMP signaling by targeting cdiGMP-binding domains.
Designing Endocrine Disruption Out of the Next Generation of Chemicals
Schug, T.T; Abagyan, R.; Blumberg, B.; Collins, T.J.; Crews, D.; DeFur, P.L.; Dickerson, S.M.; Edwards, T.M.; Gore, A.C.; Guillette, L.J.; Hayes, T.; Heindel, J.J.; Moores, A.; Patisaul, H.B.; Tal, T.L.; Thayer, K.A.; Vandenberg, L.N.; Warner, J.; Watson, C.S.; Saal, F.S. vom; Zoeller, R.T.; O’Brien, K.P.; Myers, J.P.
2013-01-01
A central goal of green chemistry is to avoid hazard in the design of new chemicals. This objective is best achieved when information about a chemical’s potential hazardous effects is obtained as early in the design process as feasible. Endocrine disruption is a type of hazard that to date has been inadequately addressed by both industrial and regulatory science. To aid chemists in avoiding this hazard, we propose an endocrine disruption testing protocol for use by chemists in the design of new chemicals. The Tiered Protocol for Endocrine Disruption (TiPED) has been created under the oversight of a scientific advisory committee composed of leading representatives from both green chemistry and the environmental health sciences. TiPED is conceived as a tool for new chemical design, thus it starts with a chemist theoretically at “the drawing board.” It consists of five testing tiers ranging from broad in silico evaluation up through specific cell- and whole organism-based assays. To be effective at detecting endocrine disruption, a testing protocol must be able to measure potential hormone-like or hormone-inhibiting effects of chemicals, as well as the many possible interactions and signaling sequellae such chemicals may have with cell-based receptors. Accordingly, we have designed this protocol to broadly interrogate the endocrine system. The proposed protocol will not detect all possible mechanisms of endocrine disruption, because scientific understanding of these phenomena is advancing rapidly. To ensure that the protocol remains current, we have established a plan for incorporating new assays into the protocol as the science advances. In this paper we present the principles that should guide the science of testing new chemicals for endocrine disruption, as well as principles by which to evaluate individual assays for applicability, and laboratories for reliability. In a ‘proof-of-principle’ test, we ran 6 endocrine disrupting chemicals (EDCs) that act via different endocrinological mechanisms through the protocol using published literature. Each was identified as endocrine active by one or more tiers. We believe that this voluntary testing protocol will be a dynamic tool to facilitate efficient and early identification of potentially problematic chemicals, while ultimately reducing the risks to public health. PMID:25110461
Designing Endocrine Disruption Out of the Next Generation of Chemicals.
Schug, T T; Abagyan, R; Blumberg, B; Collins, T J; Crews, D; DeFur, P L; Dickerson, S M; Edwards, T M; Gore, A C; Guillette, L J; Hayes, T; Heindel, J J; Moores, A; Patisaul, H B; Tal, T L; Thayer, K A; Vandenberg, L N; Warner, J; Watson, C S; Saal, F S Vom; Zoeller, R T; O'Brien, K P; Myers, J P
2013-01-01
A central goal of green chemistry is to avoid hazard in the design of new chemicals. This objective is best achieved when information about a chemical's potential hazardous effects is obtained as early in the design process as feasible. Endocrine disruption is a type of hazard that to date has been inadequately addressed by both industrial and regulatory science. To aid chemists in avoiding this hazard, we propose an endocrine disruption testing protocol for use by chemists in the design of new chemicals. The Tiered Protocol for Endocrine Disruption (TiPED) has been created under the oversight of a scientific advisory committee composed of leading representatives from both green chemistry and the environmental health sciences. TiPED is conceived as a tool for new chemical design, thus it starts with a chemist theoretically at "the drawing board." It consists of five testing tiers ranging from broad in silico evaluation up through specific cell- and whole organism-based assays. To be effective at detecting endocrine disruption, a testing protocol must be able to measure potential hormone-like or hormone-inhibiting effects of chemicals, as well as the many possible interactions and signaling sequellae such chemicals may have with cell-based receptors. Accordingly, we have designed this protocol to broadly interrogate the endocrine system. The proposed protocol will not detect all possible mechanisms of endocrine disruption, because scientific understanding of these phenomena is advancing rapidly. To ensure that the protocol remains current, we have established a plan for incorporating new assays into the protocol as the science advances. In this paper we present the principles that should guide the science of testing new chemicals for endocrine disruption, as well as principles by which to evaluate individual assays for applicability, and laboratories for reliability. In a 'proof-of-principle' test, we ran 6 endocrine disrupting chemicals (EDCs) that act via different endocrinological mechanisms through the protocol using published literature. Each was identified as endocrine active by one or more tiers. We believe that this voluntary testing protocol will be a dynamic tool to facilitate efficient and early identification of potentially problematic chemicals, while ultimately reducing the risks to public health.
In silico screening for inhibitors of p-glycoprotein that target the nucleotide binding domains.
Brewer, Frances K; Follit, Courtney A; Vogel, Pia D; Wise, John G
2014-12-01
Multidrug resistances and the failure of chemotherapies are often caused by the expression or overexpression of ATP-binding cassette transporter proteins such as the multidrug resistance protein, P-glycoprotein (P-gp). P-gp is expressed in the plasma membrane of many cell types and protects cells from accumulation of toxins. P-gp uses ATP hydrolysis to catalyze the transport of a broad range of mostly hydrophobic compounds across the plasma membrane and out of the cell. During cancer chemotherapy, the administration of therapeutics often selects for cells which overexpress P-gp, thereby creating populations of cancer cells resistant to a variety of chemically unrelated chemotherapeutics. The present study describes extremely high-throughput, massively parallel in silico ligand docking studies aimed at identifying reversible inhibitors of ATP hydrolysis that target the nucleotide-binding domains of P-gp. We used a structural model of human P-gp that we obtained from molecular dynamics experiments as the protein target for ligand docking. We employed a novel approach of subtractive docking experiments that identified ligands that bound predominantly to the nucleotide-binding domains but not the drug-binding domains of P-gp. Four compounds were found that inhibit ATP hydrolysis by P-gp. Using electron spin resonance spectroscopy, we showed that at least three of these compounds affected nucleotide binding to the transporter. These studies represent a successful proof of principle demonstrating the potential of targeted approaches for identifying specific inhibitors of P-gp. Copyright © 2014 by The American Society for Pharmacology and Experimental Therapeutics.
Funnel metadynamics as accurate binding free-energy method
Limongelli, Vittorio; Bonomi, Massimiliano; Parrinello, Michele
2013-01-01
A detailed description of the events ruling ligand/protein interaction and an accurate estimation of the drug affinity to its target is of great help in speeding drug discovery strategies. We have developed a metadynamics-based approach, named funnel metadynamics, that allows the ligand to enhance the sampling of the target binding sites and its solvated states. This method leads to an efficient characterization of the binding free-energy surface and an accurate calculation of the absolute protein–ligand binding free energy. We illustrate our protocol in two systems, benzamidine/trypsin and SC-558/cyclooxygenase 2. In both cases, the X-ray conformation has been found as the lowest free-energy pose, and the computed protein–ligand binding free energy in good agreement with experiments. Furthermore, funnel metadynamics unveils important information about the binding process, such as the presence of alternative binding modes and the role of waters. The results achieved at an affordable computational cost make funnel metadynamics a valuable method for drug discovery and for dealing with a variety of problems in chemistry, physics, and material science. PMID:23553839
Szabó, György; Túrós, György I; Kolok, Sándor; Vastag, Mónika; Sánta, Zsuzsanna; Dékány, Miklós; Lévay, György I; Greiner, István; Natsumi, Minami; Tatsuya, Watanabe; Keserű, György M
2018-03-14
Metabotropic glutamate receptor 2 (mGluR2) positive allosteric modulators (PAMs) have been implicated as potential pharmacotherapy for psychiatric conditions. Screening our corporate compound deck, we identified a benzotriazole fragment (4) that was rapidly optimized to a potent and metabolically stable early lead (16). The highly lipophilic character of 16, together with its limited solubility, permeability, and high protein binding, however, did not allow reaching of the proof of concept in vivo. Since further attempts on the optimization of druglike properties were unsuccessful, the original hit 4 has been revisited and was optimized following the principles of fragment based drug discovery (FBDD). Lacking structural information on the receptor-ligand complex, we implemented a group efficiency (GE) based strategy and identified a new fragment like lead (60) with more balanced profile. Significant improvement achieved on the druglike properties nominated the compound for in vivo proof of concept studies that revealed the chemotype being a promising PAM lead targeting mGluR2 receptors.
Specification and verification of gate-level VHDL models of synchronous and asynchronous circuits
NASA Technical Reports Server (NTRS)
Russinoff, David M.
1995-01-01
We present a mathematical definition of hardware description language (HDL) that admits a semantics-preserving translation to a subset of VHDL. Our HDL includes the basic VHDL propagation delay mechanisms and gate-level circuit descriptions. We also develop formal procedures for deriving and verifying concise behavioral specifications of combinational and sequential devices. The HDL and the specification procedures have been formally encoded in the computational logic of Boyer and Moore, which provides a LISP implementation as well as a facility for mechanical proof-checking. As an application, we design, specify, and verify a circuit that achieves asynchronous communication by means of the biphase mark protocol.
Side-channel-free quantum key distribution.
Braunstein, Samuel L; Pirandola, Stefano
2012-03-30
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.
Quantum Teleportation of an Arbitrary N-qubit State via GHZ-like States
NASA Astrophysics Data System (ADS)
Zhang, Bo; Liu, Xing-tong; Wang, Jian; Tang, Chao-jing
2016-03-01
Recently Zhu (Int. J. Theor. Phys. 53, 4095, 2014) had shown that using GHZ-like states as quantum channel, it is possible to teleport an arbitrary unknown two-qubit state. We investigate this channel for the teleportation of an arbitrary N-qubit state. The strict proof through mathematical induction is presented and the rule for the receiver to reconstruct the desired state is explicitly derived in the most general case. We also discuss that if a system of quantum secret sharing of classical message is established, our protocol can be transformed to a N-qubit perfect controlled teleportation scheme from the controller's point of view.
QKD using polarization encoding with active measurement basis selection
NASA Astrophysics Data System (ADS)
Duplinskiy, A.; Ustimchik, V.; Kanapin, A.; Kurochkin, Y.
2017-11-01
We report a proof-of-principle quantum key distribution experiment using a one-way optical scheme with polarization encoding implementing the BB84 protocol. LiNbO3 phase modulators are used for generating polarization states for Alice and active basis selection for Bob. This allows the former to use a single laser source, while the latter needs only two single-photon detectors. The presented optical scheme is simple and consists of standard fiber components. Calibration algorithm for three polarization controllers used in the scheme has been developed. The experiment was carried with 10 MHz repetition frequency laser pulses over a distance of 50 km of standard telecom optical fiber.
On chaos synchronization and secure communication.
Kinzel, W; Englert, A; Kanter, I
2010-01-28
Chaos synchronization, in particular isochronal synchronization of two chaotic trajectories to each other, may be used to build a means of secure communication over a public channel. In this paper, we give an overview of coupling schemes of Bernoulli units deduced from chaotic laser systems, different ways to transmit information by chaos synchronization and the advantage of bidirectional over unidirectional coupling with respect to secure communication. We present the protocol for using dynamical private commutative filters for tap-proof transmission of information that maps the task of a passive attacker to the class of non-deterministic polynomial time-complete problems. This journal is © 2010 The Royal Society
Beitzel, Knut; Zandt, Julia F; Buchmann, Stefan; Beitzel, Kirsten I; Schwirtz, Ansgar; Imhoff, Andreas B; Brucker, Peter U
2016-06-01
The purpose of this study was to develop a preventive exercise protocol based on structural and functional changes present in shoulder joints of young throwing athletes. As a proof of concept, these changes were previously evaluated in a cross-section of high-performance junior javelin throwers. Thirteen members of the German and Bavarian junior javelin squad (mean age 17.5 ± 0.8 years) completed a systematic clinical examination, shoulder range of motion (ROM) measurement, and were scored with standardized clinical tools. 3.0 tesla magnetic resonance imaging (MRI) was conducted on both shoulders. Bilateral three-dimensional analysis of the scapulothoracic motion during multiplanar humeral elevation and isokinetic strength testing of the shoulder internal and external rotators was accomplished. Based on the findings, a preventive exercise protocol was confirmed. Dominant internal ROM was significantly decreased (dominant 48° ± 20° vs. non-dominant 57° ± 19°; P = 0.006) and dominant external ROM increased (dominant 117° ± 15° vs. non-dominant 107° ± 10°; P = 0.008). MRI revealed posterosuperior intraosseous cysts of the humeral head with a size larger than >3 mm in 69 % of the dominant shoulders and only in 15 % in the non-dominant shoulders. Motion analysis of the static scapular resting position was significantly different between dominant and non-dominant sides regarding anterior tilt (dominant > non-dominant, mean difference 4.2°, P = 0.010) and retraction (dominant > non-dominant, mean difference 2.4°, P = 0.038). Dominant scapular anterior tilt during flexion and abduction was significantly increased (-4.3°, P = 0.006; -3.4°, P = 0.046). Dominant retraction was significantly increased during abduction (-2.3°, P = 0.040). Isokinetic outcome parameters presented nonsignificant bilateral differences. Elite junior javelin throwers already present structural (humeral intraosseous cysts) and biomechanical changes (ROM deficits and asymmetric scapulothoracic motion patterns), even if they have no history of major shoulder pain or injury. A novel exercise protocol was developed in order to address the complex of alterations in a comprehensive way. Preventive diagnostics in combination with a systematic all-year preventive exercise intervention might be one option to detect and control risk factors of a symptomatic throwing shoulder at an early stage. IV.
Development of binding assays in microfabricated picoliter vials: an assay for biotin.
Grosvenor, A L; Feltus, A; Conover, R C; Daunert, S; Anderson, K W
2000-06-01
A homogeneous binding assay for the detection of biotin in picoliter vials was developed using the photoprotein aequorin as the label. The binding assay was based on the competition of free biotin with biotinylated aequorin (AEQ-biotin) for avidin. A sequential protocol was used, and modification of the assay to reduce the number of steps was examined. Results showed that detection limits on the order of 10(-14) mol of biotin were possible. Reducing the number of steps provided similar detection limits but only if the amount of avidin used was decreased. These binding assays based on picoliter volumes have potential applications in a variety of fields, including microanalysis and single-cell analysis, where the amount of sample is limited. In addition, these assays are suitable for the high-throughput screening of biopharmaceuticals.
Zhang, Fan; Liu, Ming; Harper, Stephen; Lee, Michael; Huang, He
2014-07-22
To enable intuitive operation of powered artificial legs, an interface between user and prosthesis that can recognize the user's movement intent is desired. A novel neural-machine interface (NMI) based on neuromuscular-mechanical fusion developed in our previous study has demonstrated a great potential to accurately identify the intended movement of transfemoral amputees. However, this interface has not yet been integrated with a powered prosthetic leg for true neural control. This study aimed to report (1) a flexible platform to implement and optimize neural control of powered lower limb prosthesis and (2) an experimental setup and protocol to evaluate neural prosthesis control on patients with lower limb amputations. First a platform based on a PC and a visual programming environment were developed to implement the prosthesis control algorithms, including NMI training algorithm, NMI online testing algorithm, and intrinsic control algorithm. To demonstrate the function of this platform, in this study the NMI based on neuromuscular-mechanical fusion was hierarchically integrated with intrinsic control of a prototypical transfemoral prosthesis. One patient with a unilateral transfemoral amputation was recruited to evaluate our implemented neural controller when performing activities, such as standing, level-ground walking, ramp ascent, and ramp descent continuously in the laboratory. A novel experimental setup and protocol were developed in order to test the new prosthesis control safely and efficiently. The presented proof-of-concept platform and experimental setup and protocol could aid the future development and application of neurally-controlled powered artificial legs.
