The Hill equation revisited: uses and misuses.
نویسنده
چکیده
The Hill coefficient is commonly used to estimate the number of ligand molecules that are required to bind to a receptor to produce a functional effect. However, for a receptor with more than one ligand binding site, the Hill equation does not reflect a physically possible reaction scheme; only under the very specific condition of marked positive cooperativity does the Hill coefficient accurately estimate the number of binding sites. The Hill coefficient is best thought of as an "interaction" coefficient, reflecting the extent of cooperativity among multiple ligand binding sites. Several relatively simple, physically plausible reaction schemes are shown here to produce a variety of ligand dose-response curve phenotypes more appropriately suited to modeling ligand-receptor interactions, especially if independent information about the stochiometry of the ligand-receptor interaction is available.
منابع مشابه
QUICKSELECT Revisited
We give an overview of the running time analysis of the random divide-and-conquer algorithm FIND or QUICKSELECT. The results concern moments, distribution of FIND’s running time, the limiting distribution, a stochastic bound and the key: a stochastic fixed point equation.
متن کاملHigh level Ab inito bench mark computaions on weak interactions (H2)2 dimer revisited
The Potential Energy Surface PES of (H2)2 dimer has been investigated, using five simple rigid rotor models. These models are called: head to head, symmetric side to side, L , steplike and T model. All calculations were done at two levels of ab initio methods: MP2(Full) and QCISD (T,Full) using cc-pVTZ basis set at singlet state of spin multiplicity. The results of scanning PES were then fitte...
متن کاملHow to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad-hoc On-Demand Distance Vector (AODV) protocol as an example. It identifies a number of attack goals, and then studies how to achieve these goals through misuses of the routing messages. To facilitate the analysis, it classifies insider attacks into two categories: atomic misuses an...
متن کاملHow to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It identifies a number of attack goals and then study how to achieve these goals through misuses of the routing messages. To facilitate the analysis, this paper classifies the insider attacks into two categories: atomic m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- FASEB journal : official publication of the Federation of American Societies for Experimental Biology
دوره 11 11 شماره
صفحات -
تاریخ انتشار 1997