Lifting the Curtain: Using Topology to Probe the Hidden Action of Enzymes
نویسنده
چکیده
ne of the important issues in molecular biology is the three-dimensional structure (shape) of proteins and deoxyribonucleic acid (DNA) in solution in the cell and the relationship between structure and function. Ordinarily, protein and DNA structure is determined by X-ray crystallography or electron microscopy. Because of the close packing needed for crystallization and the manipulation required to prepare a specimen for electron microscopy, these methods provide little direct evidence for molecular shape in solution. Topology can shed light on this key issue. The topological approach to enzymology is an experimental protocol in which the descriptive and analytical powers of topology and geometry are employed in an indirect effort to determine the enzyme mechanism and the structure of active enzyme-DNA complexes in vitro (in a test tube). We describe how recent results in 3-dimensional topology [3, 5, 9, 10, 11] have proven to be of use in the description and quantization of the action of cellular enzymes on DNA.
منابع مشابه
A Numerical Modeling Study for Determining the Optimal Depth of Grout Curtain in Foundation and Abutments of Karun 4 Dam
Some experimental relations have been developed for determining the grout curtain depth, but these relations cannot be applied to any dam with any geological condition. Therefore, the effect of the grout curtain depth on seepage through foundation and abutments of each dam should be studied separately. To examine this parameter in Karun 4 dam, the numerical modeling method was applied using FLA...
متن کاملCompton scattering as a probe for materials investigation
This article investigates into the feasibility of using gamma radiation Compton backscatter spectra as a means of material characterization, with the view to developing a portable, hand held probe for investigative purposes such as searching for illicit substances hidden in wall or car door cavities.
متن کاملAlert correlation and prediction using data mining and HMM
Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...
متن کاملShielding simulations for safe use of curtain electron accelerator by MCNP4C
In an electron curtain accelerator, when the electron beam passes through the titanium exit window of the accelerator chamber, X-ray photons are produced as a negative by-product of retarding accelerated electrons. Controlling the produced X-ray photons to avoid their detrimental effects or in fact, proper shielding of the accelerator is an important issue that has to be considered in the use o...
متن کاملApplication of hidden Markov model topology estimation to repetitive lifting data
At ICASSP '96, we presented an algorithm that estimates the topology of a hidden Markov model (HMM) given a set of time series data. The algorithm iteratively prunes state transitions from a large general HMM topology and selects a topology based on a likelihood criterion and a heuristic evaluation of complexity. In this paper, we apply the algorithm to estimate the dynamic structure of human b...
متن کامل