Drivers of Bacterial Maintenance and Minimal Energy Requirements
نویسندگان
چکیده
Microbes maintain themselves through a variety of processes. Several of these processes can be reduced or shut down entirely when resource availability declines. In pure culture conditions with ample substrate supply, a relationship between the maximum growth rate and the energy invested in maintenance has been reported widely. However, at the other end of the resources spectrum, bacteria are so extremely limited by energy that no growth occurs and metabolism is constrained to the most essential functions only. These minimum energy requirements have been called the basal power requirement. While seemingly different from each other, both aspects are likely components of a continuum of regulated maintenance processes. Here, we analyze cross-species tradeoffs in cellular physiology over the range of bacterial size and energy expenditure and determine the contributions to maintenance metabolism at each point along the size-energy spectrum. Furthermore, by exploring the simplest bacteria within this framework- which are most affected by maintenance constraints- we uncover which processes become most limiting. For the smallest species, maintenance metabolism converges on total metabolism, where we predict that maintenance is dominated by the repair of proteins. For larger species the relative costs of protein repair decrease and maintenance metabolism is predicted to be dominated by the repair of RNA components. These results provide new insights into which processes are likely to be regulated in environments that are extremely limited by energy.
منابع مشابه
Application of Sinusoidal Equations to Partitioning Crude Protein and Metabolizable Energy Intake between Maintenance and Growth in Parent Stock of Broiler Chickens
Most models developed for poultry are linear to the point where genetic potential is reached. Models reliant on the premise that growth rate determines requirements based on some fixed rate of nutrient utilization do not adequately represent the biological phenomena involved. Therefore, a dichotomy between the accepted theories of nutrient utilization in animals and the assumptions of mathemati...
متن کاملMaintenance Cost Analysis for Replacement Model with Perfect Minimal Repair
With the evolution of technology, the maintenance of sophisticated systems is of concern for system engineers and system designers. The maintenance cost of the system depends in general on the replacement and repair policies. The system replacement may be in a strictly periodic fashion or on a random basis depending upon the maintenance policy. At failure, the repair of the system may be perfor...
متن کاملDetermining maintenance system requirements by viewpoint of availability and lean thinking: A MODM approach
Since lean concept has appeared many works have been done on decreasing or even eliminating of wastes such as extra inventory. Although these studies have not taken into account expected availability seriously. So in this paper, a Multiple Objective Decision Making (MODM) model has been developed by viewpoint of these subjects. They are decreasing wastes and increasing system availability. Wast...
متن کاملتغییرات غلظت پلاسمایی هورمونهای تیروئیدی در گوسفندان تحت محدودیت انرژی و اثر تزریق وریدی لپتین بر آن
The aim of this study was to determine changes in the concentration of leptin and thyroid hormone in energyrestricted ewes and effect of leptin injection on thyroid hormone level. In the first experiment, 28 ewes were assigned to two groups(n=14). Ewes were fed by a ration that provided 60% or 100% of maintenance energy requirements during 71 days. Blood samples were collected and body w...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کامل