Lifting the Curtain: Using Topology to Probe the Hidden Action of Enzymes

نویسنده

  • De Witt Sumners
چکیده

ne of the important issues in molecular biology is the three-dimensional structure (shape) of proteins and deoxyribonucleic acid (DNA) in solution in the cell and the relationship between structure and function. Ordinarily, protein and DNA structure is determined by X-ray crystallography or electron microscopy. Because of the close packing needed for crystallization and the manipulation required to prepare a specimen for electron microscopy, these methods provide little direct evidence for molecular shape in solution. Topology can shed light on this key issue. The topological approach to enzymology is an experimental protocol in which the descriptive and analytical powers of topology and geometry are employed in an indirect effort to determine the enzyme mechanism and the structure of active enzyme-DNA complexes in vitro (in a test tube). We describe how recent results in 3-dimensional topology [3, 5, 9, 10, 11] have proven to be of use in the description and quantization of the action of cellular enzymes on DNA.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Numerical Modeling Study for Determining the Optimal Depth of Grout Curtain in Foundation and Abutments of Karun 4 Dam

Some experimental relations have been developed for determining the grout curtain depth, but these relations cannot be applied to any dam with any geological condition. Therefore, the effect of the grout curtain depth on seepage through foundation and abutments of each dam should be studied separately. To examine this parameter in Karun 4 dam, the numerical modeling method was applied using FLA...

متن کامل

Compton scattering as a probe for materials investigation

This article investigates into the feasibility of using gamma radiation Compton backscatter spectra as a means of material characterization, with the view to developing a portable, hand held probe for investigative purposes such as searching for illicit substances hidden in wall or car door cavities.

متن کامل

Alert correlation and prediction using data mining and HMM

Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...

متن کامل

Shielding simulations for safe use of curtain electron accelerator by MCNP4C

In an electron curtain accelerator, when the electron beam passes through the titanium exit window of the accelerator chamber, X-ray photons are produced as a negative by-product of retarding accelerated electrons. Controlling the produced X-ray photons to avoid their detrimental effects or in fact, proper shielding of the accelerator is an important issue that has to be considered in the use o...

متن کامل

Application of hidden Markov model topology estimation to repetitive lifting data

At ICASSP '96, we presented an algorithm that estimates the topology of a hidden Markov model (HMM) given a set of time series data. The algorithm iteratively prunes state transitions from a large general HMM topology and selects a topology based on a likelihood criterion and a heuristic evaluation of complexity. In this paper, we apply the algorithm to estimate the dynamic structure of human b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995