Search results for "Transfer"
showing 10 items of 5271 documents
Functional characterization of the human tRNA methyltransferases TRMT10A and TRMT10B
2020
Abstract The TRM10 family of methyltransferases is responsible for the N1-methylation of purines at position 9 of tRNAs in Archaea and Eukarya. The human genome encodes three TRM10-type enzymes, of which only the mitochondrial TRMT10C was previously characterized in detail, whereas the functional significance of the two presumably nuclear enzymes TRMT10A and TRMT10B remained unexplained. Here we show that TRMT10A is m1G9-specific and methylates a subset of nuclear-encoded tRNAs, whilst TRMT10B is the first m1A9-specific tRNA methyltransferase found in eukaryotes and is responsible for the modification of a single nuclear-encoded tRNA. Furthermore, we show that the lack of G9 methylation cau…
Eukaryotic rRNA Modification by Yeast 5-Methylcytosine-Methyltransferases and Human Proliferation-Associated Antigen p120.
2015
International audience; Modified nucleotide 5-methylcytosine (m(5)C) is frequently present in various eukaryotic RNAs, including tRNAs, rRNAs and in other non-coding RNAs, as well as in mRNAs. RNA: m(5)C-methyltranferases (MTases) Nop2 from S. cerevisiae and human proliferation-associated nucleolar antigen p120 are both members of a protein family called Nop2/NSUN/NOL1. Protein p120 is well-known as a tumor marker which is over-expressed in various cancer tissues. Using a combination of RNA bisulfite sequencing and HPLC-MS/MS analysis, we demonstrated here that p120 displays an RNA:m(5)C-MTase activity, which restores m(5)C formation at position 2870 in domain V of 25S rRNA in a nop2 Delta …
Absolute quantification of noncoding RNA by microscale thermophoresis
2019
Abstract Accurate quantification of the copy numbers of noncoding RNA has recently emerged as an urgent problem, with impact on fields such as RNA modification research, tissue differentiation, and others. Herein, we present a hybridization‐based approach that uses microscale thermophoresis (MST) as a very fast and highly precise readout to quantify, for example, single tRNA species with a turnaround time of about one hour. We developed MST to quantify the effect of tRNA toxins and of heat stress and RNA modification on single tRNA species. A comparative analysis also revealed significant differences to RNA‐Seq‐based quantification approaches, strongly suggesting a bias due to tRNA modifica…
Numerical Recovery of Source Singularities via the Radiative Transfer Equation with Partial Data
2013
The inverse source problem for the radiative transfer equation is considered, with partial data. Here we demonstrate numerical computation of the normal operator $X_{V}^{*}X_{V}$ where $X_{V}$ is the partial data solution operator to the radiative transfer equation. The numerical scheme is based in part on a forward solver designed by F. Monard and G. Bal. We will see that one can detect quite well the visible singularities of an internal optical source $f$ for generic anisotropic $k$ and $\sigma$, with or without noise added to the accessible data $X_{V}f$. In particular, we use a truncated Neumann series to estimate $X_{V}$ and $X_{V}^{*}$, which provides a good approximation of $X_{V}^{*…
Revisiting rainfall to explore exam questions and performance on CS1
2015
The Rainfall problem comprises small tasks that have been used to investigate student performance in introductory programming. We conducted several kinds of analyses to inform our understandings of student performance in CS1 relating to this problem. We analyzed implementation approaches and program errors, as in related studies, and also explored the role of test writing vis-a-vis the most common student error. Finally, using correlation analyses and manual inspection of the exam answers, we studied how well the Rainfall problem served as an exam question. The students' implementation choices reflected their familiarity with particular loop constructs, while the single most common error co…
Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications
2014
Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…
Utilizing online serious games to facilitate distributed requirements elicitation
2015
Online serious games are used to facilitate distributed requirements elicitation.Interactive games enhance collaboration and communication between project members.Serious games raise individuals' confidence to engage in requirements elicitation.Using serious games can improve both quality and quantity of software requirements.Serious games specially enhance the performance of less-experienced stakeholders. Requirements elicitation is one of the most important and challenging activities in software development projects. A variety of challenges related to requirements elicitation are reported in the literature, of which the lack of proper communication and knowledge transfer between software …
Recommending Serendipitous Items using Transfer Learning
2018
Most recommender algorithms are designed to suggest relevant items, but suggesting these items does not always result in user satisfaction. Therefore, the efforts in recommender systems recently shifted towards serendipity, but generating serendipitous recommendations is difficult due to the lack of training data. To the best of our knowledge, there are many large datasets containing relevance scores (relevance oriented) and only one publicly available dataset containing a relatively small number of serendipity scores (serendipity oriented). This limits the learning capabilities of serendipity oriented algorithms. Therefore, in the absence of any known deep learning algorithms for recommend…
High-Performance Lead-Acid Batteries Enabled by Pb and PbO2 Nanostructured Electrodes: Effect of Operating Temperature
2021
Lead-acid batteries are now widely used for energy storage, as result of an established and reliable technology. In the last decade, several studies have been carried out to improve the performance of this type of batteries, with the main objective to replace the conventional plates with innovative electrodes with improved stability, increased capacity and a larger active surface. Such studies ultimately aim to improve the kinetics of electrochemical conversion reactions at the electrode-solution interface and to guarantee a good electrical continuity during the repeated charge/discharge cycles. To achieve these objectives, our contribution focuses on the employment of nanostructured electr…
The new face of university–business cooperation in Finland
2016
This paper analyses the development of university-business cooperation (UBC) in Finland in the context of the University Reform Act of 2009, drawing on the experience of four universities: Aalto University, University of Jyvaskyla, University of Turku, and Lappeenranta University of Technology. Six UBC dimensions are examined: institutional context, stakeholders, motivations, facilitators/inhibitors, benefits, and drawbacks. We find that UBC, while a relatively recent process, is growing fast in dynamic local innovation and entrepreneurship ecosystems. The University Act of 2009 had an uneven effect on the six UBC dimensions, with the most visible impact being manifested on motivations. Aal…