oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 12 )

2018 ( 17 )

2017 ( 15 )

2016 ( 9 )

Custom range...

Search Results: 1 - 10 of 4396 matches for " Boris Bardot "
All listed articles are free for downloading (OA Articles)
Page 1 /4396
Display every page Item
Delta activity independent of its activity as a ligand of Notch
Lee-Peng Mok, Tielin Qin, Boris Bardot, Matthew LeComte, Asal Homayouni, Francois Ahimou, Cedric Wesley
BMC Developmental Biology , 2005, DOI: 10.1186/1471-213x-5-6
Abstract: Using Drosophila cultured cells we show that the full length Delta promotes accumulation of Daughterless protein, fringe RNA, and pangolin RNA in the absence of Scabrous or Notch. Scabrous binds Delta and suppresses this activity even though it increases the level of the Delta intracellular domain. We also show that Scabrous can promote Notch receptor activity, in the absence of Delta.Delta has activity that is independent of its activity as a ligand of Notch. Scabrous suppresses this Delta activity. Scabrous also promotes Notch activity that is dependent on Delta's ligand activity. Thus, Notch, Delta, and Scabrous might function in complex combinatorial or mutually exclusive interactions during development. The data reported here will be of significant help in understanding these interactions in vivo.Notch (N) and Delta (Dl) are cell surface proteins that are required for differentiation of almost all tissues in the fruit fly Drosophila melanogaster. They are evolutionarily conserved, functioning similarly in animals from worms to humans [1,2]. The best-known instance of their function is the process of lateral inhibition that initiates differentiation of the neuronal and epidermal tissues from proneural cells that are predisposed to making the neuronal tissue. Proneural cells express high levels of the neuronal transcription co-factors from the Achaete Scute Complex (ASC) or related genes [3,4]. These factors require their partner Daughterless (Da) to activate transcription of the neurogenesis genes [5-7]. Da is expressed at low levels in all Drosophila cells [8] and up regulated in proneural cells specified to differentiate the neurons [5]. Whether or not the up regulation of Da expression is part of lateral inhibition is not clear in Drosophila. In Caenorhabditis elegans, however, the differential accumulation of the Da homolog HLH-2 is the earliest detectable difference between the cells taking up alternate fates during lateral inhibition [9]. As N and Dl are k
Fuzzy Tandem Repeats Containing p53 Response Elements May Define Species-Specific p53 Target Genes
Iva Simeonova,Vincent Lejour,Boris Bardot,Rachida Bouarich-Bourimi,Aurélie Morin,Ming Fang,Laure Charbonnier,Franck Toledo
PLOS Genetics , 2012, DOI: 10.1371/journal.pgen.1002731
Abstract: Evolutionary forces that shape regulatory networks remain poorly understood. In mammals, the Rb pathway is a classic example of species-specific gene regulation, as a germline mutation in one Rb allele promotes retinoblastoma in humans, but not in mice. Here we show that p53 transactivates the Retinoblastoma-like 2 (Rbl2) gene to produce p130 in murine, but not human, cells. We found intronic fuzzy tandem repeats containing perfect p53 response elements to be important for this regulation. We next identified two other murine genes regulated by p53 via fuzzy tandem repeats: Ncoa1 and Klhl26. The repeats are poorly conserved in evolution, and the p53-dependent regulation of the murine genes is lost in humans. Our results indicate a role for the rapid evolution of tandem repeats in shaping differences in p53 regulatory networks between mammalian species.
Cubic Root Extractors of Gaussian Integers and Their Application in Fast Encryption for Time-Constrained Secure Communication  [PDF]
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2011, DOI: 10.4236/ijcns.2011.44024
Abstract: There are settings where encryption must be performed by a sender under a time constraint. This paper de-scribes an encryption/decryption algorithm based on modular arithmetic of complex integers called Gaus-sians. It is shown how cubic extractors operate and how to find all cubic roots of the Gaussian. All validations (proofs) are provided in the Appendix. Detailed numeric illustrations explain how to use the method of digital isotopes to avoid ambiguity in recovery of the original plaintext by the receiver.
Primality Testing Using Complex Integers and Pythagorean Triplets  [PDF]
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2012, DOI: 10.4236/ijcns.2012.59062
Abstract: Prime integers and their generalizations play important roles in protocols for secure transmission of information via open channels of telecommunication networks. Generation of multidigit large primes in the design stage of a cryptographic system is a formidable task. Fermat primality checking is one of the simplest of all tests. Unfortunately, there are composite integers (called Carmichael numbers) that are not detectable by the Fermat test. In this paper we consider modular arithmetic based on complex integers; and provide several tests that verify the primality of real integers. Although the new tests detect most Carmichael numbers, there are a small percentage of them that escape these tests.
Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design  [PDF]
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2012, DOI: 10.4236/ijcns.2012.511074
Abstract: Primitive elements play important roles in the Diffie-Hellman protocol for establishment of secret communication keys, in the design of the ElGamal cryptographic system and as generators of pseudo-random numbers. In general, a deterministic algorithm that searches for primitive elements is currently unknown. In information-hiding schemes, where a primitive element is the key factor, there is the freedom in selection of a modulus. This paper provides a fast deterministic algorithm, which computes every primitive element in modular arithmetic with special moduli. The algorithm requires at most O(log2p) digital operations for computation of a generator. In addition, the accelerated-descend algorithm that computes small generators is described in this paper. Several numeric examples and tables illustrate the algorithms and their properties.
Public-Key Cryptosystems with Secret Encryptor and Digital Signature  [PDF]
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2013, DOI: 10.4236/ijcns.2013.61001
Abstract:

