The Hill equation revisited: uses and misuses.

نویسنده

  • J N Weiss
چکیده

The Hill coefficient is commonly used to estimate the number of ligand molecules that are required to bind to a receptor to produce a functional effect. However, for a receptor with more than one ligand binding site, the Hill equation does not reflect a physically possible reaction scheme; only under the very specific condition of marked positive cooperativity does the Hill coefficient accurately estimate the number of binding sites. The Hill coefficient is best thought of as an "interaction" coefficient, reflecting the extent of cooperativity among multiple ligand binding sites. Several relatively simple, physically plausible reaction schemes are shown here to produce a variety of ligand dose-response curve phenotypes more appropriately suited to modeling ligand-receptor interactions, especially if independent information about the stochiometry of the ligand-receptor interaction is available.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

QUICKSELECT Revisited

We give an overview of the running time analysis of the random divide-and-conquer algorithm FIND or QUICKSELECT. The results concern moments, distribution of FIND’s running time, the limiting distribution, a stochastic bound and the key: a stochastic fixed point equation.

متن کامل

High level Ab inito bench mark computaions on weak interactions (H2)2 dimer revisited

The Potential Energy Surface PES of (H2)2 dimer has been investigated, using five simple rigid rotor models. These models are called: head to head, symmetric side to side, L , steplike and T model. All calculations were done at two levels of ab initio  methods: MP2(Full) and QCISD (T,Full) using cc-pVTZ basis set at singlet state of spin multiplicity. The results of scanning PES were then fitte...

متن کامل

How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols

This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad-hoc On-Demand Distance Vector (AODV) protocol as an example. It identifies a number of attack goals, and then studies how to achieve these goals through misuses of the routing messages. To facilitate the analysis, it classifies insider attacks into two categories: atomic misuses an...

متن کامل

How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols

This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It identifies a number of attack goals and then study how to achieve these goals through misuses of the routing messages. To facilitate the analysis, this paper classifies the insider attacks into two categories: atomic m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • FASEB journal : official publication of the Federation of American Societies for Experimental Biology

دوره 11 11  شماره 

صفحات  -

تاریخ انتشار 1997