Ruberu, Shryamalie R; Liu, Yun-Gang; Wong, Carolyn T; Perera, S Kusum; Langlois, Gregg W; Doucette, Gregory J; Powell, Christine L
2003-01-01
A receptor binding assay (RBA) for detection of paralytic shellfish poisoning (PSP) toxins was formatted for use in a high throughput detection system using microplate scintillation counting. The RBA technology was transferred from the National Ocean Service, which uses a Wallac TriLux 1450 MicroBeta microplate scintillation counter, to the California Department of Health Services, which uses a Packard TopCount scintillation counter. Due to differences in the detector arrangement between these 2 counters, markedly different counting efficiencies were exhibited, requiring optimization of the RBA protocol for the TopCount instrument. Precision, accuracy, and sensitivity [limit of detection = 0.2 microg saxitoxin (STX) equiv/100 g shellfish tissue] of the modified protocol were equivalent to those of the original protocol. The RBA robustness and adaptability were demonstrated by an interlaboratory study, in which STX concentrations in shellfish generated by the TopCount were consistent with MicroBeta-derived values. Comparison of STX reference standards obtained from the U.S. Food and Drug Administration and the National Research Council, Canada, showed no observable differences. This study confirms the RBA's value as a rapid, high throughput screen prior to testing by the conventional mouse bioassay (MBA) and its suitability for providing an early warning of increasing PSP toxicity when toxin levels are below the MBA limit of detection.
Nohara, Kazunari; Chen, Zheng; Yoo, Seung-Hee
2017-07-06
Chromatin immunoprecipitation (ChIP) is a powerful method to determine protein binding to chromatin DNA. Fiber-rich skeletal muscle, however, has been a challenge for ChIP due to technical difficulty in isolation of high-quality nuclei with minimal contamination of myofibrils. Previous protocols have attempted to purify nuclei before cross-linking, which incurs the risk of altered DNA-protein interaction during the prolonged nuclei preparation process. In the current protocol, we first cross-linked the skeletal muscle tissue collected from mice, and the tissues were minced and sonicated. Since we found that ultracentrifugation was not able to separate nuclei from myofibrils using cross-linked muscle tissue, we devised a sequential filtration procedure to obtain high-quality nuclei devoid of significant myofibril contamination. We subsequently prepared chromatin by using an ultrasonicator, and ChIP assays with anti-BMAL1 antibody revealed robust circadian binding pattern of BMAL1 to target gene promoters. This filtration protocol constitutes an easily applicable method to isolate high-quality nuclei from cross-linked skeletal muscle tissue, allowing consistent sample processing for circadian and other time-sensitive studies. In combination with next-generation sequencing (NGS), our method can be deployed for various mechanistic and genomic studies focusing on skeletal muscle function.
Su, Bo-Han; Huang, Yi-Syuan; Chang, Chia-Yun; Tu, Yi-Shu; Tseng, Yufeng J
2013-10-31
There is a compelling need to discover type II inhibitors targeting the unique DFG-out inactive kinase conformation since they are likely to possess greater potency and selectivity relative to traditional type I inhibitors. Using a known inhibitor, such as a currently available and approved drug or inhibitor, as a template to design new drugs via computational de novo design is helpful when working with known ligand-receptor interactions. This study proposes a new template-based de novo design protocol to discover new inhibitors that preserve and also optimize the binding interactions of the type II kinase template. First, sorafenib (Nexavar) and nilotinib (Tasigna), two type II inhibitors with different ligand-receptor interactions, were selected as the template compounds. The five-step protocol can reassemble each drug from a large fragment library. Our procedure demonstrates that the selected template compounds can be successfully reassembled while the key ligand-receptor interactions are preserved. Furthermore, to demonstrate that the algorithm is able to construct more potent compounds, we considered kinase inhibitors and other protein dataset, acetylcholinesterase (AChE) inhibitors. The de novo optimization was initiated using a template compound possessing a less than optimal activity from a series of aminoisoquinoline and TAK-285 inhibiting type II kinases, and E2020 derivatives inhibiting AChE respectively. Three compounds with greater potency than the template compound were discovered that were also included in the original congeneric series. This template-based lead optimization protocol with the fragment library can help to design compounds with preferred binding interactions of known inhibitors automatically and further optimize the compounds in the binding pockets.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chan, A.; Tsiounis, Y.; Frankel, Y.
Recently, there has been an interest in making electronic cash protocols more practical for electronic commerce by developing e-cash which is divisible (e.g., a coin which can be spent incrementally but total purchases are limited to the monetary value of the coin). In Crypto`95, T. Okamoto presented the first practical divisible, untraceable, off-line e-cash scheme, which requires only O(log N) computations for each of the withdrawal, payment and deposit procedures, where N = (total coin value)/(smallest divisible unit). However, Okamoto`s set-up procedure is quite inefficient (on the order of 4,000 multi-exponentiations and depending on the size of the RSA modulus).more » The authors formalize the notion of range-bounded commitment, originally used in Okamoto`s account establishment protocol, and present a very efficient instantiation which allows one to construct the first truly efficient divisible e-cash system. The scheme only requires the equivalent of one (1) exponentiation for set-up, less than 2 exponentiations for withdrawal and around 20 for payment, while the size of the coin remains about 300 Bytes. Hence, the withdrawal protocol is 3 orders of magnitude faster than Okamoto`s, while the rest of the system remains equally efficient, allowing for implementation in smart-cards. Similar to Okamoto`s, the scheme is based on proofs whose cryptographic security assumptions are theoretically clarified.« less
Kim, Ari; Yen, Paul; Mroczek, Marta; Nouri, Mannan; Lien, Scott; Axerio-Cilies, Peter; Dalal, Kush; Yau, Clement; Ghaidi, Fariba; Guo, Yubin; Yamazaki, Takeshi; Lawn, Sam; Gleave, Martin E.; Gregory-Evans, Cheryl Y.
2017-01-01
Genomic alterations involving translocations of the ETS-related gene ERG occur in approximately half of prostate cancer cases. These alterations result in aberrant, androgen-regulated production of ERG protein variants that directly contribute to disease development and progression. This study describes the discovery and characterization of a new class of small molecule ERG antagonists identified through rational in silico methods. These antagonists are designed to sterically block DNA binding by the ETS domain of ERG and thereby disrupt transcriptional activity. We confirmed the direct binding of a lead compound, VPC-18005, with the ERG-ETS domain using biophysical approaches. We then demonstrated VPC-18005 reduced migration and invasion rates of ERG expressing prostate cancer cells, and reduced metastasis in a zebrafish xenograft model. These results demonstrate proof-of-principal that small molecule targeting of the ERG-ETS domain can suppress transcriptional activity and reverse transformed characteristics of prostate cancers aberrantly expressing ERG. Clinical advancement of the developed small molecule inhibitors may provide new therapeutic agents for use as alternatives to, or in combination with, current therapies for men with ERG-expressing metastatic castration-resistant prostate cancer. PMID:28465491
Ntumngia, Francis B; Pires, Camilla V; Barnes, Samantha J; George, Miriam T; Thomson-Luque, Richard; Kano, Flora S; Alves, Jessica R S; Urusova, Darya; Pereira, Dhelio B; Tolia, Niraj H; King, Christopher L; Carvalho, Luzia H; Adams, John H
2017-10-23
Plasmodium vivax invasion into human reticulocytes is a complex process. The Duffy binding protein (DBP) dimerization with its cognate receptor is vital for junction formation in the invasion process. Due to its functional importance, DBP is considered a prime vaccine candidate, but variation in B-cell epitopes at the dimer interface of DBP leads to induction of strain-limited immunity. We believe that the polymorphic residues tend to divert immune responses away from functionally conserved epitopes important for receptor binding or DBP dimerization. As a proof of concept, we engineered the vaccine DEKnull to ablate the dominant Bc epitope to partially overcome strain-specific immune antibody responses. Additional surface engineering on the next generation immunogen, DEKnull-2, provides an immunogenicity breakthrough to conserved protective epitopes. DEKnull-2 elicits a stronger broadly neutralizing response and reactivity with long-term persistent antibody responses of acquired natural immunity. By using novel engineered DBP immunogens, we validate that the prime targets of protective immunity are conformational epitopes at the dimer interface. These successful results indicate a potential approach that can be used generally to improve efficacy of other malaria vaccine candidates.
Mapping of Fab-1:VEGF Interface Using Carboxyl Group Footprinting Mass Spectrometry
NASA Astrophysics Data System (ADS)
Wecksler, Aaron T.; Kalo, Matt S.; Deperalta, Galahad
2015-12-01
A proof-of-concept study was performed to demonstrate that carboxyl group footprinting, a relatively simple, bench-top method, has utility for first-pass analysis to determine epitope regions of therapeutic mAb:antigen complexes. The binding interface of vascular endothelial growth factor (VEGF) and the Fab portion of a neutralizing antibody (Fab-1) was analyzed using carboxyl group footprinting with glycine ethyl ester (GEE) labeling. Tryptic peptides involved in the binding interface between VEGF and Fab-1 were identified by determining the specific GEE-labeled residues that exhibited a reduction in the rate of labeling after complex formation. A significant reduction in the rate of GEE labeling was observed for E93 in the VEGF tryptic peptide V5, and D28 and E57 in the Fab-1 tryptic peptides HC2 and HC4, respectively. Results from the carboxyl group footprinting were compared with the binding interface identified from a previously characterized crystal structure (PDB: 1BJ1). All of these residues are located at the Fab-1:VEGF interface according to the crystal structure, demonstrating the potential utility of carboxyl group footprinting with GEE labeling for mapping epitopes.
Carter, Joshua D; LaBean, Thomas H
2011-03-22
An interesting alternative to top-down nanofabrication is to imitate biology, where nanoscale materials frequently integrate organic molecules for self-assembly and molecular recognition with ordered, inorganic minerals to achieve mechanical, sensory, or other advantageous functions. Using biological systems as inspiration, researchers have sought to mimic the nanoscale composite materials produced in nature. Here, we describe a combination of self-assembly, molecular recognition, and templating, relying on an oligonucleotide covalently conjugated to a high-affinity gold-binding peptide. After integration of the peptide-coupled DNA into a self-assembling superstructure, the templated peptides recognize and bind gold nanoparticles. In addition to providing new ways of building functional multinanoparticle systems, this work provides experimental proof that a single peptide molecule is sufficient for immobilization of a nanoparticle. This molecular construction strategy, combining DNA assembly and peptide recognition, can be thought of as programmable, granular, artificial biomineralization. We also describe the important observation that the addition of 1-2% Tween 20 surfactant to the solution during gold particle binding allows the gold nanoparticles to remain soluble within the magnesium-containing DNA assembly buffer under conditions that usually lead to the aggregation and precipitation of the nanoparticles.
Ashworth, Justin; Plaisier, Christopher L.; Lo, Fang Yin; Reiss, David J.; Baliga, Nitin S.
2014-01-01
Widespread microbial genome sequencing presents an opportunity to understand the gene regulatory networks of non-model organisms. This requires knowledge of the binding sites for transcription factors whose DNA-binding properties are unknown or difficult to infer. We adapted a protein structure-based method to predict the specificities and putative regulons of homologous transcription factors across diverse species. As a proof-of-concept we predicted the specificities and transcriptional target genes of divergent archaeal feast/famine regulatory proteins, several of which are encoded in the genome of Halobacterium salinarum. This was validated by comparison to experimentally determined specificities for transcription factors in distantly related extremophiles, chromatin immunoprecipitation experiments, and cis-regulatory sequence conservation across eighteen related species of halobacteria. Through this analysis we were able to infer that Halobacterium salinarum employs a divergent local trans-regulatory strategy to regulate genes (carA and carB) involved in arginine and pyrimidine metabolism, whereas Escherichia coli employs an operon. The prediction of gene regulatory binding sites using structure-based methods is useful for the inference of gene regulatory relationships in new species that are otherwise difficult to infer. PMID:25255272
Ashworth, Justin; Plaisier, Christopher L; Lo, Fang Yin; Reiss, David J; Baliga, Nitin S
2014-01-01
Widespread microbial genome sequencing presents an opportunity to understand the gene regulatory networks of non-model organisms. This requires knowledge of the binding sites for transcription factors whose DNA-binding properties are unknown or difficult to infer. We adapted a protein structure-based method to predict the specificities and putative regulons of homologous transcription factors across diverse species. As a proof-of-concept we predicted the specificities and transcriptional target genes of divergent archaeal feast/famine regulatory proteins, several of which are encoded in the genome of Halobacterium salinarum. This was validated by comparison to experimentally determined specificities for transcription factors in distantly related extremophiles, chromatin immunoprecipitation experiments, and cis-regulatory sequence conservation across eighteen related species of halobacteria. Through this analysis we were able to infer that Halobacterium salinarum employs a divergent local trans-regulatory strategy to regulate genes (carA and carB) involved in arginine and pyrimidine metabolism, whereas Escherichia coli employs an operon. The prediction of gene regulatory binding sites using structure-based methods is useful for the inference of gene regulatory relationships in new species that are otherwise difficult to infer.
A novel integrated framework and improved methodology of computer-aided drug design.
Chen, Calvin Yu-Chian
2013-01-01
Computer-aided drug design (CADD) is a critical initiating step of drug development, but a single model capable of covering all designing aspects remains to be elucidated. Hence, we developed a drug design modeling framework that integrates multiple approaches, including machine learning based quantitative structure-activity relationship (QSAR) analysis, 3D-QSAR, Bayesian network, pharmacophore modeling, and structure-based docking algorithm. Restrictions for each model were defined for improved individual and overall accuracy. An integration method was applied to join the results from each model to minimize bias and errors. In addition, the integrated model adopts both static and dynamic analysis to validate the intermolecular stabilities of the receptor-ligand conformation. The proposed protocol was applied to identifying HER2 inhibitors from traditional Chinese medicine (TCM) as an example for validating our new protocol. Eight potent leads were identified from six TCM sources. A joint validation system comprised of comparative molecular field analysis, comparative molecular similarity indices analysis, and molecular dynamics simulation further characterized the candidates into three potential binding conformations and validated the binding stability of each protein-ligand complex. The ligand pathway was also performed to predict the ligand "in" and "exit" from the binding site. In summary, we propose a novel systematic CADD methodology for the identification, analysis, and characterization of drug-like candidates.
Science, truth, and forensic cultures: the exceptional legal status of DNA evidence.
Lynch, Michael
2013-03-01
Many epistemological terms, such as investigation, inquiry, argument, evidence, and fact were established in law well before being associated with science. However, while legal proof remained qualified by standards of 'moral certainty', scientific proof attained a reputation for objectivity. Although most forms of legal evidence (including expert evidence) continue to be treated as fallible 'opinions' rather than objective 'facts', forensic DNA evidence increasingly is being granted an exceptional factual status. It did not always enjoy such status. Two decades ago, the scientific status of forensic DNA evidence was challenged in the scientific literature and in courts of law, but by the late 1990s it was being granted exceptional legal status. This paper reviews the ascendancy of DNA profiling, and argues that its widely-heralded objective status is bound up with systems of administrative accountability. The 'administrative objectivity' of DNA evidence rests upon observable and reportable bureaucratic rules, records, recording devices, protocols, and architectural arrangements. By highlighting administrative sources of objectivity, this paper suggests that DNA evidence remains bound within the context of ordinary organisational and practical routines, and is not a transcendent source of 'truth' in the criminal justice system. Copyright © 2012. Published by Elsevier Ltd.
