64 research outputs found

    Structure and formation energy of carbon nanotube caps

    Full text link
    We present a detailed study of the geometry, structure and energetics of carbon nanotube caps. We show that the structure of a cap uniquely determines the chirality of the nanotube that can be attached to it. The structure of the cap is specified in a geometrical way by defining the position of six pentagons on a hexagonal lattice. Moving one (or more) pentagons systematically creates caps for other nanotube chiralities. For the example of the (10,0) tube we study the formation energy of different nanotube caps using ab-initio calculations. The caps with isolated pentagons have an average formation energy 0.29+/-0.01eV/atom. A pair of adjacent pentagons requires a much larger formation energy of 1.5eV. We show that the formation energy of adjacent pentagon pairs explains the diameter distribution in small-diameter nanotube samples grown by chemical vapor deposition.Comment: 8 pages, 8 figures (gray scale only due to space); submitted to Phys. Rev.

    cisRED: a database system for genome-scale computational discovery of regulatory elements

    Get PDF
    We describe cisRED, a database for conserved regulatory elements that are identified and ranked by a genome-scale computational system (). The database and high-throughput predictive pipeline are designed to address diverse target genomes in the context of rapidly evolving data resources and tools. Motifs are predicted in promoter regions using multiple discovery methods applied to sequence sets that include corresponding sequence regions from vertebrates. We estimate motif significance by applying discovery and post-processing methods to randomized sequence sets that are adaptively derived from target sequence sets, retain motifs with p-values below a threshold and identify groups of similar motifs and co-occurring motif patterns. The database offers information on atomic motifs, motif groups and patterns. It is web-accessible, and can be queried directly, downloaded or installed locally

    RNA expression of TLR10 in normal equine tissues

    Get PDF
    Background: Toll like receptors are one of the major innate immune system pathogen recognition systems. There is little data on the expression of the TLR10 member of this family in the horse. Results: This paper describes the genetic structure of the Equine TLR10 gene and its RNA expression in a range of horse tissues. It describes the phylogenetic analysis of the Equine TLR1,6,10,2 annotations in the horse genome, firmly identifying them in their corresponding gene clades compared to other species and firmly placing the horse gene with other TLR10 genes from odd-toed ungulates. Additional 3’ transcript extensions to that annotated for TLR10 in the horse genome have been identified by analysis of RNAseq data. RNA expression of the equine TLR10 gene was highest in peripheral blood mononucleocytes and lymphoid tissue (lymph nodes and spleen), however some expression was detected in all tissues tested (jejunum, caudal mesenteric lymph nodes, bronchial lymph node, spleen, lung, colon, kidney and liver). Additional data on RNAseq expression of all equine TLR genes (1–4 and 6–10) demonstrate higher expression of TLR4 than other equine TLRs in all tissues. Conclusion: The equine TLR10 gene displays significant homology to other mammalian TLR10 genes and could be reasonably assumed to have similar fuctions. Its RNA level expression is higher in resting state PBMCs in horses than in other tissues

    Critical analysis of information security culture definitions

    Get PDF
    This article aims to advance the understanding of information security culture through a critical reflection on the wide-ranging definitions of information security culture in the literature. It uses the hermeneutic approach for conducting literature reviews. The review identifies 16 definitions of information security culture in the literature. Based on the analysis of these definitions, four different views of culture are distinguished. The shared values view highlights the set of cultural value patterns that are shared across the organization. An action-based view highlights the behaviors of individuals in the organization. A mental model view relates to the abstract view of the individual’s thinking on how information security culture must work. Finally, a problem-solving view emphasizes a combination of understanding from shared value-based and action-based views. The paper analyzes and presents the limitations of these four views of information security culture definitions
    • …
    corecore