The thermostability of three sulfur oxygenase reductases (SORs) was investigated from thermoacidophilic achaea Acidianus tengchongensis (SORAT) and Sulfolobus tokodaii (SORsT) as well as the moderately thermophi...
详细信息
The thermostability of three sulfur oxygenase reductases (SORs) was investigated from thermoacidophilic achaea Acidianus tengchongensis (SORAT) and Sulfolobus tokodaii (SORsT) as well as the moderately thermophilic bacterium Acidithiobacillus sp. SM-1 (SORsB). The optimal temperatures for catalyzing sulfur oxidation were 80 ℃ (SORAT), 85 ℃ (SORsT), and 70 ℃ (SORsB), respectively. The half-lives of the three SORs at their optimal catalytic conditions were 100 min (SORAT), 58 min (SORsT), and 37 min (SORsB). In order to reveal the structural basis of the thermostability of these SORs, three-dimensional structural models of them were generated by homology modeling using the previously reported high-resolution X-ray structure of SORAA (from Acidianus ambivalens) as a template. The results suggest that thermostability was dependent on: (a) high number of the charged amino acid glutamic acid and the flexible amino acid proline, (b) low number of the therraolabile amino acid glutamine, (c) increased number of ion pairs, (d) decreased ratio of hydrophobie accessible solvent surface area (ASA) to charged ASA, and (e) increased volumes of the cavity. The number of cavities and the number of hydrogen bonds did not signifieantly affect the thermostability of SORs, whereas the cavity volumes increased as the thermal stability increased.
Microblog is becoming more and more popular in our life. Due to the numerous information on this platform, it is very useful to detect bursty topic in real-time to help people get essential information quickly. As a n...
详细信息
Microblog is becoming more and more popular in our life. Due to the numerous information on this platform, it is very useful to detect bursty topic in real-time to help people get essential information quickly. As a necessary stage, detecting busty feature effectively is important for bursty topic detection. Based on dynamics model, we propose a new microblog bursty feature detection method. Firstly, we compute term weight taking account of both term frequency and tweet weight, where tweet weight factors include retweet number, comments number and time fading factor. After computing all terms' weight, a bursty feature detection method is proposed based on dynamics model. On the analogy of physical dynamics model, we compute each term's momentum by using MACD (Moving Average Convergence/Divergence) and determine whether it is a bursty feature in a given time interval. We employ our method to detect the bursty terms of Sina tweets with a series of experiments. It is demonstrated that our method is able to detect bursts for news terms accurately and efficiently.
Geometry-based optimal power control was proposed in [14] to transform the power-control problem to a new geometrical problem on the position relationship between a line and some points. This scheme provides a novel v...
详细信息
Node-localization is one of the key technologies of wireless sensor networks, and mobile-anchor assisted localization method is a promising method of saving network cost. The path planning of mobile anchor is a basis ...
详细信息
The properties of modular inverse were analyzed and gain to improve the extended Euclid algorithm. In the new scheme, even-reduction and remainder-attenuation were proposed which insured the remainder be attenuated to...
详细信息
The properties of modular inverse were analyzed and gain to improve the extended Euclid algorithm. In the new scheme, even-reduction and remainder-attenuation were proposed which insured the remainder be attenuated to one third of before in each loop at least, so that for y = a-1 mod p, the number of loops will be lower than log 3 a. Software testing shows the new algorithm is significantly improved on speed than the original algorithm.
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model an...
详细信息
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model and analyze a new electronic *** are found in the protocol and their mechanisms are discussed.A variety of solutions are given to different security *** improved protocol is proven to be robust and secure.
Many identity based signature (IBS) schemes have been proposed so far. However, most of the schemes are based on bilinear pairings. Only a few IBS schemes are with-out pairings. Up to now, there still remains a challe...
详细信息
Many identity based signature (IBS) schemes have been proposed so far. However, most of the schemes are based on bilinear pairings. Only a few IBS schemes are with-out pairings. Up to now, there still remains a challenge to construct a provably secure and effcient IBS scheme without pairings. In this paper, we propose an effcient IBS scheme based on cubic residues, and we prove that our scheme is secure against adaptively chosen message and ID attack.
Vector OFDM (V-OFDM) for single transmit antenna systems is a general transmission scheme in which OFDM and Single-Carrier Frequency Domain Equalization (SC-FDE) can be considered as two extreme/special cases. Due to ...
详细信息
Privacy protection and user revocation are essentially conflicting requirements in many cryptographic protocols. It is a particularly challenging problem to harmonize them in a secret handshake protocol that is geared...
详细信息
Fraud or cheating of malicious nodes were restrained by reducing the trust value of malicious nodes in the past trust model, but few recommendation nodes for cooperation cheating are punished, so it has had only limit...
详细信息
暂无评论