BaffleText: a Human Interactive Proof
NASA Astrophysics Data System (ADS)
Chew, Monica; Baird, Henry S.
2003-01-01
Internet services designed for human use are being abused by programs. We present a defense against such attacks in the form of a CAPTCHA (Completely Automatic Public Turing test to tell Computers and Humans Apart) that exploits the difference in ability between humans and machines in reading images of text. CAPTCHAs are a special case of 'human interactive proofs,' a broad class of security protocols that allow people to identify themselves over networks as members of given groups. We point out vulnerabilities of reading-based CAPTCHAs to dictionary and computer-vision attacks. We also draw on the literature on the psychophysics of human reading, which suggests fresh defenses available to CAPTCHAs. Motivated by these considerations, we propose BaffleText, a CAPTCHA which uses non-English pronounceable words to defend against dictionary attacks, and Gestalt-motivated image-masking degradations to defend against image restoration attacks. Experiments on human subjects confirm the human legibility and user acceptance of BaffleText images. We have found an image-complexity measure that correlates well with user acceptance and assists in engineering the generation of challenges to fit the ability gap. Recent computer-vision attacks, run independently by Mori and Jitendra, suggest that BaffleText is stronger than two existing CAPTCHAs.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-29
... regarding how and when data collection forms and standard operating procedures should be included with the... topic. It does not create or confer any rights for or on any person and does not operate to bind FDA or...
Typically, in vitro hazard assessments for the identification of endocrine-disrupting compounds (EDCs), including those outlined in the Endocrine Disruptor Screening and Testing Advisory Committee (EDSTAC) Tier 1 Screening protocols, utilize mammalian receptors. Evidence, however...
Tuncbag, Nurcan; Gursoy, Attila; Nussinov, Ruth; Keskin, Ozlem
2011-08-11
Prediction of protein-protein interactions at the structural level on the proteome scale is important because it allows prediction of protein function, helps drug discovery and takes steps toward genome-wide structural systems biology. We provide a protocol (termed PRISM, protein interactions by structural matching) for large-scale prediction of protein-protein interactions and assembly of protein complex structures. The method consists of two components: rigid-body structural comparisons of target proteins to known template protein-protein interfaces and flexible refinement using a docking energy function. The PRISM rationale follows our observation that globally different protein structures can interact via similar architectural motifs. PRISM predicts binding residues by using structural similarity and evolutionary conservation of putative binding residue 'hot spots'. Ultimately, PRISM could help to construct cellular pathways and functional, proteome-scale annotation. PRISM is implemented in Python and runs in a UNIX environment. The program accepts Protein Data Bank-formatted protein structures and is available at http://prism.ccbb.ku.edu.tr/prism_protocol/.
Locating binding poses in protein-ligand systems using reconnaissance metadynamics
Söderhjelm, Pär; Tribello, Gareth A.; Parrinello, Michele
2012-01-01
A molecular dynamics-based protocol is proposed for finding and scoring protein-ligand binding poses. This protocol uses the recently developed reconnaissance metadynamics method, which employs a self-learning algorithm to construct a bias that pushes the system away from the kinetic traps where it would otherwise remain. The exploration of phase space with this algorithm is shown to be roughly six to eight times faster than unbiased molecular dynamics and is only limited by the time taken to diffuse about the surface of the protein. We apply this method to the well-studied trypsin–benzamidine system and show that we are able to refind all the poses obtained from a reference EADock blind docking calculation. These poses can be scored based on the length of time the system remains trapped in the pose. Alternatively, one can perform dimensionality reduction on the output trajectory and obtain a map of phase space that can be used in more expensive free-energy calculations. PMID:22440749
RNA Imaging with Dimeric Broccoli in Live Bacterial and Mammalian Cells
Filonov, Grigory S.
2016-01-01
RNA spatial dynamics play a crucial role in cell physiology and thus the ability to monitor RNA localization in live cells can provide insight into important biological problems. This article focuses on imaging RNAs using an “RNA mimic of GFP”. This approach relies on a RNA aptamer, called dimeric Broccoli, which binds to and switches on the fluorescence of DFHBI, a small molecule mimicking the fluorophore in GFP. Dimeric Broccoli is tagged to heterologously expressed RNAs and upon DFHBI binding the fluorescent signal of dimeric Broccoli reports the transcript’s localization in cells. This protocol describes the process of validating the fluorescence of dimeric Broccoli-labeled transcripts in vitro and in cells, flow cytometry analysis to determine overall fluorescence levels in cells, and fluorescence imaging in bacterial and mammalian cells. Overall, the current protocol should be useful for researchers seeking to image high abundance RNAs, such as transcribed off the T7 promoter in bacteria or off Pol III-dependent promoters in mammalian cells. PMID:26995352
Locating binding poses in protein-ligand systems using reconnaissance metadynamics.
Söderhjelm, Pär; Tribello, Gareth A; Parrinello, Michele
2012-04-03
A molecular dynamics-based protocol is proposed for finding and scoring protein-ligand binding poses. This protocol uses the recently developed reconnaissance metadynamics method, which employs a self-learning algorithm to construct a bias that pushes the system away from the kinetic traps where it would otherwise remain. The exploration of phase space with this algorithm is shown to be roughly six to eight times faster than unbiased molecular dynamics and is only limited by the time taken to diffuse about the surface of the protein. We apply this method to the well-studied trypsin-benzamidine system and show that we are able to refind all the poses obtained from a reference EADock blind docking calculation. These poses can be scored based on the length of time the system remains trapped in the pose. Alternatively, one can perform dimensionality reduction on the output trajectory and obtain a map of phase space that can be used in more expensive free-energy calculations.
Pull-down Assay to Characterize Ca2+/Calmodulin Binding to Plant Receptor Kinases.
Kaufmann, Christine; Sauter, Margret
2017-01-01
Plant receptor-like kinases (RLKs) are regulated by posttranscriptional modification and by interaction with regulatory proteins. A common modification of RLKs is (auto)phosphorylation, and a common regulatory protein is the calcium sensor calmodulin (CaM). We have developed protocols to detect the interaction of an RLK with CaM. The interaction with CaM was shown by bimolecular fluorescence complementation (BiFC) (see Chapter 14) and pull-down assay (this chapter). Both methods offer unique advantages. BiFC is useful in showing interaction of soluble as well as of membrane-bound proteins in planta. Pull-down assays are restricted to soluble proteins and provide in vitro data. The pull-down assay provides the advantage that proteins can be modified prior to binding and that experimental conditions such as the concentration of Ca 2+ or other divalent cations can be controlled. This chapter provides a pull-down protocol to study RLK-CaM interaction with optional steps to investigate the impact of RLK phosphorylation or of Ca 2+ .
Computational exploration of zinc binding groups for HDAC inhibition.
Chen, Kai; Xu, Liping; Wiest, Olaf
2013-05-17
Histone deacetylases (HDACs) have emerged as important drug targets in epigenetics. The most common HDAC inhibitors use hydroxamic acids as zinc binding groups despite unfavorable pharmacokinetic properties. A two-stage protocol of M05-2X calculations of a library of 48 fragments in a small model active site, followed by QM/MM hybrid calculations of the full enzyme with selected binders, is used to prospectively select potential bidentate zinc binders. The energetics and interaction patterns of several zinc binders not previously used for the inhibition of HDACs are discussed.
To, Wing Ting; Ost, Jan; Hart, John; De Ridder, Dirk; Vanneste, Sven
2017-01-01
Tinnitus is the perception of a sound in the absence of a corresponding external sound source. Research has suggested that functional abnormalities in tinnitus patients involve auditory as well as non-auditory brain areas. Transcranial electrical stimulation (tES), such as transcranial direct current stimulation (tDCS) to the dorsolateral prefrontal cortex and transcranial random noise stimulation (tRNS) to the auditory cortex, has demonstrated modulation of brain activity to transiently suppress tinnitus symptoms. Targeting two core regions of the tinnitus network by tES might establish a promising strategy to enhance treatment effects. This proof-of-concept study aims to investigate the effect of a multisite tES treatment protocol on tinnitus intensity and distress. A total of 40 tinnitus patients were enrolled in this study and received either bifrontal tDCS or the multisite treatment of bifrontal tDCS before bilateral auditory cortex tRNS. Both groups were treated on eight sessions (two times a week for 4 weeks). Our results show that a multisite treatment protocol resulted in more pronounced effects when compared with the bifrontal tDCS protocol or the waiting list group, suggesting an added value of auditory cortex tRNS to the bifrontal tDCS protocol for tinnitus patients. These findings support the involvement of the auditory as well as non-auditory brain areas in the pathophysiology of tinnitus and demonstrate the idea of the efficacy of network stimulation in the treatment of neurological disorders. This multisite tES treatment protocol proved to be save and feasible for clinical routine in tinnitus patients.
Unconditionally verifiable blind quantum computation
NASA Astrophysics Data System (ADS)
Fitzsimons, Joseph F.; Kashefi, Elham
2017-07-01
Blind quantum computing (BQC) allows a client to have a server carry out a quantum computation for them such that the client's input, output, and computation remain private. A desirable property for any BQC protocol is verification, whereby the client can verify with high probability whether the server has followed the instructions of the protocol or if there has been some deviation resulting in a corrupted output state. A verifiable BQC protocol can be viewed as an interactive proof system leading to consequences for complexity theory. We previously proposed [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual Symposium on Foundations of Computer Science, Atlanta, 2009 (IEEE, Piscataway, 2009), p. 517] a universal and unconditionally secure BQC scheme where the client only needs to be able to prepare single qubits in separable states randomly chosen from a finite set and send them to the server, who has the balance of the required quantum computational resources. In this paper we extend that protocol with additional functionality allowing blind computational basis measurements, which we use to construct another verifiable BQC protocol based on a different class of resource states. We rigorously prove that the probability of failing to detect an incorrect output is exponentially small in a security parameter, while resource overhead remains polynomial in this parameter. This resource state allows entangling gates to be performed between arbitrary pairs of logical qubits with only constant overhead. This is a significant improvement on the original scheme, which required that all computations to be performed must first be put into a nearest-neighbor form, incurring linear overhead in the number of qubits. Such an improvement has important consequences for efficiency and fault-tolerance thresholds.
Schmidt, C Q; Herbert, A P; Hocking, H G; Uhrín, D; Barlow, P N
2008-01-01
The 155-kDa glycoprotein, complement factor H (CFH), is a regulator of complement activation that is abundant in human plasma. Three-dimensional structures of over half the 20 complement control protein (CCP) modules in CFH have been solved in the context of single-, double- and triple-module segments. Proven binding sites for C3b occupy the N and C termini of this elongated molecule and may be brought together by a bend in CFH mediated by its central CCP modules. The C-terminal CCP 20 is key to the ability of the molecule to adhere to polyanionic markers on self-surfaces where CFH acts to regulate amplification of the alternative pathway of complement. The surface patch on CCP 20 that binds to model glycosaminoglycans has been mapped using nuclear magnetic resonance (NMR), as has a second glycosaminoglycan-binding patch on CCP 7. These patches include many of the residue positions at which sequence variations have been linked to three complement-mediated disorders: dense deposit disease, age-related macular degeneration and atypical haemolytic uraemic syndrome. In one plausible model, CCP 20 anchors CFH to self-surfaces via a C3b/polyanion composite binding site, CCP 7 acts as a ‘proof-reader’ to help discriminate self- from non-self patterns of sulphation, and CCPs 1–4 disrupt C3/C5 convertase formation and stability. PMID:18081691
Bouard, Charlotte; Terreux, Raphael; Honorat, Mylène; Manship, Brigitte; Ansieau, Stéphane; Vigneron, Arnaud M.; Puisieux, Alain; Payen, Léa
2016-01-01
Abstract The TWIST1 bHLH transcription factor controls embryonic development and cancer processes. Although molecular and genetic analyses have provided a wealth of data on the role of bHLH transcription factors, very little is known on the molecular mechanisms underlying their binding affinity to the E-box sequence of the promoter. Here, we used an in silico model of the TWIST1/E12 (TE) heterocomplex and performed molecular dynamics (MD) simulations of its binding to specific (TE-box) and modified E-box sequences. We focused on (i) active E-box and inactive E-box sequences, on (ii) modified active E-box sequences, as well as on (iii) two box sequences with modified adjacent bases the AT- and TA-boxes. Our in silico models were supported by functional in vitro binding assays. This exploration highlighted the predominant role of protein side-chain residues, close to the heart of the complex, at anchoring the dimer to DNA sequences, and unveiled a shift towards adjacent ((-1) and (-1*)) bases and conserved bases of modified E-box sequences. In conclusion, our study provides proof of the predictive value of these MD simulations, which may contribute to the characterization of specific inhibitors by docking approaches, and their use in pharmacological therapies by blocking the tumoral TWIST1/E12 function in cancers. PMID:27151200
Oti, Martin; Dutilh, Bas E.; Alonso, M. Eva; de la Calle-Mustienes, Elisa; Smeenk, Leonie; Rinne, Tuula; Parsaulian, Lilian; Bolat, Emine; Jurgelenaite, Rasa; Huynen, Martijn A.; Hoischen, Alexander; Veltman, Joris A.; Brunner, Han G.; Roscioli, Tony; Oates, Emily; Wilson, Meredith; Manzanares, Miguel; Gómez-Skarmeta, José Luis; Stunnenberg, Hendrik G.; Lohrum, Marion; van Bokhoven, Hans; Zhou, Huiqing
2010-01-01
Heterozygous mutations in p63 are associated with split hand/foot malformations (SHFM), orofacial clefting, and ectodermal abnormalities. Elucidation of the p63 gene network that includes target genes and regulatory elements may reveal new genes for other malformation disorders. We performed genome-wide DNA–binding profiling by chromatin immunoprecipitation (ChIP), followed by deep sequencing (ChIP–seq) in primary human keratinocytes, and identified potential target genes and regulatory elements controlled by p63. We show that p63 binds to an enhancer element in the SHFM1 locus on chromosome 7q and that this element controls expression of DLX6 and possibly DLX5, both of which are important for limb development. A unique micro-deletion including this enhancer element, but not the DLX5/DLX6 genes, was identified in a patient with SHFM. Our study strongly indicates disruption of a non-coding cis-regulatory element located more than 250 kb from the DLX5/DLX6 genes as a novel disease mechanism in SHFM1. These data provide a proof-of-concept that the catalogue of p63 binding sites identified in this study may be of relevance to the studies of SHFM and other congenital malformations that resemble the p63-associated phenotypes. PMID:20808887
Zhu, Li; Hwang, Peter; Witkowska, H. Ewa; Liu, Haichuan; Li, Wu
2014-01-01
Tooth enamel is the hardest tissue in vertebrate animals. Consisting of millions of carbonated hydroxyapatite crystals, this highly mineralized tissue develops from a protein matrix in which amelogenin is the predominant component. The enamel matrix proteins are eventually and completely degraded and removed by proteinases to form mineral-enriched tooth enamel. Identification of the apatite-binding motifs in amelogenin is critical for understanding the amelogenin–crystal interactions and amelogenin–proteinases interactions during tooth enamel biomineralization. A stepwise strategy is introduced to kinetically and quantitatively identify the crystal-binding motifs in amelogenin, including a peptide screening assay, a competitive adsorption assay, and a kinetic-binding assay using amelogenin and gene-engineered amelogenin mutants. A modified enzyme-linked immunosorbent assay on crystal surfaces is also applied to compare binding amounts of amelogenin and its mutants on different planes of apatite crystals. We describe the detailed protocols for these assays and provide the considerations for these experiments in this chapter. PMID:24188774
NASA Astrophysics Data System (ADS)
Bhakat, Soumendranath; Åberg, Emil; Söderhjelm, Pär
2018-01-01
Advanced molecular docking methods often aim at capturing the flexibility of the protein upon binding to the ligand. In this study, we investigate whether instead a simple rigid docking method can be applied, if combined with multiple target structures to model the backbone flexibility and molecular dynamics simulations to model the sidechain and ligand flexibility. The methods are tested for the binding of 35 ligands to FXR as part of the first stage of the Drug Design Data Resource (D3R) Grand Challenge 2 blind challenge. The results show that the multiple-target docking protocol performs surprisingly well, with correct poses found for 21 of the ligands. MD simulations started on the docked structures are remarkably stable, but show almost no tendency of refining the structure closer to the experimentally found binding pose. Reconnaissance metadynamics enhances the exploration of new binding poses, but additional collective variables involving the protein are needed to exploit the full potential of the method.
