Spelling suggestions: "subject:"bransformation."" "subject:"btransformation.""
241 |
Recognition of oriT at the termination of conjugal transfer by MobA, the R1162 DNA strand transferaseBecker, Eric Christian 14 April 2011 (has links)
R1162 is efficiently mobilized during conjugation by IncP-1 plasmids such as RK2 and R751. Transfer is terminated when the transferred strand, linearized at the 38 base-pair origin of transfer (oriT), is recircularized by the plasmid encoded protein MobA. For strand rejoining, MobA covalently linked to the 5' end of the strand rejoins the ends by a reversible transesterification reaction. The minimal oriT fragment of R1162 contains a highly conserved 12 base region (core) including the cleavage site and a ten base imperfect inverted repeat (IR) that is not highly conserved. From those oligonucleotides with a partially degenerate oriT core base sequence, the subpopulations that are bound by MobA, cleaved and rejoined by this protein and support termination of transfer were identified. Both the IR and the adjacent core bases TAA, are needed for tight binding to MobA, whereas the location of the dinucleotide YG determines the site of strand cleavage. At the IR MobA stabilizes duplex DNA during gel electrophoresis and binds weakly to oligonucleotides lacking the outer arm of the inverted repeat, supporting a model where secondary structure at IR provides a duplex region needed for binding during termination (Zhang and Meyer 1995). Significantly altered IR sequences did allow strong binding to MobA yet completely different IR sequences did not, indicating the IR serves a structural role for binding with low base specificity. A 184 residue aminoterminal MobA fragment capable of binding and cleaving oriT was identified by using phage display and partial enzymatic digestion of the protein. No smaller fragments that could bind or cleave oriT were identified. An active nucleoprotein intermediate consisting of MobA covalently linked to the 5' end of the cleaved oriT was used to show that a single molecule of MobA is sufficient to carry out all the DNA processing steps during transfer. / text
|
242 |
The cellular transformation potential of Herpes simplex virus type 2 in vitroSwanson, Stephen King, 1946- January 1974 (has links)
No description available.
|
243 |
The effect of ultraviolet irradiated Herpes Simplex virus type 1 or 2 on thymidine kinase induction in bromodeoxyuridine and flurorodeoxyuridine treated HEp-2 cellsAhmad, Aliyu, 1943- January 1975 (has links)
No description available.
|
244 |
Modelling and Analysis using Graph Transformation SystemsLangari, Zarrin 29 October 2010 (has links)
Communication protocols, a class of critical systems, play an important role in industry. These protocols are critical because the tolerance for faults in these systems is low and it is highly desirable that these systems work correctly. Therefore, an effective methodology for describing and verifying that these systems behave according to their specifications is vitally important.
Model checking is a verification technique in which a mathematically precise model of the system, either concrete or with abstraction, is built and a specification of how the system should behave is given. Then the system is considered correct if its model satisfies its specification. However, due to their size and complexity, critical systems, such as communication systems, are notoriously resistant to formal modelling and verification.
In this thesis, we propose using graph transformation systems (GTSs), a visual
semantic modelling approach, to model the behaviour of dynamically evolving communication protocols. Then, we show how a GTS model can facilitate verification of invariant properties of potentially unbounded communication systems. Finally, due to the use of similar isomorphic components in communication systems, we show how to exploit symmetries of these dynamically evolving models described by GTSs, to reduce the size of the model under verification.
We use graph transformation systems to provide an expressive and intuitive visual description of the system state as a graph and for the computations of the system as a finite set of rules that transform the state graphs. Our model is well-suited for describing the behaviour of individual components, error-free communication channels amongst the components, and dynamic component creation and elimination. Thus, the structure of the generated model closely resembles the way in which communication protocols are typically separated into three levels: the first describing local features or components, the second characterizing interactions among components, and the third showing the evolution of the component set. The graph transformation semantics follows this scheme, enabling a clean separation of concerns when describing a protocol. This separation of concerns is a necessity for formal analysis of system behaviour.
We prove that the finite set of graph transformation rules that describe behaviour of the system can be used to perform verification for invariant properties of the system. We show that if a property is preserved by the finite set of transformation rules describing the system model, and if the initial state satisfies the property, then the property is an invariant of the system model. Therefore, our verification method may avoid the explicit analysis of the potentially enormous state space that the transformation rules encode.
