Menu

Blog

Page 7683

Apr 7, 2020

Multiplexed single-molecule enzyme activity analysis for counting disease-related proteins in biological samples

Posted by in category: biotech/medical

We established an ultrasensitive method for identifying multiple enzymes in biological samples by using a multiplexed microdevice-based single-molecule enzymatic assay. We used a paradigm in which we “count” the number of enzyme molecules by profiling their single enzyme activity characteristics toward multiple substrates. In this proof-of-concept study of the single enzyme activity–based protein profiling (SEAP), we were able to detect the activities of various phosphoric ester–hydrolyzing enzymes such as alkaline phosphatases, tyrosine phosphatases, and ectonucleotide pyrophosphatases in blood samples at the single-molecule level and in a subtype-discriminating manner, demonstrating its potential usefulness for the diagnosis of diseases based on ultrasensitive detection of enzymes.

Cellular functions are mediated by the activities of diverse enzymes, and hence, determining the functional changes that occur in these enzymes during pathogenesis is crucial for understanding and detecting diseases (1). However, the detection sensitivity of conventional assays for discovering and using enzyme biomarkers for diagnosis needs to be improved. In case of DNA and RNA analysis, enhancing the sensitivity of detection to the single-molecule level has revolutionized biomarker discovery and usage (2). However, the detection methods for proteins, which are thought to contain more functionality-oriented information that can be directly linked to the phenotypes, are yet to attain such a high degree of sensitivity (3).

In this study, we developed a novel assay platform for comprehensively detecting multiple enzymes in biological samples at single protein level for ultrasensitive and quantitative profiling of the disease-related enzymatic activities. This method is based on single-molecule enzyme analysis performed in a microfabricated chamber device, in which single-molecule enzymes in a diluted biological sample are separately loaded into individual microchambers for measuring and detecting its activity (4, 5). Although conventional single-molecule analysis is commonly used to study the biochemical properties of specific enzymes, their application for analyzing biological samples containing complex mixtures of characterized and uncharacterized proteins remains challenging, as it is difficult to predict which enzyme is loaded into each chamber due to random distribution.

Apr 7, 2020

New genetic engineering strategy makes human-made DNA invisible

Posted by in categories: bioengineering, biotech/medical, genetics

Scientists can identify pathogenic genes through genetic engineering. This involves adding human-made DNA into a bacterial cell. However, the problem is that bacteria have evolved complex defense systems to protect against foreign intruders — especially foreign DNA. Current genetic engineering approaches often disguise the human-made DNA as bacterial DNA to thwart these defenses, but the process requires highly specific modifications and is expensive and time-consuming.

In a paper published recently in the Proceedings of the National Academy of Sciences journal, Dr. Christopher Johnston and his colleagues at the Forsyth Institute describe a new technique to genetically engineer bacteria by making human-made DNA invisible to a bacterium’s defenses. In theory, the method can be applied to almost any type of bacteria.

Johnston is a researcher in the Vaccine and Infectious Disease Division at the Fred Hutchinson Cancer Research Center and lead author of the paper. He said that when a bacterial cell detects it has been penetrated by foreign DNA, it quickly destroys the trespasser. Bacteria live under constant threat of attack by a virus, so they have developed incredibly effective defenses against those threats.

Apr 7, 2020

Self-Healing Pipelines

Posted by in categories: biotech/medical, materials

Circa 2006


Fixing leaking pipelines can be tricky and expensive. But now engineers at a company in Aberdeen, Scotland, have developed a novel way to get the job done. It involves using artificial platelets inspired by the way our blood clots when we get cut.

The platelets, actually small pieces of polymeric or elastomeric material, are introduced into the pipeline upstream and use the flow of the fluid to carry them down the pipe toward the leak. There the pressure forcing the fluid out of the leak causes the platelets to amass at the point of rupture, clogging up the escaping fluid in the process, says Klaire Evans, sales and marketing engineer with Brinker Technology, which is developing the technology.

The method has been tested on a handful of pipelines owned by BP and Shell. According to Sandy Meldrum, an engineer with BP, in Aberdeen, the technology was used to fix a leak in an undersea water injection pipe at an oil field near the Scottish Shetland Isles. Normally this kind of leak would have to be fixed using remotely operated vehicles, whose operators would place a clamp over the leak. But by using Brinker’s technology, BP saved about $3 million, says Meldrum.