Bhakat, Soumendranath; Åberg, Emil; Söderhjelm, Pär
2018-01-01
Advanced molecular docking methods often aim at capturing the flexibility of the protein upon binding to the ligand. In this study, we investigate whether instead a simple rigid docking method can be applied, if combined with multiple target structures to model the backbone flexibility and molecular dynamics simulations to model the sidechain and ligand flexibility. The methods are tested for the binding of 35 ligands to FXR as part of the first stage of the Drug Design Data Resource (D3R) Grand Challenge 2 blind challenge. The results show that the multiple-target docking protocol performs surprisingly well, with correct poses found for 21 of the ligands. MD simulations started on the docked structures are remarkably stable, but show almost no tendency of refining the structure closer to the experimentally found binding pose. Reconnaissance metadynamics enhances the exploration of new binding poses, but additional collective variables involving the protein are needed to exploit the full potential of the method.
Display of a maize cDNA library on baculovirus infected insect cells.
Meller Harel, Helene Y; Fontaine, Veronique; Chen, Hongying; Jones, Ian M; Millner, Paul A
2008-08-12
Maize is a good model system for cereal crop genetics and development because of its rich genetic heritage and well-characterized morphology. The sequencing of its genome is well advanced, and new technologies for efficient proteomic analysis are needed. Baculovirus expression systems have been used for the last twenty years to express in insect cells a wide variety of eukaryotic proteins that require complex folding or extensive posttranslational modification. More recently, baculovirus display technologies based on the expression of foreign sequences on the surface of Autographa californica (AcMNPV) have been developed. We investigated the potential of a display methodology for a cDNA library of maize young seedlings. We constructed a full-length cDNA library of young maize etiolated seedlings in the transfer vector pAcTMVSVG. The library contained a total of 2.5 x 10(5) independent clones. Expression of two known maize proteins, calreticulin and auxin binding protein (ABP1), was shown by western blot analysis of protein extracts from insect cells infected with the cDNA library. Display of the two proteins in infected insect cells was shown by selective biopanning using magnetic cell sorting and demonstrated proof of concept that the baculovirus maize cDNA display library could be used to identify and isolate proteins. The maize cDNA library constructed in this study relies on the novel technology of baculovirus display and is unique in currently published cDNA libraries. Produced to demonstrate proof of principle, it opens the way for the development of a eukaryotic in vivo display tool which would be ideally suited for rapid screening of the maize proteome for binding partners, such as proteins involved in hormone regulation or defence.
Grosset, A M; Gibney, B R; Rabanal, F; Moser, C C; Dutton, P L
2001-05-08
New understanding of the engineering and allosteric regulation of natural protein conformational switches (such as those that couple chemical and ionic signals, mechanical force, and electro/chemical free energy for biochemical activation, catalysis, and motion) can be derived from simple de novo designed synthetic protein models (maquettes). We demonstrate proof of principle of both reversible switch action and allosteric regulation in a tetra-alpha-helical bundle protein composed of two identical di-helical subunits containing heme coordinated at a specific position close to the disulfide loop region. Individual bundles assume one of two switch states related by large-scale mechanical changes: a syn-topology (helices of the different subunits parallel) or anti-topology (helices antiparallel). Both the spectral properties of a coproporphyrin probe appended to the loop region and the distance-dependent redox interaction between the hemes identify the topologies. Beginning from a syn-topology, introduction of ferric heme in each subunit (either binding or redox change) shifts the topological balance by 25-50-fold (1.9-2.3 kcal/mol) to an anti-dominance. Charge repulsion between the two internal cationic ferric hemes drives the syn- to anti-switch, as demonstrated in two ways. When fixed in the syn-topology, the second ferric heme binding is 25-80-fold (1.9-2.6 kcal/mol) weaker than the first, and adjacent heme redox potentials are split by 80 mV (1.85 kcal/mol), values that energetically match the shift in topological balance. Allosteric and cooperative regulation of the switch by ionic strength exploits the shielded charge interactions between the two hemes and the exposed, cooperative interactions between the coproporphyrin carboxylates.
Park, Hyun Soo; Jung, In Soon; Lim, Nam Hee; Sung, Ji Hyun; Lee, Sukhyang; Moon, Byung Seok; Lee, Byung Chul; Kang, Kyung Koo; Kim, Sang Eun
2014-07-01
To investigate the efficacy of DA-8031, a novel compound for the treatment of premature ejaculation, we measured serotonin transporter (SERT) occupancy by DA-8031, as well as DA-8031-induced changes in extracellular serotonin levels, in the rat brain using positron emission tomography (PET) and 11C-N,N-dimethyl-2-(2-amino-4-cyanophenylthio) benzylamine ([11C]DASB) and in vivo microdialysis, respectively. [11C]DASB PET scans were performed in rats with graded doses of DA-8031 (vehicle: 10, 30, and 100 mg/kg). SERT occupancy in the midbrain was determined using binding potentials for [11C]DASB calculated by the multilinear reference tissue model. Extracellular serotonin levels were monitored in the dorsal raphe nucleus of rats after the administration of DA-8031 (10-100 mg/kg) using in vivo microdialysis. PET data indicated a reduction of [11C]DASB binding to SERTs in the midbrain as a function of DA-8031 dose. SERT occupancy for each DA-8031 dose (10-100 mg/kg) ranged between 31% and 84%. The drug dose required for 50% occupancy of SERT was 13.5 mg/kg in the midbrain, comparable with previous preclinical behavioral data (∼10-30 mg/kg). In vivo microdialysis showed that DA-8031 produced a dose-dependent increase in extracellular serotonin levels in the dorsal raphe nucleus (33%-81% increase for doses of 10-100 mg/kg). These preclinical data provide a proof of mechanism for DA-8031 as a novel compound of targeting the SERT for the treatment of premature ejaculation, warranting further clinical trials. They also offer insight into the optimal drug dose needed to exert therapeutic effects while minimizing adverse effects in humans. Copyright © 2014 Elsevier Inc. All rights reserved.
Developing Targeted Hybrid Imaging Probes by Chelator Scaffolding
2017-01-01
Positron emission tomography (PET) as well as optical imaging (OI) with peptide receptor targeting probes have proven their value for oncological applications but also show restrictions depending on the clinical field of interest. Therefore, the combination of both methods, particularly in a single molecule, could improve versatility in clinical routine. This proof of principle study aims to show that a chelator, Fusarinine C (FSC), can be utilized as scaffold for novel dimeric dual-modality imaging agents. Two targeting vectors (a minigastrin analogue (MG11) targeting cholecystokinin-2 receptor overexpression (CCK2R) or integrin αVβ3 targeting cyclic pentapeptides (RGD)) and a near-infrared fluorophore (Sulfo-Cyanine7) were conjugated to FSC. The probes were efficiently labeled with gallium-68 and in vitro experiments including determination of logD, stability, protein binding, cell binding, internalization, and biodistribution studies as well as in vivo micro-PET/CT and optical imaging in U-87MG αVβ3- and A431-CCK2R expressing tumor xenografted mice were carried out. Novel bioconjugates showed high receptor affinity and highly specific targeting properties at both receptors. Ex vivo biodistribution and micro-PET/CT imaging studies revealed specific tumor uptake accompanied by slow blood clearance and retention in nontargeted tissues (spleen, liver, and kidneys) leading to visualization of tumors at early (30 to 120 min p.i.). Excellent contrast in corresponding optical imaging studies was achieved especially at delayed time points (24 to 72 h p.i.). Our findings show the proof of principle of chelator scaffolding for hybrid imaging agents and demonstrate FSC being a suitable bifunctional chelator for this approach. Improvements to fine-tune pharmacokinetics are needed to translate this into a clinical setting. PMID:28462989
Cloud computing approaches for prediction of ligand binding poses and pathways.
Lawrenz, Morgan; Shukla, Diwakar; Pande, Vijay S
2015-01-22
We describe an innovative protocol for ab initio prediction of ligand crystallographic binding poses and highly effective analysis of large datasets generated for protein-ligand dynamics. We include a procedure for setup and performance of distributed molecular dynamics simulations on cloud computing architectures, a model for efficient analysis of simulation data, and a metric for evaluation of model convergence. We give accurate binding pose predictions for five ligands ranging in affinity from 7 nM to > 200 μM for the immunophilin protein FKBP12, for expedited results in cases where experimental structures are difficult to produce. Our approach goes beyond single, low energy ligand poses to give quantitative kinetic information that can inform protein engineering and ligand design.
Kirchberg, Kristina; Kim, Tai-Yang; Möller, Martina; Skegro, Darko; Dasara Raju, Gayathri; Granzin, Joachim; Büldt, Georg; Schlesinger, Ramona; Alexiev, Ulrike
2011-11-15
Arrestins are regulatory molecules for G-protein coupled receptor function. In visual rhodopsin, selective binding of arrestin to the cytoplasmic side of light-activated, phosphorylated rhodopsin (P-Rh*) terminates signaling via the G-protein transducin. While the "phosphate-sensor" of arrestin for the recognition of receptor-attached phosphates is identified, the molecular mechanism of arrestin binding and the involvement of receptor conformations in this process are still largely hypothetic. Here we used fluorescence pump-probe and time-resolved fluorescence depolarization measurements to investigate the kinetics of arrestin conformational changes and the corresponding nanosecond dynamical changes at the receptor surface. We show that at least two sequential conformational changes of arrestin occur upon interaction with P-Rh*, thus providing a kinetic proof for the suggested multistep nature of arrestin binding. At the cytoplasmic surface of P-Rh*, the structural dynamics of the amphipathic helix 8 (H8), connecting transmembrane helix 7 and the phosphorylated C-terminal tail, depends on the arrestin interaction state. We find that a high mobility of H8 is required in the low-affinity (prebinding) but not in the high-affinity binding state. High-affinity arrestin binding is inhibited when a bulky, inflexible group is bound to H8, indicating close interaction. We further show that this close steric interaction of H8 with arrestin is mandatory for the transition from prebinding to high-affinity binding; i.e., for arrestin activation. This finding implies a regulatory role for H8 in activation of visual arrestin, which shows high selectivity to P-Rh* in contrast to the broad receptor specificity displayed by the two nonvisual arrestins.
Kirchberg, Kristina; Kim, Tai-Yang; Möller, Martina; Skegro, Darko; Dasara Raju, Gayathri; Granzin, Joachim; Büldt, Georg; Schlesinger, Ramona; Alexiev, Ulrike
2011-01-01
Arrestins are regulatory molecules for G-protein coupled receptor function. In visual rhodopsin, selective binding of arrestin to the cytoplasmic side of light-activated, phosphorylated rhodopsin (P-Rh*) terminates signaling via the G-protein transducin. While the “phosphate-sensor” of arrestin for the recognition of receptor-attached phosphates is identified, the molecular mechanism of arrestin binding and the involvement of receptor conformations in this process are still largely hypothetic. Here we used fluorescence pump-probe and time-resolved fluorescence depolarization measurements to investigate the kinetics of arrestin conformational changes and the corresponding nanosecond dynamical changes at the receptor surface. We show that at least two sequential conformational changes of arrestin occur upon interaction with P-Rh*, thus providing a kinetic proof for the suggested multistep nature of arrestin binding. At the cytoplasmic surface of P-Rh*, the structural dynamics of the amphipathic helix 8 (H8), connecting transmembrane helix 7 and the phosphorylated C-terminal tail, depends on the arrestin interaction state. We find that a high mobility of H8 is required in the low-affinity (prebinding) but not in the high-affinity binding state. High-affinity arrestin binding is inhibited when a bulky, inflexible group is bound to H8, indicating close interaction. We further show that this close steric interaction of H8 with arrestin is mandatory for the transition from prebinding to high-affinity binding; i.e., for arrestin activation. This finding implies a regulatory role for H8 in activation of visual arrestin, which shows high selectivity to P-Rh* in contrast to the broad receptor specificity displayed by the two nonvisual arrestins. PMID:22039220
Max-E47, a Designed Minimalist Protein that Targets the E-Box DNA Site In Vivo and In Vitro
Xu, Jing; Chen, Gang; De Jong, Antonia T.; Shahravan, S. Hesam; Shin, Jumi A.
2009-01-01
Max-E47 is a designed hybrid protein comprising the Max DNA-binding basic region and E47 HLH dimerization subdomain. In the yeast one-hybrid system (Y1H), Max-E47 shows strong transcriptional activation from the E-box site, 5'-CACGTG, targeted by the Myc/Max/Mad network of transcription factors; two mutants, Max-E47Y and Max-E47YF, activate more weakly from the E-box in the Y1H. Quantitative fluorescence anisotropy titrations to gain free energies of protein:DNA binding gave low nM Kd values for the native MaxbHLHZ, Max-E47, and the Y and YF mutants binding to the E-box site (14 nM, 15 nM, 9 nM, and 6 nM, respectively), with no detectable binding to a nonspecific control duplex. Because these minimalist, E-box-binding hybrids have no activation domain and no interactions with the c-MycbHLHZ, as shown by the yeast two-hybrid assay, they can potentially serve as dominant-negative inhibitors that suppress activation of E-box-responsive genes targeted by transcription factors including the c-Myc/Max complex. As proof-of-principle, we used our modified Y1H, which allows direct competition between two proteins vying for a DNA target, to show that Max-E47 effectively outcompetes the native MaxbHLHZ for the E-box; weaker competition is observed from the two mutants, consistent with Y1H results. These hybrids provide a minimalist scaffold for further exploration of the relationship between protein structure and DNA-binding function and may have applications as protein therapeutics or biochemical probes capable of targeting the E-box site. PMID:19449889
Interactions," Journal of Biomolecular Structure & Dynamics (2009) "Structure-Based Protocol for from left to right with several dots of multiple colors. "Cellulase Linkers Are Optimized Based on the Sequence and Structure of a Protein-Binding Peptide," Journal of the American Chemical
NASA Astrophysics Data System (ADS)
Aung, Khin Moh Moh; Lim, Michelle Gek Liang; Hong, Shuzhen; Cheung, Edwin; Su, Xiaodi
Forkhead box protein 1 (FoxA1) is a member of the forkhead family of winged-helix transcription factors. It plays crucial roles in the development and differentiation of multiple organs and in the regulation of estrogen-stimulated genes. In this study, in order to determine the regions of FoxA1 necessary for efficient Deoxyribonucleic Acid (DNA) binding, we cloned, expressed and purified a series of FoxA1 constructs that contain either the DNA Binding Domain (DBD), the Transcription Activation Domain (TAD), or both. We determined the DNA binding behavior of these constructs using traditional electrophoretic mobility shift assay (EMSA) and a recently developed gold nanoparticles (AuNPs)-based fast screening method. We conclude that just the DBD region alone is not sufficient for protein-DNA binding activity. Amino acids flanking the upstream of the DBD region are required for maximal DNA binding activity. Through this study, we have also further validated the AuNPs assay for its generality and expanded the existing protocol for comparing the DNA binding behavior of multiple proteins of different charge properties and molecular weights.
