scholarly journals Phage G Structure at 6.1 Å Resolution, Condensed DNA, and Host Identity Revision to a Lysinibacillus

2020 ◽  
Vol 432 (14) ◽  
pp. 4139-4153 ◽  
Author(s):  
Brenda González ◽  
Lyman Monroe ◽  
Kunpeng Li ◽  
Rui Yan ◽  
Elena Wright ◽  
...  
Keyword(s):  
Author(s):  
George C. Ruben ◽  
Kenneth A. Marx

Certain double stranded DNA bacteriophage and viruses are thought to have their DNA organized into large torus shaped structures. Morphologically, these poorly understood biological DNA tertiary structures resemble spermidine-condensed DNA complexes formed in vitro in the total absence of other macromolecules normally synthesized by the pathogens for the purpose of their own DNA packaging. Therefore, we have studied the tertiary structure of these self-assembling torus shaped spermidine- DNA complexes in a series of reports. Using freeze-etch, low Pt-C metal (10-15Å) replicas, we have visualized the microscopic DNA organization of both calf Thymus( CT) and linear 0X-174 RFII DNA toruses. In these structures DNA is circumferentially wound, continuously, around the torus into a semi-crystalline, hexagonal packed array of parallel DNA helix sections.


Zygote ◽  
1997 ◽  
Vol 5 (3) ◽  
pp. 213-217 ◽  
Author(s):  
J. Fulka ◽  
N.L. First ◽  
C. Lee ◽  
J. Fulka ◽  
R.M. Moor

SummaryImmature mouse oocytes (germinal vesicle stage, GV), oocytes at different stages during maturation (prometaphase to anaphase I) and matured oocytes (metaphase II arrested) were cultured in 6-dimethylaminopurine (6-DMAP)-supplemented medium also containing bromodeoxyuridine for the assessment of DNA replication in these cells. Immature oocytes remained arrested at the GV stage and DNA replication was never detected in them. On the other hand, oocytes at the prometaphase to anaphase-telophase I stages responded to 6-DMAP treatment by forming nuclei which synthesised DNA. Mature (metaphase II) oocytes did not respond to 6-DMAP and their chromatin remained condensed. DNA synthesis could even be induced in GV-staged oocytes, but only when they were fused to freshly activated oocytes and incubated in 6-DMAP-supplemented medium.


2007 ◽  
Vol 79 (5) ◽  
pp. 58001 ◽  
Author(s):  
Y Murayama ◽  
H Wada ◽  
M Sano

2006 ◽  
Vol 29 (6) ◽  
pp. 1290-1293 ◽  
Author(s):  
Takashi Nakamura ◽  
Rumiko Moriguchi ◽  
Kentaro Kogure ◽  
Arisa Minoura ◽  
Tomoya Masuda ◽  
...  

Author(s):  
László Bokor ◽  
Zoltán Faigl ◽  
Sándor Imre

This paper is committed to give an overview of the Host Identity Protocol (HIP), to introduce the basic ideas and the main paradigms behind it, and to make an exhaustive survey of mobility management schemes in the Host Identity Layer. The authors' goal is to show how HIP emerges from the list of potential alternatives with its wild range of possible usability, complex feature set and power to create a novel framework for future Mobile Internet architectures. In order to achieve this, the authors also perform an extensive simulation evaluation of four selected mobility solutions in the Host Identity Layer: the standard HIP mobility/multihoming (RFC5206), a micromobility solution (µHIP), a network mobility management scheme (HIP-NEMO) and a proactive, cross-layer optimized, distributed proposal designed for flat architectures (UFA-HIP).


2010 ◽  
Vol 1 (1) ◽  
pp. 79-94 ◽  
Author(s):  
Janne Lindqvist ◽  
Essi Vehmersalo ◽  
Miika Komu ◽  
Jukka Manner

Firewalls are an essential component of the Internet and enterprise network security policy enforcement today. The configurations of enterprise firewalls are typically rather static. Even if client’s IP addresses can be dynamically added to the packet filtering rules, the services allowed through the firewall are commonly still fixed. In this paper, we present a transparent firewall configuration solution based on mobile cryptographic identifiers of Host Identity Protocol (HIP). HIP allows a client to protect the data transfer with IPsec ESP, and supports dynamic address changes for mobile clients. The HIP-based firewall learns the identity of a client when it communicates with the server over HIP. The firewall configures the necessary rules based on HIP control messages passing through the firewall. The solution is secure and flexible, and introduces only minimal latency to the initial HIP connection establishment.


1999 ◽  
Vol 27 (15) ◽  
pp. 3090-3095 ◽  
Author(s):  
V. S. Trubetskoy ◽  
A. Loomis ◽  
J. E. Hagstrom ◽  
V. G. Budker ◽  
J. A. Wolff

Sign in / Sign up

Export Citation Format

Share Document