This paper describes and compares a variety of algorithms for secure transmission of information via open communication channels based on the discrete logarithm problem that do not require search for a generator (primitive element). Modifications that simplify the cryptosystem are proposed, and, as a result, accelerate its performance. It is shown that hiding information via exponentiation is more efficient than other seemingly simpler protocols. Some of these protocols also provide digital signature/sender identification. Numeric illustrations are provided.

The Analysis of the Equilibrium Cluster Structure in Supercritical Carbon Dioxide  [PDF]
Boris Sedunov
American Journal of Analytical Chemistry (AJAC) , 2012, DOI: 10.4236/ajac.2012.312A119
Abstract:

The monomer fraction density based analysis of precise thermophysical data for pure fluids is developed to study the molecular structures in supercritical fluids in general and in CO2 in particular. The series expansion by powers of the monomer fraction density of the potential energy density is used to discover the cluster structure in supercritical fluids and the clusters’ bond energies in CO2. The method of clusters separation between classes of loose and dense clusters in the CO2 supercritical fluid is developed. The method of the energetically averaged number of dense clusters is developed to study the mechanism of the soft structural transition between the gas-like and liquid-like fluids in the supercritical CO2.

Faster Method for Secure Transmission of Information with Sender Identification  [PDF]
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2013, DOI: 10.4236/ijcns.2013.62009
Abstract:

This paper describes an algorithm for secure transmission of information via open communication channels based on the discrete logarithm problem. The proposed algorithm also provides sender identification (digital signature). It is twice as fast as the RSA algorithm and requires fifty per cent fewer exponentiations than the ElGamal cryptosystems. In addition, the algorithm requires twice less bandwidth than the ElGamal algorithm. Numerical examples illustrate all steps of the proposed algorithm: system design (selection of private and public keys), encryption, transmission of information, decryption and information recovery.

Thermal Analysis of Thermophysical Data for Equilibrium Pure Fluids  [PDF]
Boris Sedunov
Journal of Modern Physics (JMP) , 2013, DOI: 10.4236/jmp.2013.47A2002
Abstract:

The thermal analysis of precise thermophysical data for pure fluids from electronic databases is developed to investigate the molecular interaction mechanisms and parameters and the structural features of heterogeneities in fluids. The method is based on the series expansion of thermophysical values by powers of the monomer fraction density. Unlike the virial expansion by powers of the total density, the series expansion terms in this method directly reflect properties of the corresponding cluster fractions. The internal energy had been selected among thermophysical properties as the most informative for this method. The thermal analysis of its series expansion coefficients permits to estimate the temperature dependence of the pair bond parameters, the clusters’ bond energies and equilibrium constants, the structural transitions between dominating isomers of clusters. The application of method to different pure fluids, including noble and molecular gases with van der Waals and polar molecular interactions, brings unknown clusters’ characteristics for the fluids under investigation. The thermal analysis of the ordinary and heavy Water vapors points on no trivial isotopic effects. The unpredictable growth of the pair bond energy with temperature in Alkanes points on existence in hydrocarbons of some unknown molecular interaction forces in addition to dispersion forces.

The Equilibrium Thermal Physics of Supercritical Fluids  [PDF]
Boris Sedunov
International Journal of Analytical Mass Spectrometry and Chromatography (IJAMSC) , 2013, DOI: 10.4236/ijamsc.2013.12013
Abstract:

To discover particular features of pure supercritical fluids, important for the supercritical fluid extraction and cleaning technologies, the preprocessed and generalized experimental data from the US National Institute of Standards and Technology (NIST) online database have been analyzed. The soft transition between gas-like and liquid-like structures in pure supercritical fluids has been considered in comparison with the abrupt vapor-liquid phase transition. A rough, diffused and boiling boundary between these structures in conditions of extra high gravity is opposed to a flat vapor-liquid boundary at a moderate gravity. The model for molecular diffusivity in carbon dioxide at temperatures near the critical temperature discovers its proportionality to the monomer fraction density. The cluster fraction based model for small molecular weight solids’ solubility in supercritical fluids has been suggested and successfully compared with the well-known experimental results for the solubility of silica in water.The model shows that at growing pressure the dissolution process has already startedin a real gas and discovers the cluster fractions’ role in the solubility process.

Page 1 /4396
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.