Rosetta:MSF: a modular framework for multi-state computational protein design.
Löffler, Patrick; Schmitz, Samuel; Hupfeld, Enrico; Sterner, Reinhard; Merkl, Rainer
2017-06-01
Computational protein design (CPD) is a powerful technique to engineer existing proteins or to design novel ones that display desired properties. Rosetta is a software suite including algorithms for computational modeling and analysis of protein structures and offers many elaborate protocols created to solve highly specific tasks of protein engineering. Most of Rosetta's protocols optimize sequences based on a single conformation (i. e. design state). However, challenging CPD objectives like multi-specificity design or the concurrent consideration of positive and negative design goals demand the simultaneous assessment of multiple states. This is why we have developed the multi-state framework MSF that facilitates the implementation of Rosetta's single-state protocols in a multi-state environment and made available two frequently used protocols. Utilizing MSF, we demonstrated for one of these protocols that multi-state design yields a 15% higher performance than single-state design on a ligand-binding benchmark consisting of structural conformations. With this protocol, we designed de novo nine retro-aldolases on a conformational ensemble deduced from a (βα)8-barrel protein. All variants displayed measurable catalytic activity, testifying to a high success rate for this concept of multi-state enzyme design.
Rosetta:MSF: a modular framework for multi-state computational protein design
Hupfeld, Enrico; Sterner, Reinhard
2017-01-01
Computational protein design (CPD) is a powerful technique to engineer existing proteins or to design novel ones that display desired properties. Rosetta is a software suite including algorithms for computational modeling and analysis of protein structures and offers many elaborate protocols created to solve highly specific tasks of protein engineering. Most of Rosetta’s protocols optimize sequences based on a single conformation (i. e. design state). However, challenging CPD objectives like multi-specificity design or the concurrent consideration of positive and negative design goals demand the simultaneous assessment of multiple states. This is why we have developed the multi-state framework MSF that facilitates the implementation of Rosetta’s single-state protocols in a multi-state environment and made available two frequently used protocols. Utilizing MSF, we demonstrated for one of these protocols that multi-state design yields a 15% higher performance than single-state design on a ligand-binding benchmark consisting of structural conformations. With this protocol, we designed de novo nine retro-aldolases on a conformational ensemble deduced from a (βα)8-barrel protein. All variants displayed measurable catalytic activity, testifying to a high success rate for this concept of multi-state enzyme design. PMID:28604768
NASA Astrophysics Data System (ADS)
Samkoe, Kimberley S.; Schultz, Emily; Park, Yeonjae; Fischer, Dawn; Pogue, Brian W.; Smith, Kerrington; Tichauer, Kenneth M.; Gibbs, Summer L.
2017-02-01
Pancreatic ductal adenocarcinomas (PDAC) are notoriously difficult to treat and in general, molecular targeted therapies have failed even when the targeted protein is overexpressed in the tumor tissue. Genetic mutations in extracellular receptors and downstream signaling proteins (i.e., RAS signaling pathway) and convoluted intracellular cross-talk between cell signaling pathways are likely reasons that these promising therapies fail. Monitoring the complex relationship between intracellular protein signaling is difficult and to-date, standard techniques that are used (Western blot, flow cytometry, immunohistochemistry, etc.) are invasive, static and do not accurately represent in vivo structure-function relationships. Here, we describe the development of an in ovo avatar using patient derived tumors grown on the chicken chorioallantoic membrane (CAM) and the novel fluorescence-based Quantitative Protein Expression Tracking (QUIET) methodology to bridge the gap between oncology, genomics and patient outcomes. Previously developed paired-agent imaging, was extended to a three-compartment model system in QUIET, which utilizes three types of imaging agents: novel fluorophore conjugated cell permeable targeted and untargeted small molecule paired-agents, in addition to a tumor perfusion agent that is not cell membrane permeable. We have demonstrated the ability to quantify the intracellular binding domain of a trans-membrane protein in vitro using cell permeable fluorescent agents (erlotinib-TRITC and control isotype-BODIPY FL). In addition, we have demonstrated imaging protocols to simultaneously image up to 6 spectrally distinct organic fluorophores in in ovo avatars using the Nuance EX (Perkin Elmer) and established proof-of-principle intracellular and extracellular protein concentrations of epidermal growth factor receptor using QUIET and traditional paired-agent imaging.
Cooper, Ian R; Illsley, Matthew; Korobeinyk, Alina V; Whitby, Raymond L D
2015-04-01
The purpose of this work was proof of concept to develop a novel, cost effective protocol for the binding of bacteriophages to a surface without loss of function, after storage in various media. The technology platform involved covalently bonding bacteriophage 13 (a Pseudomonas aeruginosa bacteriophage) to two magnetised multiwalled carbon nanotube scaffolds using a series of buffers; bacteriophage-nanotube (B-N) conjugates were efficacious after storage at 20 °C for six weeks. B-N conjugates were added to human cell culture in vitro for 9 days without causing necrosis and apoptosis. B-N conjugates were frozen (-20 °C) in cell culture media for several weeks, after which recovery from the human cell culture medium was possible using a simple magnetic separation technique. The retention of viral infective potential was demonstrated by subsequent spread plating onto lawns of susceptible P. aeruginosa. Analysis of the human cell culture medium revealed the production of interleukins by the human fibroblasts upon exposure to the bacteriophage. One day after exposure, IL-8 levels transitorily increased between 60 and 100 pg/mL, but this level was not found on any subsequent days, suggesting an initial but not long lasting response. This paper outlines the development of a method to deliver antimicrobial activity to a surface that is small enough to be combined with other materials. To our knowledge at time of publication, this is the first report of magnetically coupled bacteriophages specific to human pathogens which can be recovered from test systems, and could represent a novel means to conditionally deploy antibacterial agents into living eukaryotic systems without the risks of some antibiotic therapies. Copyright © 2015. Published by Elsevier B.V.
Gillotin, Sébastien; Guillemot, François
2016-06-20
Chromatin immunoprecipitation followed by deep sequencing (ChIP-Seq) is an important strategy to study gene regulation. When availability of cells is limited, however, it can be useful to focus on specific genes to investigate in depth the role of transcription factors or histone marks. Unfortunately, performing ChIP experiments to study transcription factors' binding to DNA can be difficult when biological material is restricted. This protocol describes a robust method to perform μChIP for over-expressed or endogenous transcription factors using ~100,000 cells per ChIP experiment (Masserdotti et al ., 2015). We also describe optimization steps, which we think are critical for this protocol to work and which can be used to further reduce the number of cells.
Initial Characterization of Optical Communications with Disruption-Tolerant Network Protocols
NASA Technical Reports Server (NTRS)
Schoolcraft, Joshua; Wilson, Keith
2011-01-01
Disruption-tolerant networks (DTNs) are groups of network assets connected with a suite of communication protocol technologies designed to mitigate the effects of link delay and disruption. Application of DTN protocols to diverse groups of network resources in multiple sub-networks results in an overlay network-of-networks with autonomous data routing capability. In space environments where delay or disruption is expected, performance of this type of architecture (such as an interplanetary internet) can increase with the inclusion of new communications mediums and techniques. Space-based optical communication links are therefore an excellent building block of space DTN architectures. When compared to traditional radio frequency (RF) communications, optical systems can provide extremely power-efficient and high bandwidth links bridging sub-networks. Because optical links are more susceptible to link disruption and experience the same light-speed delays as RF, optical-enabled DTN architectures can lessen potential drawbacks and maintain the benefits of autonomous optical communications over deep space distances. These environment-driven expectations - link delay and interruption, along with asymmetric data rates - are the purpose of the proof-of-concept experiment outlined herein. In recognizing the potential of these two technologies, we report an initial experiment and characterization of the performance of a DTN-enabled space optical link. The experiment design employs a point-to-point free-space optical link configured to have asymmetric bandwidth. This link connects two networked systems running a DTN protocol implementation designed and written at JPL for use on spacecraft, and further configured for higher bandwidth performance. Comparing baseline data transmission metrics with and without periodic optical link interruptions, the experiment confirmed the DTN protocols' ability to handle real-world unexpected link outages while maintaining capability of reliably delivering data at relatively high rates. Finally, performance characterizations from this data suggest performance optimizations to configuration and protocols for future optical-specific DTN space link scenarios.
Khairnar, Amit; Latta, Peter; Drazanova, Eva; Ruda-Kucerova, Jana; Szabó, Nikoletta; Arab, Anas; Hutter-Paier, Birgit; Havas, Daniel; Windisch, Manfred; Sulcova, Alexandra; Starcuk, Zenon; Rektorova, Irena
2015-11-01
Evidence suggests that accumulation and aggregation of α-synuclein contribute to the pathogenesis of Parkinson's disease (PD). The aim of this study was to evaluate whether diffusion kurtosis imaging (DKI) will provide a sensitive tool for differentiating between α-synuclein-overexpressing transgenic mouse model of PD (TNWT-61) and wild-type (WT) littermates. This experiment was designed as a proof-of-concept study and forms a part of a complex protocol and ongoing translational research. Nine-month-old TNWT-61 mice and age-matched WT littermates underwent behavioral tests to monitor motor impairment and MRI scanning using 9.4 Tesla system in vivo. Tract-based spatial statistics (TBSS) and the DKI protocol were used to compare the whole brain white matter of TNWT-61 and WT mice. In addition, region of interest (ROI) analysis was performed in gray matter regions such as substantia nigra, striatum, hippocampus, sensorimotor cortex, and thalamus known to show higher accumulation of α-synuclein. For the ROI analysis, both DKI (6 b-values) protocol and conventional (2 b-values) diffusion tensor imaging (cDTI) protocol were used. TNWT-61 mice showed significant impairment of motor coordination. With the DKI protocol, mean, axial, and radial kurtosis were found to be significantly elevated, whereas mean and radial diffusivity were decreased in the TNWT-61 group compared to that in the WT controls with both TBSS and ROI analysis. With the cDTI protocol, the ROI analysis showed decrease in all diffusivity parameters in TNWT-61 mice. The current study provides evidence that DKI by providing both kurtosis and diffusivity parameters gives unique information that is complementary to cDTI for in vivo detection of pathological changes that underlie PD-like symptomatology in TNWT-61 mouse model of PD. This result is a crucial step in search for a candidate diagnostic biomarker with translational potential and relevance for human studies.
Rajamanikandan, Sundaraj; Jeyakanthan, Jeyaraman; Srinivasan, Pappu
2017-01-01
Quorum sensing (QS) plays an important role in the biofilm formation, production of virulence factors and stress responses in Vibrio harveyi. Therefore, interrupting QS is a possible approach to modulate bacterial behavior. In the present study, three docking protocols, such as Rigid Receptor Docking (RRD), Induced Fit Docking (IFD), and Quantum Polarized Ligand Docking (QPLD) were used to elucidate the binding mode of boronic acid derivatives into the binding pocket of LuxP protein in V. harveyi. Among the three docking protocols, IFD accurately predicted the correct binding mode of the studied inhibitors. Molecular dynamics (MD) simulations of the protein-ligand complexes indicates that the inter-molecular hydrogen bonds formed between the protein and ligand complex remains stable during the simulation time. Pharmacophore and shape-based virtual screening were performed to find selective and potent compounds from ChemBridge database. Five hit compounds were selected and subjected to IFD and MD simulations to validate the binding mode. In addition, enrichment calculation was performed to discriminate and separate active compounds from the inactive compounds. Based on the computational studies, the potent Bicyclo [2.2.1] hept-5-ene-2,3-dicarboxylic acid-2,6-dimethylpyridine 1-oxide (ChemBridge_5144368) was selected for in vitro assays. The compound exhibited dose dependent inhibition in bioluminescence and also inhibits biofilm formation in V. harveyi to the level of 64.25 %. The result from the study suggests that ChemBridge_5144368 could serve as an anti-quorum sensing molecule for V. harveyi.
Freeman, Sara M; Inoue, Kiyoshi; Smith, Aaron L; Goodman, Mark M; Young, Larry J
2014-07-01
The rhesus macaque (Macaca mulatta) is an important primate model for social cognition, and recent studies have begun to explore the impact of oxytocin on social cognition and behavior. Macaques have great potential for elucidating the neural mechanisms by which oxytocin modulates social cognition, which has implications for oxytocin-based pharmacotherapies for psychiatric disorders such as autism and schizophrenia. Previous attempts to localize oxytocin receptors (OXTR) in the rhesus macaque brain have failed due to reduced selectivity of radioligands, which in primates bind to both OXTR and the structurally similar vasopressin 1a receptor (AVPR1A). We have developed a pharmacologically-informed competitive binding autoradiography protocol that selectively reveals OXTR and AVPR1A binding sites in primate brain sections. Using this protocol, we describe the neuroanatomical distribution of OXTR in the macaque. Finally, we use in situ hybridization to localize OXTR mRNA. Our results demonstrate that OXTR expression in the macaque brain is much more restricted than AVPR1A. OXTR is largely limited to the nucleus basalis of Meynert, pedunculopontine tegmental nucleus, the superficial gray layer of the superior colliculus, the trapezoid body, and the ventromedial hypothalamus. These regions are involved in a variety of functions relevant to social cognition, including modulating visual attention, processing auditory and multimodal sensory stimuli, and controlling orienting responses to visual stimuli. These results provide insights into the neural mechanisms by which oxytocin modulates social cognition and behavior in this species, which, like humans, uses vision and audition as the primary modalities for social communication. Copyright © 2014 Elsevier Ltd. All rights reserved.
Freeman, Sara M.; Inoue, Kiyoshi; Smith, Aaron L.; Goodman, Mark M.; Young, Larry J.
2014-01-01
The rhesus macaque (Macaca mulatta) is an important primate model for social cognition, and recent studies have begun to explore the impact of oxytocin on social cognition and behavior. Macaques have great potential for elucidating the neural mechanisms by which oxytocin modulates social cognition, which has implications for oxytocin-based pharmacotherapies for psychiatric disorders such as autism and schizophrenia. Previous attempts to localize oxytocin receptors (OXTR) in the rhesus macaque brain have failed due to reduced selectivity of radioligands, which in primates bind to both OXTR and the structurally similar vasopressin 1a receptor (AVPR1A). We have developed a pharmacologically-informed competitive binding autoradiography protocol that selectively reveals OXTR and AVPR1A binding sites in primate brain sections. Using this protocol, we describe the neuroanatomical distribution of OXTR in the macaque. Finally, we use in situ hybridization to localize OXTR mRNA. Our results demonstrate that OXTR expression in the macaque brain is much more restricted than AVPR1A. OXTR is largely limited to the nucleus basalis of Meynert, pedunculopontine tegmental nucleus, the superficial gray layer of the superior colliculus, the trapezoid body, and the ventromedial hypothalamus. These regions are involved in a variety of functions relevant to social cognition, including modulating visual attention, processing auditory and multimodal sensory stimuli, and controlling orienting responses to visual stimuli. These results provide insights into the neural mechanisms by which oxytocin modulates social cognition and behavior in this species, which, like humans, uses vision and audition as the primary modalities for social communication. PMID:24845184
Kuenemann, Mélaine A; Labbé, Céline M; Cerdan, Adrien H; Sperandio, Olivier
2016-04-01
Protein-protein interactions (PPIs) play vital roles in life and provide new opportunities for therapeutic interventions. In this large data analysis, 3,300 inhibitors of PPIs (iPPIs) were compared to 17 reference datasets of collectively ~566,000 compounds (including natural compounds, existing drugs, active compounds on conventional targets, etc.) using a chemoinformatics approach. Using this procedure, we showed that comparable classes of PPI targets can be formed using either the similarity of their ligands or the shared properties of their binding cavities, constituting a proof-of-concept that not only can binding pockets be used to group PPI targets, but that these pockets certainly condition the properties of their corresponding ligands. These results demonstrate that matching regions in both chemical space and target space can be found. Such identified classes of targets could lead to the design of PPI-class-specific chemical libraries and therefore facilitate the development of iPPIs to the stage of drug candidates.