Apr 7, 2020

Ever heard of a self-healing building? Just wait

Posted by in category: materials

Circa 2015


This nifty “bio-concrete” might help buildings stand a little longer.

Apr 7, 2020

Engineering Volcanoes

Posted by in categories: engineering, health

Science yearns to discover a means to control or stop volcanic eruptions before they begin. To date there have been no successful efforts to start, stop or reduce a volcanic eruption; however, the ideas exists and discussion is underway. By accurately forecasting or minimizing a volcanic eruption, scientists and decision makers can reduce the risk and damage to human health and property through preparation and evacuation. Unfortunately, eruption forecasting is not totally accurate or reliable. However, if we are able to initiate a volcanic eruption we could schedule the event and prepare, properly evacuate and effectively eliminate risk to human well being. Think of it as a “geologic Caesarean” ™. Other techniques to control an eruption could include depressurization of the magma chamber or increasing the aperture of the vent to diffuse the energy of an eruption.

Apr 7, 2020

New Nanocrystal Transforms Regular Glasses Into Night Vision Specs

Posted by in category: nanotechnology

:oooo.


A single nanoparticle is just 300 nanometers wide, but an array of them create what’s called a metamaterial with superior capabilities. Researchers used this tech to create better night vision goggles powered by nanocrystals, which can convert photons of infrared light into visible light.

Apr 7, 2020

DARPA seeks enhanced low-light navigation performance for unmanned systems

Posted by in categories: robotics/AI, security

A new programme from the US Defense Advanced Research Projects Agency (DARPA) aims to address a key weakness of autonomous and semi-autonomous land systems: the need for active illumination to navigate in low-light conditions.

Unmanned systems rely on active illumination — anything that emits light or electromagnetic radiation, such as light detection and ranging (LIDAR) systems — to navigate at night or underground.

However, according to Joe Altepeter, programme manager in DARPA’s Defense Sciences Office, this approach creates significant security concerns, as such emissions could be detected by potential adversaries.

Apr 7, 2020

This Breakthrough Just Got Us One Step Closer to a Quantum Internet

Posted by in categories: internet, military, quantum physics, satellites

The US is well behind China on this front, though. A team led by quantum supremo Jian-Wei Pan have already demonstrated a host of breakthroughs in transmitting quantum signals to satellites, most recently developing a mobile quantum satellite station.

The reason both countries are rushing to develop the technology is that it could provide an ultra-secure communication channel in an era where cyberwarfare is becoming increasingly common.

I t’s essentially impossible to eavesdrop on a quantum conversation. The strange rules of quantum mechanics mean that measuring a quantum state immediately changes it, so any message encoded in quantum states will be corrupted if someone tries to intercept it.

Apr 7, 2020

Bloodshot: Based on the bestselling comic book

Posted by in categories: entertainment, nanotechnology

Vin Diesel stars as Ray Garrison, a soldier recently killed in action and brought back to life as the superhero Bloodshot by the RST corporation. With an army of nanotechnology in his veins, he’s an unstoppable force –stronger than ever and able to heal instantly. But in controlling his body, the company has sway over his mind and memories, too. Now, Ray doesn’t know what’s real and what’s not – but he’s on a mission to find out.

Apr 7, 2020

How serotonin balances communication within the brain

Posted by in categories: mobile phones, neuroscience

The brain is steadily engaged in thought. These internal communications are also usually bombarded with external sensory events. Hence, the impact of the two neuronal processes need to be permanently fine-tuned to avoid their imbalance. A team of scientists at the Ruhr-Universität Bochum (RUB) has now revealed the role of the neurotransmitter serotonin in this mechanism. They discovered that distinct serotonergic receptor types control the gain of both streams of information in a separable manner. Their findings may facilitate new concepts of diagnosis and therapies for neuronal disorders related to malfunction of the serotonin system. The study is published online in the open access journal eLife on 7 April 2020.

Impacting on different streams of information in the brain

Dr. Dirk Jancke, head of the Optical Imaging Group at the Institute of Neural Computation, says, “Imagine sitting with your family at dinner, and a heated debate is going on about how to properly organize some internal affairs. Suddenly, the phone starts ringing; you are picking up while family discussion goes on. In order to understand the calling party correctly, the crowd in the back must speak lower or the caller needs to speak up. Thus, the loudness of each internal background conversation and external call need to be properly adjusted to ensure non-interfered, separable information transfer.” As in this anecdote, comparable processes involve .