In this thesis, we also develop symmetry reduction techniques applicable to dynamically evolving GTS models. The necessity to extend the existing symmetry reduction techniques arises because these techniques are not applicable to dynamic models such as those described by GTSs, and, in addition, these existing techniques may offer only limited reduction to systems that are not fully symmetric. We present an algorithm for generating a symmetry-reduced quotient model directly from a set of graph transformation rules. The generated quotient model is bisimilar to the model under verification and may be exponentially smaller than that model.
|
245 |
Replicons derived from endogenously isolated plasmids used to classify plasmids occurring in marine sediment bacteriaCook, Marisa Anne 05 1900 (has links)
No description available.
|
246 |
Transformation amongst staff and students at the University of Cape Town: Challenges and Prospects.Andrews, Hilda. January 2008 (has links)
<p>This research is an evaluative case study of transformation in a Historically White University in South Africa. The research occurs within the context of redress against the inequality and exclusion created by the legacy of apartheid. The research is a qualitative and quantinative study. it is based on based on desk research and include a literature review. Internet search as well as an analysis of key organisational and policy context documents such as reports, projects and surveys are used. semi-structured interviews was held with a sample of staff.</p>
|
247 |
Literacy for liberation: a Haitian case studyWoodard, Rosemary 12 September 2011 (has links)
This qualitative study of an adult literacy program, Literacy for Liberation, operated by a non-governmental organization and serving a marginalized demographic in Haiti, considered the impact of a literacy program designed to enhance technical and critical literacy skills while promoting communal and individual change. Data, collected in five open-ended interviews and two observations, focused on the contextual, logistical, and beneficial aspects of the program. Results were analyzed using markers from Freire’s framework of critical pedagogy: humanization, situated literacy, dialogue and consciousness-raising, and transformation. Findings revealed limited economic, social, and communal benefits, and that replication of the program may be possible if certain steps are followed. Overall conclusions demonstrated that expanding literacy programs in this setting can facilitate social and economic progress for previously illiterate adults and future generations, particularly where structural inequality is evident. Final recommendations included comparison studies of other programs and longitudinal research of descending generations.
|
248 |
Acquiring data designs from existing data-intensive programsYang, Hongji January 1994 (has links)
The problem area addressed in this thesis is extraction of a data design from existing data intensive program code. The purpose of this is to help a software maintainer to understand a software system more easily because a view of a software system at a high abstraction level can be obtained. Acquiring a data design from existing data intensive program code is an important part of reverse engineering in software maintenance. A large proportion of software systems currently needing maintenance is data intensive. The research results in this thesis can be directly used in a reverse engineering tool. A method has been developed for acquiring data designs from existing data intensive programs, COBOL programs in particular. Program transformation is used as the main tool. Abstraction techniques and the method of crossing levels of abstraction are also studied for acquiring data designs. A prototype system has been implemented based on the method developed. This involved implementing a number of program transformations for data abstraction, and thus contributing to the production of a tool. Several case studies, including one case study using a real program with 7000 Hues of source code, are presented. The experiment results show that the Entity-Relationship Attribute Diagrams derived from the prototype can represent the data designs of the original data intensive programs. The original contribution of the thesis is that the approach presented in this thesis can identify and extract data relationships from the existing code by combining analysis of data with analysis of code. The approach is believed to be able to provide better capabilities than other work in the field. The method has indicated that acquiring a data design from existing data intensive program code by program transformation with human assistance is an effective method in software maintenance. Future work is suggested at the end of the thesis including extending the method to build an industrial strength tool.
|
249 |
Nitrate reduction by oral bacteria : a role in host defence against pathogens?Li, Hong January 2001 (has links)
No description available.
|
250 |
The Residue of Flight: Investigations Into the Life of MatterStrobel, Sebastian 13 December 2013 (has links)
This thesis is a journey that unfolds alongside the transformations of a river during springtime. Moods and movements captured by Ted Hughes in his poem Stump Pool in April inspire a series of explorations that set out to express the affective vectors of the river???s becoming through sculpture and architecture. The thesis is a manifestation of this search.
Arranged as a narrative in five chapters, each offers an account of the emergence of the five works. The first three are a sculptural response to each stanza of the poem: Prometheus manifests the river???s phase-shift from ice to water, Sky Burial from water to steam and Icarus the passage of steam rising towards the sun. Prometheus??? torment, the tearing dispersal of the body during a funerary ritual and the ecstatic flight of Icarus are caught through three material and fire based experiments. Chapter four reflects on these works while investigating the conception and construction of the Bruder Klaus Chapel by the renowned Swiss architect Peter Zumthor. The fifth chapter moves the exploration from sculpture to architectural design deploying the lessons learned from the previous works. Forces of descent rather than ascent now inform the creation of a torrential void, A Lover???s Enclosure.
The trajectory in each work and through the series is guided by what feels right, by the unpredictability of the material imagination, working by hand, and by forming and re-forming reoccurring themes as they reverberate and transform in a continuum of affective transformations.
|
Page generated in 0.0968 seconds