Discovery of Phosphodiesterase 10A (PDE10A) PET Tracer AMG 580 to Support Clinical Studies.
Hu, Essa; Chen, Ning; Kunz, Roxanne K; Hwang, Dah-Ren; Michelsen, Klaus; Davis, Carl; Ma, Ji; Shi, Jianxia; Lester-Zeiner, Dianna; Hungate, Randall; Treanor, James; Chen, Hang; Allen, Jennifer R
2016-07-14
We report the discovery of PDE10A PET tracer AMG 580 developed to support proof of concept studies with PDE10A inhibitors in the clinic. To find a tracer with higher binding potential (BPND) in NHP than our previously reported tracer 1, we implemented a surface plasmon resonance assay to measure the binding off-rate to identify candidates with slower washout rate in vivo. Five candidates (2-6) from two structurally distinct scaffolds were identified that possessed both the in vitro characteristics that would favor central penetration and the structural features necessary for PET isotope radiolabeling. Two cinnolines (2, 3) and one keto-benzimidazole (5) exhibited PDE10A target specificity and brain uptake comparable to or better than 1 in the in vivo LC-MS/MS kinetics distribution study in SD rats. In NHP PET imaging study, [(18)F]-5 produced a significantly improved BPND of 3.1 and was nominated as PDE10A PET tracer clinical candidate for further studies.
Targeted inhibition of mutant IDH2 in leukemia cells induces cellular differentiation.
Wang, Fang; Travins, Jeremy; DeLaBarre, Byron; Penard-Lacronique, Virginie; Schalm, Stefanie; Hansen, Erica; Straley, Kimberly; Kernytsky, Andrew; Liu, Wei; Gliser, Camelia; Yang, Hua; Gross, Stefan; Artin, Erin; Saada, Veronique; Mylonas, Elena; Quivoron, Cyril; Popovici-Muller, Janeta; Saunders, Jeffrey O; Salituro, Francesco G; Yan, Shunqi; Murray, Stuart; Wei, Wentao; Gao, Yi; Dang, Lenny; Dorsch, Marion; Agresta, Sam; Schenkein, David P; Biller, Scott A; Su, Shinsan M; de Botton, Stephane; Yen, Katharine E
2013-05-03
A number of human cancers harbor somatic point mutations in the genes encoding isocitrate dehydrogenases 1 and 2 (IDH1 and IDH2). These mutations alter residues in the enzyme active sites and confer a gain-of-function in cancer cells, resulting in the accumulation and secretion of the oncometabolite (R)-2-hydroxyglutarate (2HG). We developed a small molecule, AGI-6780, that potently and selectively inhibits the tumor-associated mutant IDH2/R140Q. A crystal structure of AGI-6780 complexed with IDH2/R140Q revealed that the inhibitor binds in an allosteric manner at the dimer interface. The results of steady-state enzymology analysis were consistent with allostery and slow-tight binding by AGI-6780. Treatment with AGI-6780 induced differentiation of TF-1 erythroleukemia and primary human acute myelogenous leukemia cells in vitro. These data provide proof-of-concept that inhibitors targeting mutant IDH2/R140Q could have potential applications as a differentiation therapy for cancer.
Inhibition of CDC25B Phosphatase Through Disruption of Protein–Protein Interaction
Lund, George; Dudkin, Sergii; Borkin, Dmitry; ...
2014-11-25
CDC25 phosphatases are key cell cycle regulators and represent very attractive but challenging targets for anticancer drug discovery. Here in this paper, we explored whether fragment-based screening represents a valid approach to identify inhibitors of CDC25B. This resulted in identification of 2-fluoro-4-hydroxybenzonitrile, which directly binds to the catalytic domain of CDC25B. Interestingly, NMR data and the crystal structure demonstrate that this compound binds to the pocket distant from the active site and adjacent to the protein–protein interaction interface with CDK2/Cyclin A substrate. Furthermore, we developed a more potent analogue that disrupts CDC25B interaction with CDK2/Cyclin A and inhibits dephosphorylation ofmore » CDK2. Based on these studies, we provide a proof of concept that targeting CDC25 phosphatases by inhibiting their protein–protein interactions with CDK2/Cyclin A substrate represents a novel, viable opportunity to target this important class of enzymes.« less
Han, Le; Pandian, Ganesh N; Chandran, Anandhakumar; Sato, Shinsuke; Taniguchi, Junichi; Kashiwazaki, Gengo; Sawatani, Yoshito; Hashiya, Kaori; Bando, Toshikazu; Xu, Yufang; Qian, Xuhong; Sugiyama, Hiroshi
2015-07-20
Synthetic dual-function ligands targeting specific DNA sequences and histone-modifying enzymes were applied to achieve regulatory control over multi-gene networks in living cells. Unlike the broad array of targeting small molecules for histone deacetylases (HDACs), few modulators are known for histone acetyltransferases (HATs), which play a central role in transcriptional control. As a novel chemical approach to induce selective HAT-regulated genes, we conjugated a DNA-binding domain (DBD) "I" to N-(4-chloro-3-trifluoromethyl-phenyl)-2-ethoxy-benzamide (CTB), an artificial HAT activator. In vitro enzyme activity assays and microarray studies were used to demonstrate that distinct functional small molecules could be transformed to have identical bioactivity when conjugated with a targeting DBD. This proof-of-concept synthetic strategy validates the switchable functions of HDACs and HATs in gene regulation and provides a molecular basis for developing versatile bioactive ligands. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
TRACTOR_DB: a database of regulatory networks in gamma-proteobacterial genomes
González, Abel D.; Espinosa, Vladimir; Vasconcelos, Ana T.; Pérez-Rueda, Ernesto; Collado-Vides, Julio
2005-01-01
Experimental data on the Escherichia coli transcriptional regulatory system has been used in the past years to predict new regulatory elements (promoters, transcription factors (TFs), TFs' binding sites and operons) within its genome. As more genomes of gamma-proteobacteria are being sequenced, the prediction of these elements in a growing number of organisms has become more feasible, as a step towards the study of how different bacteria respond to environmental changes at the level of transcriptional regulation. In this work, we present TRACTOR_DB (TRAnscription FaCTORs' predicted binding sites in prokaryotic genomes), a relational database that contains computational predictions of new members of 74 regulons in 17 gamma-proteobacterial genomes. For these predictions we used a comparative genomics approach regarding which several proof-of-principle articles for large regulons have been published. TRACTOR_DB may be currently accessed at http://www.bioinfo.cu/Tractor_DB, http://www.tractor.lncc.br/ or at http://www.cifn.unam.mx/Computational_Genomics/tractorDB. Contact Email id is tractor@cifn.unam.mx. PMID:15608293
Multiplexed biomimetic lipid membranes on graphene by dip-pen nanolithography
Hirtz, Michael; Oikonomou, Antonios; Georgiou, Thanasis; Fuchs, Harald; Vijayaraghavan, Aravind
2013-01-01
The application of graphene in sensor devices depends on the ability to appropriately functionalize the pristine graphene. Here we show the direct writing of tailored phospholipid membranes on graphene using dip-pen nanolithography. Phospholipids exhibit higher mobility on graphene compared with the commonly used silicon dioxide substrate, leading to well-spread uniform membranes. Dip-pen nanolithography allows for multiplexed assembly of phospholipid membranes of different functionalities in close proximity to each other. The membranes are stable in aqueous environments and we observe electronic doping of graphene by charged phospholipids. On the basis of these results, we propose phospholipid membranes as a route for non-covalent immobilization of various functional groups on graphene for applications in biosensing and biocatalysis. As a proof of principle, we demonstrate the specific binding of streptavidin to biotin-functionalized membranes. The combination of atomic force microscopy and binding experiments yields a consistent model for the layer organization within phospholipid stacks on graphene. PMID:24107937
Isolation of monomeric photosystem II that retains the subunit PsbS.
Haniewicz, Patrycja; De Sanctis, Daniele; Büchel, Claudia; Schröder, Wolfgang P; Loi, Maria Cecilia; Kieselbach, Thomas; Bochtler, Matthias; Piano, Dario
2013-12-01
Photosystem II has been purified from a transplastomic strain of Nicotiana tabacum according to two different protocols. Using the procedure described in Piano et al. (Photosynth Res 106:221-226, 2010) it was possible to isolate highly active PSII composed of monomers and dimers but depleted in their PsbS protein content. A "milder" procedure than the protocol reported by Fey et al. (Biochim Biophys Acta 1777:1501-1509, 2008) led to almost exclusively monomeric PSII complexes which in part still bind the PsbS protein. This finding might support a role for PSII monomers in higher plants.
Cell-specific targeting by heterobivalent ligands.
Josan, Jatinder S; Handl, Heather L; Sankaranarayanan, Rajesh; Xu, Liping; Lynch, Ronald M; Vagner, Josef; Mash, Eugene A; Hruby, Victor J; Gillies, Robert J
2011-07-20
Current cancer therapies exploit either differential metabolism or targeting to specific individual gene products that are overexpressed in aberrant cells. The work described herein proposes an alternative approach--to specifically target combinations of cell-surface receptors using heteromultivalent ligands ("receptor combination approach"). As a proof-of-concept that functionally unrelated receptors can be noncovalently cross-linked with high avidity and specificity, a series of heterobivalent ligands (htBVLs) were constructed from analogues of the melanocortin peptide ligand ([Nle(4), dPhe(7)]-α-MSH) and the cholecystokinin peptide ligand (CCK-8). Binding of these ligands to cells expressing the human Melanocortin-4 receptor and the Cholecystokinin-2 receptor was analyzed. The MSH(7) and CCK(6) were tethered with linkers of varying rigidity and length, constructed from natural and/or synthetic building blocks. Modeling data suggest that a linker length of 20-50 Å is needed to simultaneously bind these two different G-protein coupled receptors (GPCRs). These ligands exhibited up to 24-fold enhancement in binding affinity to cells that expressed both (bivalent binding), compared to cells with only one (monovalent binding) of the cognate receptors. The htBVLs had up to 50-fold higher affinity than that of a monomeric CCK ligand, i.e., Ac-CCK(6)-NH(2). Cell-surface targeting of these two cell types with labeled heteromultivalent ligand demonstrated high avidity and specificity, thereby validating the receptor combination approach. This ability to noncovalently cross-link heterologous receptors and target individual cells using a receptor combination approach opens up new possibilities for specific cell targeting in vivo for therapy or imaging.
Cell-Specific Targeting by Heterobivalent Ligands
Josan, Jatinder S.; Handl, Heather L.; Sankaranarayanan, Rajesh; Xu, Liping; Lynch, Ronald M.; Vagner, Josef; Mash, Eugene A.; Hruby, Victor J.; Gillies, Robert J.
2012-01-01
Current cancer therapies exploit either differential metabolism or targeting to specific individual gene products that are overexpressed in aberrant cells. The work described herein proposes an alternative approach—to specifically target combinations of cell-surface receptors using heteromultivalent ligands (“receptor combination approach”). As a proof-of-concept that functionally unrelated receptors can be noncovalently cross-linked with high avidity and specificity, a series of heterobivalent ligands (htBVLs) were constructed from analogues of the melanocortin peptide ligand ([Nle4, DPhe7]-α-MSH) and the cholecystokinin peptide ligand (CCK-8). Binding of these ligands to cells expressing the human Melanocortin-4 receptor and the Cholecystokinin-2 receptor was analyzed. The MSH(7) and CCK(6) were tethered with linkers of varying rigidity and length, constructed from natural and/or synthetic building blocks. Modeling data suggest that a linker length of 20–50 Å is needed to simultaneously bind these two different G-protein coupled receptors (GPCRs). These ligands exhibited up to 24-fold enhancement in binding affinity to cells that expressed both (bivalent binding), compared to cells with only one (monovalent binding) of the cognate receptors. The htBVLs had up to 50-fold higher affinity than that of a monomeric CCK ligand, i.e., Ac-CCK(6)-NH2. Cell-surface targeting of these two cell types with labeled heteromultivalent ligand demonstrated high avidity and specificity, thereby validating the receptor combination approach. This ability to noncovalently cross-link heterologous receptors and target individual cells using a receptor combination approach opens up new possibilities for specific cell targeting in vivo for therapy or imaging. PMID:21639139
Immobilized OBOC combinatorial bead array to facilitate multiplicative screening.
Xiao, Wenwu; Bononi, Fernanda C; Townsend, Jared; Li, Yuanpei; Liu, Ruiwu; Lam, Kit S
2013-07-01
One-bead-one-compound (OBOC) combinatorial library screening has been broadly utilized for the last two decades to identify small molecules, peptides or peptidomimetics targeting variable screening probes such as cell surface receptors, bacteria, protein kinases, phosphatases, proteases etc. In previous screening methods, library beads were suspended in solution and screened against one single probe. Only the positive beads were tracked and isolated for additional screens and finally selected for chemical decoding. During this process, the remaining negative beads were not tracked and discarded. Here we report a novel bead immobilization method such that a bead library array can be conveniently prepared and screened in its entirety, sequentially many times with a series of distinct probes. This method not only allows us to increase the screening efficiency but also permits us to determine the binding profile of each and every library bead against a large number of target receptors. As proof of concept, we serially screened a random OBOC disulfide containing cyclic heptapeptide library with three water soluble dyes as model probes: malachite green, bromocresol purple and indigo carmine. This multiplicative screening approach resulted in a rapid determination of the binding profile of each and every bead respective to each of the three dyes. Beads that interacted with malachite green only, bromocresol purple only, or both indigo carmine and bromocresol purple were isolated, and their peptide sequences were determined with microsequencer. Ultimately, the novel OBOC multiplicative screening approach could play a key role in the enhancement of existing on-bead assays such as whole cell binding, bacteria binding, protein binding, posttranslational modifications etc. with increased efficiency, capacity, and specificity.
Rzuczek, Suzanne G; Southern, Mark R; Disney, Matthew D
2015-12-18
There are many RNA targets in the transcriptome to which small molecule chemical probes and lead therapeutics are desired. However, identifying compounds that bind and modulate RNA function in cellulo is difficult. Although rational design approaches have been developed, they are still in their infancies and leave many RNAs "undruggable". In an effort to develop a small molecule library that is biased for binding RNA, we computationally identified "drug-like" compounds from screening collections that have favorable properties for binding RNA and for suitability as lead drugs. As proof-of-concept, this collection was screened for binding to and modulating the cellular dysfunction of the expanded repeating RNA (r(CUG)(exp)) that causes myotonic dystrophy type 1. Hit compounds bind the target in cellulo, as determined by the target identification approach Competitive Chemical Cross-Linking and Isolation by Pull-down (C-ChemCLIP), and selectively improve several disease-associated defects. The best compounds identified from our 320-member library are more potent in cellulo than compounds identified by high-throughput screening (HTS) campaigns against this RNA. Furthermore, the compound collection has a higher hit rate (9% compared to 0.01-3%), and the bioactive compounds identified are not charged; thus, RNA can be "drugged" with compounds that have favorable pharmacological properties. Finally, this RNA-focused small molecule library may serve as a useful starting point to identify lead "drug-like" chemical probes that affect the biological (dys)function of other RNA targets by direct target engagement.
Free-energy relationships in ion channels activated by voltage and ligand
Chowdhury, Sandipan
2013-01-01
Many ion channels are modulated by multiple stimuli, which allow them to integrate a variety of cellular signals and precisely respond to physiological needs. Understanding how these different signaling pathways interact has been a challenge in part because of the complexity of underlying models. In this study, we analyzed the energetic relationships in polymodal ion channels using linkage principles. We first show that in proteins dually modulated by voltage and ligand, the net free-energy change can be obtained by measuring the charge-voltage (Q-V) relationship in zero ligand condition and the ligand binding curve at highly depolarizing membrane voltages. Next, we show that the voltage-dependent changes in ligand occupancy of the protein can be directly obtained by measuring the Q-V curves at multiple ligand concentrations. When a single reference ligand binding curve is available, this relationship allows us to reconstruct ligand binding curves at different voltages. More significantly, we establish that the shift of the Q-V curve between zero and saturating ligand concentration is a direct estimate of the interaction energy between the ligand- and voltage-dependent pathway. These free-energy relationships were tested by numerical simulations of a detailed gating model of the BK channel. Furthermore, as a proof of principle, we estimate the interaction energy between the ligand binding and voltage-dependent pathways for HCN2 channels whose ligand binding curves at various voltages are available. These emerging principles will be useful for high-throughput mutagenesis studies aimed at identifying interaction pathways between various regulatory domains in a polymodal ion channel. PMID:23250866
Understanding Single-Stranded Telomere End Binding by an Essential Protein
2000-08-01
BioPharma Inc., 1885 33rd Street, Boulder, CO 80301 Traditional sequential medicinal chemistry methods have been augmented by combinatorial synthesis...on the same wells that were being analyzed in parallel by RP-HPLC/UV for purity. The sampling protocol for purity determination at Array BioPharma is
Symmetric Blind Information Reconciliation for Quantum Key Distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kiktenko, Evgeniy O.; Trushechkin, Anton S.; Lim, Charles Ci Wen
Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration ofmore » results of unsuccessful belief-propagation decodings.« less
Symmetric Blind Information Reconciliation for Quantum Key Distribution
Kiktenko, Evgeniy O.; Trushechkin, Anton S.; Lim, Charles Ci Wen; ...
2017-10-27
Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration ofmore » results of unsuccessful belief-propagation decodings.« less
NASA Astrophysics Data System (ADS)
Zhang, Sheng; Wang, Jian; Tang, Chao-Jing
2012-06-01
Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal particles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept-resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency.
PLQP & Company: Decidable Logics for Quantum Algorithms
NASA Astrophysics Data System (ADS)
Baltag, Alexandru; Bergfeld, Jort; Kishida, Kohei; Sack, Joshua; Smets, Sonja; Zhong, Shengyang
2014-10-01
We introduce a probabilistic modal (dynamic-epistemic) quantum logic PLQP for reasoning about quantum algorithms. We illustrate its expressivity by using it to encode the correctness of the well-known quantum search algorithm, as well as of a quantum protocol known to solve one of the paradigmatic tasks from classical distributed computing (the leader election problem). We also provide a general method (extending an idea employed in the decidability proof in Dunn et al. (J. Symb. Log. 70:353-359, 2005)) for proving the decidability of a range of quantum logics, interpreted on finite-dimensional Hilbert spaces. We give general conditions for the applicability of this method, and in particular we apply it to prove the decidability of PLQP.
Baseband-processed SS-TDMA communication system architecture and design concepts
NASA Technical Reports Server (NTRS)
Attwood, S.; Sabourin, D.
1982-01-01
The architecture and system design for a commercial satellite communications system planned for the 1990's was developed by Motorola for NASA's Lewis Research Center. The system provides data communications between individual users via trunking and customer premises service terminals utilizing a central switching satellite operating in a time-division multiple-access (TDMA) mode. The major elements of the design incorporating baseband processing include: demand-assigned multiple access reservation protocol, spectral utilization, system synchronization, modulation technique and forward error control implementation. Motorola's baseband processor design, which is being proven in a proof-of-concept advanced technology development, will perform data regeneration and message routing for individual users on-board the spacecraft.
Symmetric Blind Information Reconciliation for Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Kiktenko, E. O.; Trushechkin, A. S.; Lim, C. C. W.; Kurochkin, Y. V.; Fedorov, A. K.
2017-10-01
Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. The proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.
Agasti, Sarit S; Liong, Monty; Peterson, Vanessa M; Lee, Hakho; Weissleder, Ralph
2012-11-14
DNA barcoding is an attractive technology, as it allows sensitive and multiplexed target analysis. However, DNA barcoding of cellular proteins remains challenging, primarily because barcode amplification and readout techniques are often incompatible with the cellular microenvironment. Here we describe the development and validation of a photocleavable DNA barcode-antibody conjugate method for rapid, quantitative, and multiplexed detection of proteins in single live cells. Following target binding, this method allows DNA barcodes to be photoreleased in solution, enabling easy isolation, amplification, and readout. As a proof of principle, we demonstrate sensitive and multiplexed detection of protein biomarkers in a variety of cancer cells.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lu, Xun; Guanga, Gerald P; Wan, Cheng
2012-11-13
MafA is a proto-oncoprotein and is critical for insulin gene expression in pancreatic β-cells. Maf proteins belong to the AP1 superfamily of basic region-leucine zipper (bZIP) transcription factors. Residues in the basic helix and an ancillary N-terminal domain, the Extended Homology Region (EHR), endow maf proteins with unique DNA binding properties: binding a 13 bp consensus site consisting of a core AP1 site (TGACTCA) flanked by TGC sequences and binding DNA stably as monomers. To further characterize maf DNA binding, we determined the structure of a MafA–DNA complex. MafA forms base-specific hydrogen bonds with the flanking G –5C –4 andmore » central C 0/G 0 bases, but not with the core-TGA bases. However, in vitro binding studies utilizing a pulse–chase electrophoretic mobility shift assay protocol revealed that mutating either the core-TGA or flanking-TGC bases dramatically increases the binding off rate. Comparing the known maf structures, we propose that DNA binding specificity results from positioning the basic helix through unique phosphate contacts. The EHR does not contact DNA directly but stabilizes DNA binding by contacting the basic helix. Collectively, these results suggest a novel multistep DNA binding process involving a conformational change from contacting the core-TGA to contacting the flanking-TGC bases.« less
Mittal, Varun; Hung, Ling-Hong; Keswani, Jayant; Kristiyanto, Daniel; Lee, Sung Bong
2017-01-01
Abstract Background: Software container technology such as Docker can be used to package and distribute bioinformatics workflows consisting of multiple software implementations and dependencies. However, Docker is a command line–based tool, and many bioinformatics pipelines consist of components that require a graphical user interface. Results: We present a container tool called GUIdock-VNC that uses a graphical desktop sharing system to provide a browser-based interface for containerized software. GUIdock-VNC uses the Virtual Network Computing protocol to render the graphics within most commonly used browsers. We also present a minimal image builder that can add our proposed graphical desktop sharing system to any Docker packages, with the end result that any Docker packages can be run using a graphical desktop within a browser. In addition, GUIdock-VNC uses the Oauth2 authentication protocols when deployed on the cloud. Conclusions: As a proof-of-concept, we demonstrated the utility of GUIdock-noVNC in gene network inference. We benchmarked our container implementation on various operating systems and showed that our solution creates minimal overhead. PMID:28327936
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-01
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719
Directional freezing for the cryopreservation of adherent mammalian cells on a substrate
Braslavsky, Ido
2018-01-01
Successfully cryopreserving cells adhered to a substrate would facilitate the growth of a vital confluent cell culture after thawing while dramatically shortening the post-thaw culturing time. Herein we propose a controlled slow cooling method combining initial directional freezing followed by gradual cooling down to -80°C for robust preservation of cell monolayers adherent to a substrate. Using computer controlled cryostages we examined the effect of cooling rates and dimethylsulfoxide (DMSO) concentration on cell survival and established an optimal cryopreservation protocol. Experimental results show the highest post-thawing viability for directional ice growth at a speed of 30 μm/sec (equivalent to freezing rate of 3.8°C/min), followed by gradual cooling of the sample with decreasing rate of 0.5°C/min. Efficient cryopreservation of three widely used epithelial cell lines: IEC-18, HeLa, and Caco-2, provides proof-of-concept support for this new freezing protocol applied to adherent cells. This method is highly reproducible, significantly increases the post-thaw cell viability and can be readily applied for cryopreservation of cellular cultures in microfluidic devices. PMID:29447224
Experimental purification of two-atom entanglement.
Reichle, R; Leibfried, D; Knill, E; Britton, J; Blakestad, R B; Jost, J D; Langer, C; Ozeri, R; Seidelin, S; Wineland, D J
2006-10-19
Entanglement is a necessary resource for quantum applications--entanglement established between quantum systems at different locations enables private communication and quantum teleportation, and facilitates quantum information processing. Distributed entanglement is established by preparing an entangled pair of quantum particles in one location, and transporting one member of the pair to another location. However, decoherence during transport reduces the quality (fidelity) of the entanglement. A protocol to achieve entanglement 'purification' has been proposed to improve the fidelity after transport. This protocol uses separate quantum operations at each location and classical communication to distil high-fidelity entangled pairs from lower-fidelity pairs. Proof-of-principle experiments distilling entangled photon pairs have been carried out. However, these experiments obtained distilled pairs with a low probability of success and required destruction of the entangled pairs, rendering them unavailable for further processing. Here we report efficient and non-destructive entanglement purification with atomic quantum bits. Two noisy entangled pairs were created and distilled into one higher-fidelity pair available for further use. Success probabilities were above 35 per cent. The many applications of entanglement purification make it one of the most important techniques in quantum information processing.
Directional freezing for the cryopreservation of adherent mammalian cells on a substrate.
Bahari, Liat; Bein, Amir; Yashunsky, Victor; Braslavsky, Ido
2018-01-01
Successfully cryopreserving cells adhered to a substrate would facilitate the growth of a vital confluent cell culture after thawing while dramatically shortening the post-thaw culturing time. Herein we propose a controlled slow cooling method combining initial directional freezing followed by gradual cooling down to -80°C for robust preservation of cell monolayers adherent to a substrate. Using computer controlled cryostages we examined the effect of cooling rates and dimethylsulfoxide (DMSO) concentration on cell survival and established an optimal cryopreservation protocol. Experimental results show the highest post-thawing viability for directional ice growth at a speed of 30 μm/sec (equivalent to freezing rate of 3.8°C/min), followed by gradual cooling of the sample with decreasing rate of 0.5°C/min. Efficient cryopreservation of three widely used epithelial cell lines: IEC-18, HeLa, and Caco-2, provides proof-of-concept support for this new freezing protocol applied to adherent cells. This method is highly reproducible, significantly increases the post-thaw cell viability and can be readily applied for cryopreservation of cellular cultures in microfluidic devices.
Mittal, Varun; Hung, Ling-Hong; Keswani, Jayant; Kristiyanto, Daniel; Lee, Sung Bong; Yeung, Ka Yee
2017-04-01
Software container technology such as Docker can be used to package and distribute bioinformatics workflows consisting of multiple software implementations and dependencies. However, Docker is a command line-based tool, and many bioinformatics pipelines consist of components that require a graphical user interface. We present a container tool called GUIdock-VNC that uses a graphical desktop sharing system to provide a browser-based interface for containerized software. GUIdock-VNC uses the Virtual Network Computing protocol to render the graphics within most commonly used browsers. We also present a minimal image builder that can add our proposed graphical desktop sharing system to any Docker packages, with the end result that any Docker packages can be run using a graphical desktop within a browser. In addition, GUIdock-VNC uses the Oauth2 authentication protocols when deployed on the cloud. As a proof-of-concept, we demonstrated the utility of GUIdock-noVNC in gene network inference. We benchmarked our container implementation on various operating systems and showed that our solution creates minimal overhead. © The Authors 2017. Published by Oxford University Press.
A future-proof architecture for telemedicine using loose-coupled modules and HL7 FHIR.
Gøeg, Kirstine Rosenbeck; Rasmussen, Rune Kongsgaard; Jensen, Lasse; Wollesen, Christian Møller; Larsen, Søren; Pape-Haugaard, Louise Bilenberg
2018-07-01
Most telemedicine solutions are proprietary and disease specific which cause a heterogeneous and silo-oriented system landscape with limited interoperability. Solving the interoperability problem would require a strong focus on data integration and standardization in telemedicine infrastructures. Our objective was to suggest a future-proof architecture, that consisted of small loose-coupled modules to allow flexible integration with new and existing services, and the use of international standards to allow high re-usability of modules, and interoperability in the health IT landscape. We identified core features of our future-proof architecture as the following (1) To provide extended functionality the system should be designed as a core with modules. Database handling and implementation of security protocols are modules, to improve flexibility compared to other frameworks. (2) To ensure loosely coupled modules the system should implement an inversion of control mechanism. (3) A focus on ease of implementation requires the system should use HL7 FHIR (Fast Interoperable Health Resources) as the primary standard because it is based on web-technologies. We evaluated the feasibility of our architecture by developing an open source implementation of the system called ORDS. ORDS is written in TypeScript, and makes use of the Express Framework and HL7 FHIR DSTU2. The code is distributed on GitHub. All modules have been tested unit wise, but end-to-end testing awaits our first clinical example implementations. Our study showed that highly adaptable and yet interoperable core frameworks for telemedicine can be designed and implemented. Future work includes implementation of a clinical use case and evaluation. Copyright © 2018 Elsevier B.V. All rights reserved.
Palm, Ulrich; Keeser, Daniel; Hasan, Alkomiet; Kupka, Michael J.; Blautzik, Janusch; Sarubin, Nina; Kaymakanova, Filipa; Unger, Ina; Falkai, Peter; Meindl, Thomas; Ertl-Wagner, Birgit; Padberg, Frank
2016-01-01
Negative symptoms are highly relevant in the long-term course of schizophrenia and are an important target domain for the development of novel interventions. Recently, transcranial direct current stimulation (tDCS) of the prefrontal cortex has been investigated as a treatment option in schizophrenia. In this proof-of-concept study, 20 schizophrenia patients with predominantly negative symptoms were randomized to either 10 sessions of add-on active (2 mA, 20min) or sham tDCS (anode: left DLPFC/F3; cathode: right supraorbital/F4). Primary outcome measure was the change in the Scale for the Assessment of Negative Symptoms (SANS) sum score; secondary outcomes included reduction in Positive and Negative Syndrome Scale (PANSS) scores and improvement of depressive symptoms, cognitive processing speed, and executive functioning. Sixteen patients underwent 4 functional connectivity magnetic resonance imaging (fcMRI) scans (pre and post 1st and pre and post 10th tDCS) to investigate changes in resting state network connectivity after tDCS. Per-protocol analysis showed a significantly greater decrease in SANS score after active (−36.1%) than after sham tDCS (−0.7%). PANSS sum scores decreased significantly more with active (−23.4%) than with sham stimulation (−2.2%). Explorative analysis of fcMRI data indicated changes in subgenual cortex and dorsolateral prefrontal cortex (DLPFC) connectivity within frontal-thalamic-temporo-parietal networks. The results of this first proof-of-concept study indicate that prefrontal tDCS may be a promising intervention for treatment of schizophrenia with predominant negative symptoms. Large-scale randomized controlled studies are needed to further establish prefrontal tDCS as novel treatment for negative symptoms in schizophrenia. PMID:27098066
Randomness Amplification under Minimal Fundamental Assumptions on the Devices
NASA Astrophysics Data System (ADS)
Ramanathan, Ravishankar; Brandão, Fernando G. S. L.; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Wojewódka, Hanna
2016-12-01
Recently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components and in a situation where the violation of a Bell inequality only guarantees that some outcomes of the device for specific inputs exhibit randomness? Here, we solve this question and present a device-independent protocol for randomness amplification of Santha-Vazirani sources using a device consisting of two nonsignaling components. We show that the protocol can amplify any such source that is not fully deterministic into a fully random source while tolerating a constant noise rate and prove the composable security of the protocol against general no-signaling adversaries. Our main innovation is the proof that even the partial randomness certified by the two-party Bell test [a single input-output pair (u* , x* ) for which the conditional probability P (x*|u*) is bounded away from 1 for all no-signaling strategies that optimally violate the Bell inequality] can be used for amplification. We introduce the methodology of a partial tomographic procedure on the empirical statistics obtained in the Bell test that ensures that the outputs constitute a linear min-entropy source of randomness. As a technical novelty that may be of independent interest, we prove that the Santha-Vazirani source satisfies an exponential concentration property given by a recently discovered generalized Chernoff bound.
Rate-loss analysis of an efficient quantum repeater architecture
NASA Astrophysics Data System (ADS)
Guha, Saikat; Krovi, Hari; Fuchs, Christopher A.; Dutton, Zachary; Slater, Joshua A.; Simon, Christoph; Tittel, Wolfgang
2015-08-01
We analyze an entanglement-based quantum key distribution (QKD) architecture that uses a linear chain of quantum repeaters employing photon-pair sources, spectral-multiplexing, linear-optic Bell-state measurements, multimode quantum memories, and classical-only error correction. Assuming perfect sources, we find an exact expression for the secret-key rate, and an analytical description of how errors propagate through the repeater chain, as a function of various loss-and-noise parameters of the devices. We show via an explicit analytical calculation, which separately addresses the effects of the principle nonidealities, that this scheme achieves a secret-key rate that surpasses the Takeoka-Guha-Wilde bound—a recently found fundamental limit to the rate-vs-loss scaling achievable by any QKD protocol over a direct optical link—thereby providing one of the first rigorous proofs of the efficacy of a repeater protocol. We explicitly calculate the end-to-end shared noisy quantum state generated by the repeater chain, which could be useful for analyzing the performance of other non-QKD quantum protocols that require establishing long-distance entanglement. We evaluate that shared state's fidelity and the achievable entanglement-distillation rate, as a function of the number of repeater nodes, total range, and various loss-and-noise parameters of the system. We extend our theoretical analysis to encompass sources with nonzero two-pair-emission probability, using an efficient exact numerical evaluation of the quantum state propagation and measurements. We expect our results to spur formal rate-loss analysis of other repeater protocols and also to provide useful abstractions to seed analyses of quantum networks of complex topologies.
Kilbourn, Michael R.; Butch, Elizabeth R.; Desmond, Timothy; Sherman, Phillip; Harris, Paul E.; Frey, Kirk A.
2009-01-01
Introduction The sensitivity of the in vivo binding of [11C]dihydrotetrabenazine ([11C]DTBZ) and [11C]methylphenidate ([11C]MPH) to their respective targets, the vesicular monoamine transporter (VMAT2) and the neuronal membrane dopamine transporter (DAT), after alterations of endogenous levels of dopamine were examined in the rat brain. Methods In vivo binding of [11C]DTBZ and [11C]MPH were determined using a bolus+infusion protocol. In vitro numbers of VMAT2 binding sites were determined by autoradiography. Results Repeated dosing with α-methyl-p-tyrosine (AMPT) at doses that significantly (−75%) depleted brain tissue dopamine levels resulted in increased (+36%) in vivo [11C]DTBZ binding to VMAT2 in the striatum. The increase in binding could be completely reversed by treatment with L-DOPA/benserazide to restore dopamine levels. There were no changes in total numbers of VMAT2 binding sites as measured using in vitro autoradiography. No changes were observed for in vivo [11C]MPH binding to the DAT in the striatum following AMPT pretreatment. Conclusion These results indicate that large reductions of dopamine concentrations in the rat brain can produce modest but significant changes in binding of radioligands to the VMAT2, which can be reversed by repleneshment of dopamine using exogenous L-DOPA. PMID:20122661
Bidlingmaier, Scott; Su, Yang; Liu, Bin
2015-01-01
Using phage antibody display, large libraries can be generated and screened to identify monoclonal antibodies with affinity for target antigens. However, while library size and diversity is an advantage of the phage display method, there is limited ability to quantitatively enrich for specific binding properties such as affinity. One way of overcoming this limitation is to combine the scale of phage display selections with the flexibility and quantitativeness of FACS-based yeast surface display selections. In this chapter we describe protocols for generating yeast surface antibody display libraries using phage antibody display selection outputs as starting material and FACS-based enrichment of target antigen-binding clones from these libraries. These methods should be widely applicable for the identification of monoclonal antibodies with specific binding properties.
Two-photon Photoactivation to Measure Histone Exchange Dynamics in Plant Root Cells.
Rosa, Stefanie; Shaw, Peter
2015-10-20
Chromatin-binding proteins play a crucial role in chromatin structure and gene expression. Direct binding of chromatin proteins both maintains and regulates transcriptional states. It is therefore important to study the binding properties of these proteins in vivo within the natural environment of the nucleus. Photobleaching, photoactivation and photoconversion (photoswitching) can provide a non-invasive experimental approach to study dynamic properties of living cells and organisms. We used photoactivation to determine exchange dynamics of histone H2B in plant stem cells of the root (Rosa et al. , 2014). The stem cells of the root are located in the middle of the tissue, which made it impossible to carry out photoactivation of sufficiently small and well-defined sub-cellular regions with conventional laser illumination in the confocal microscope, mainly because scattering and refraction effects within the root tissue dispersed the focal spot and caused photoactivation of too large a region. We therefore used 2-photon activation, which has much better inherent resolution of the illuminated region. This is because the activation depends on simultaneous absorption of two or more photons, which in turns depends on the square (or higher power) of the intensity-a much sharper peak. In this protocol we will describe the experimental procedure to perform two-photon photoactivation experiments and the corresponding image analysis. This protocol can be used for nuclear proteins tagged with photoactivable GFP (PA-GFP) expressed in root tissues.
AnchorDock for Blind Flexible Docking of Peptides to Proteins.
Slutzki, Michal; Ben-Shimon, Avraham; Niv, Masha Y
2017-01-01
Due to increasing interest in peptides as signaling modulators and drug candidates, several methods for peptide docking to their target proteins are under active development. The "blind" docking problem, where the peptide-binding site on the protein surface is unknown, presents one of the current challenges in the field. AnchorDock protocol was developed by Ben-Shimon and Niv to address this challenge.This protocol narrows the docking search to the most relevant parts of the conformational space. This is achieved by pre-folding the free peptide and by computationally detecting anchoring spots on the surface of the unbound protein. Multiple flexible simulated annealing molecular dynamics (SAMD) simulations are subsequently carried out, starting from pre-folded peptide conformations, constrained to the various precomputed anchoring spots.Here, AnchorDock is demonstrated using two known protein-peptide complexes. A PDZ-peptide complex provides a relatively easy case due to the relatively small size of the protein, and a typical peptide conformation and binding region; a more challenging example is a complex between USP7 N-term and a p53-derived peptide, where the protein is larger, and the peptide conformation and a binding site are generally assumed to be unknown. AnchorDock returned native-like solutions ranked first and third for the PDZ and USP7 complexes, respectively. We describe the procedure step by step and discuss possible modifications where applicable.
Brown, T
2001-05-01
Southern blotting is the transfer of DNA fragments from an electrophoresis gel to a membrane support (the properties and advantages of the different types of membrane, transfer buffer, and transfer method are discussed in detail), resulting in immobilization of the DNA fragments, so the membrane carries a semipermanent reproduction of the banding pattern of the gel. After immobilization, the DNA can be subjected to hybridization analysis, enabling bands with sequence similarity to a labeled probe to be identified. This appendix describes Southern blotting via upward capillary transfer of DNA from an agarose gel onto a nylon or nitrocellulose membrane, using a high-salt transfer buffer to promote binding of DNA to the membrane. With the high-salt buffer, the DNA becomes bound to the membrane during transfer but not permanently immobilized. Immobilization is achieved by UV irradiation (for nylon) or baking (for nitrocellulose). A Support Protocol describes how to calibrate a UV transilluminator for optimal UV irradiation of a nylon membrane. An alternate protocol details transfer using nylon membranes and an alkaline buffer, and is primarily used with positively charged nylon membranes. The advantage of this combination is that no post-transfer immobilization step is required, as the positively charged membrane binds DNA irreversibly under alkaline transfer conditions. The method can also be used with neutral nylon membranes but less DNA will be retained. A second alternate protocol describes a transfer method based on a different transfer-stack setup. The traditional method of upward capillary transfer of DNA from gel to membrane described in the first basic and alternate protocols has certain disadvantages, notably the fact that the gel can become crushed by the weighted filter papers and paper towels that are laid on top of it. This slows down the blotting process and may reduce the amount of DNA that can be transferred. The downward capillary method described in the second alternate protocol is therefore more rapid than the basic protocol and can result in more complete transfer. Although the ease and reliability of capillary transfer methods makes this far and away the most popular system for Southern blotting with agarose gels, it unfortunately does not work with polyacrylamide gels, whose smaller pore size impedes the transverse movement of the DNA molecules. The third alternate protocol describes an electroblotting procedure that is currently the most reliable method for transfer of DNA from a polyacrylamide gel. Dot and slot blotting are also described.
[Summary: Scientific evaluation of EMDR psychotherapy].
Haour, F; de Beaurepaire, C
2016-06-01
The evaluation of psychotherapy methods is made difficult by their practical and theoretical diversities as well as the increasing number of available therapies. Evaluation based on scientific criteria in randomized control trials is providing the highest level of proof and recognition by Health Agencies. A recently described integrative psychotherapy, eye movement desensitization and reprocessing (EMDR), developed by F. Shapiro since 1989, has been confronted with the validation procedure used in pharmacological treatment. It was of interest to review the scientific validation steps carried out for this EMDR psychotherapy and for its mechanisms of action. The practical and methodological protocol of the EMDR psychotherapy for trauma integration is reviewed as well as clinical results and mechanisms. This EMDR therapy, focused on the resolutions of traumas, was started by treating patients with post-traumatic stress disorders (PTSD). The integrative EMDR protocol obtained the highest level of efficiency, for PTSD treatment, twenty years after its first publication. The efficiency of the protocol is now under study and scientific evaluation for troubles in which the trauma experiences are triggers or factors of maintenance of the troubles: anxiety, depression, phobia, sexual troubles, schizophrenia, etc. This new integrative psychotherapy follows the pathways and the timing observed for the evaluation and the validation of other therapies. Copyright © 2016 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.
An Efficient Method for Generation of Knockout Human Embryonic Stem Cells Using CRISPR/Cas9 System.
Bohaciakova, Dasa; Renzova, Tereza; Fedorova, Veronika; Barak, Martin; Kunova Bosakova, Michaela; Hampl, Ales; Cajanek, Lukas
2017-11-01
Human embryonic stem cells (hESCs) represent a promising tool to study functions of genes during development, to model diseases, and to even develop therapies when combined with gene editing techniques such as CRISPR/CRISPR-associated protein-9 nuclease (Cas9) system. However, the process of disruption of gene expression by generation of null alleles is often inefficient and tedious. To circumvent these limitations, we developed a simple and efficient protocol to permanently downregulate expression of a gene of interest in hESCs using CRISPR/Cas9. We selected p53 for our proof of concept experiments. The methodology is based on series of hESC transfection, which leads to efficient downregulation of p53 expression even in polyclonal population (p53 Low cells), here proven by a loss of regulation of the expression of p53 target gene, microRNA miR-34a. We demonstrate that our approach achieves over 80% efficiency in generating hESC clonal sublines that do not express p53 protein. Importantly, we document by a set of functional experiments that such genetically modified hESCs do retain typical stem cells characteristics. In summary, we provide a simple and robust protocol to efficiently target expression of gene of interest in hESCs that can be useful for laboratories aiming to employ gene editing in their hESC applications/protocols.
German flooding of the Pontine Marshes in World War II.
Geissler, Erhard; Guillemin, Jeanne
2010-03-01
The German army's 1943 flooding of the Pontine Marshes south of Rome, which later caused a sharp rise in malaria cases among Italian civilians, has recently been described by historian Frank Snowden as a unique instance of biological warfare and bioterrorism in the European theater of war and, consequently, as a violation of the 1925 Geneva Protocol prohibiting chemical and biological warfare. We argue that archival documents fail to support this allegation, on several counts. As a matter of historical record, Hitler prohibited German biological weapons (BW) development and consistently adhered to the Geneva Protocol. Rather than biological warfare against civilians, the Wehrmacht used flooding, land mines, and the destruction of vital infrastructure to obstruct the Allied advance. To protect its own troops in the area, the German army sought to contain the increased mosquito breeding likely to be caused by the flooding. Italians returning to the Pontine Marshes after the German retreat in 1944 suffered malaria as a result of environmental destruction, which was banned by the 1899 and 1907 Hague Conventions and by subsequent treaties. In contrast, a state's violation of the Geneva Protocol, whether past or present, involves the use of germ weapons and, by inference, a state-level capability. Any allegation of such a serious violation demands credible evidence that meets high scientific and legal standards of proof.
Cryptographically supported NFC tags in medication for better inpatient safety.
Özcanhan, Mehmet Hilal; Dalkılıç, Gökhan; Utku, Semih
2014-08-01
Reliable sources report that errors in drug administration are increasing the number of harmed or killed inpatients, during healthcare. This development is in contradiction to patient safety norms. A correctly designed hospital-wide ubiquitous system, using advanced inpatient identification and matching techniques, should provide correct medicine and dosage at the right time. Researchers are still making grouping proof protocol proposals based on the EPC Global Class 1 Generation 2 ver. 1.2 standard tags, for drug administration. Analyses show that such protocols make medication unsecure and hence fail to guarantee inpatient safety. Thus, the original goal of patient safety still remains. In this paper, a very recent proposal (EKATE) upgraded by a cryptographic function is shown to fall short of expectations. Then, an alternative proposal IMS-NFC which uses a more suitable and newer technology; namely Near Field Communication (NFC), is described. The proposed protocol has the additional support of stronger security primitives and it is compliant to ISO communication and security standards. Unlike previous works, the proposal is a complete ubiquitous system that guarantees full patient safety; and it is based on off-the-shelf, new technology products available in every corner of the world. To prove the claims the performance, cost, security and scope of IMS-NFC are compared with previous proposals. Evaluation shows that the proposed system has stronger security, increased patient safety and equal efficiency, at little extra cost.