Difference between revisions of "Team:UNOTT/Software"

Line 278: Line 278:
  
 
<p> Figure 4 - The files are too dissimilar! Access isn't allowed. </p>
 
<p> Figure 4 - The files are too dissimilar! Access isn't allowed. </p>
<img src="https://static.igem.org/mediawiki/2017/f/f0/T--UNOTT--LucyGraph2.png" class="border" align="middle" width="400" height="400" >
+
<p style="text-align: center;" > <img src="https://static.igem.org/mediawiki/2017/f/f0/T--UNOTT--LucyGraph2.png" class="border" align="middle" width="400" height="400" > </p>
 
<br> </br>
 
<br> </br>
  
 
<p> Figure 5 -  Changing the threshold might accommodate this difference </p>
 
<p> Figure 5 -  Changing the threshold might accommodate this difference </p>
<img src="https://static.igem.org/mediawiki/2017/2/2b/T--UNOTT--LucyGraph3.png" class="border"  width="400" height="400" >
+
<p style="text-align: center;" > <img src="https://static.igem.org/mediawiki/2017/2/2b/T--UNOTT--LucyGraph3.png" class="border"  width="400" height="400" > </p>
 
<br> </br>
 
<br> </br>
  
Line 304: Line 304:
 
<sup> Figure 6 </sup>
 
<sup> Figure 6 </sup>
 
<br></br>
 
<br></br>
<img src="https://static.igem.org/mediawiki/2017/1/10/T--UNOTT--poly_fit.svg" width="600" height="100" >
+
<p style="text-align: center;" > <img src="https://static.igem.org/mediawiki/2017/1/10/T--UNOTT--poly_fit.svg" width="600" height="100" > </p>
  
 
<p> In order to create a formula for calculating threshold values at any given point using data from the mother colony, the team decided it would be appropriate to use Polynomial Fitting as it was found to follow the points the closest when graphed. Using the function from Figure 6 and translating it into Java, this was achieved. Furthermore, threshold could be adjusted by adding or subtracting from the equation produced </p>
 
<p> In order to create a formula for calculating threshold values at any given point using data from the mother colony, the team decided it would be appropriate to use Polynomial Fitting as it was found to follow the points the closest when graphed. Using the function from Figure 6 and translating it into Java, this was achieved. Furthermore, threshold could be adjusted by adding or subtracting from the equation produced </p>
Line 327: Line 327:
 
<p> The simulation was written in C and compiled to Linux binaries so it will only work on Linux systems. However, the source code is available so users can recompile it to their OS of choice (compiling code is inside.) In order to use it, navigate to the folder where you are keeping the program files on Terminal and type: ./loader which will activate the program. You then have to type in how much of each protein you are expecting for example, 0.1 micro-grams of sfGFP and then the wavelength of the laser you are using.</p>  
 
<p> The simulation was written in C and compiled to Linux binaries so it will only work on Linux systems. However, the source code is available so users can recompile it to their OS of choice (compiling code is inside.) In order to use it, navigate to the folder where you are keeping the program files on Terminal and type: ./loader which will activate the program. You then have to type in how much of each protein you are expecting for example, 0.1 micro-grams of sfGFP and then the wavelength of the laser you are using.</p>  
 
<p> &nbsp; </p>
 
<p> &nbsp; </p>
<img src="https://static.igem.org/mediawiki/2017/6/6e/T--UNOTT--Lucy1.png" class="border" width="600" height="400" >
+
<p style="text-align: center;" > <img src="https://static.igem.org/mediawiki/2017/6/6e/T--UNOTT--Lucy1.png" class="border" width="600" height="400" > </p>  
 
<p> &nbsp; </p>
 
<p> &nbsp; </p>
  
Line 347: Line 347:
 
<p> When speaking to our industry contacts about Key.Coli, they were very interested in seeing Key.Coli's capabilities as a Random Number Generation tool. After gaining results from the random constructions, the team set to finding out if the values could be used to generate a string of random numbers. The results are as shown. </p>
 
<p> When speaking to our industry contacts about Key.Coli, they were very interested in seeing Key.Coli's capabilities as a Random Number Generation tool. After gaining results from the random constructions, the team set to finding out if the values could be used to generate a string of random numbers. The results are as shown. </p>
  
<img src="https://static.igem.org/mediawiki/2017/0/01/T--UNOTT--RandomPoints.png" class="border" width="600" height="400" >
+
<p style="text-align: center;" > <img src="https://static.igem.org/mediawiki/2017/0/01/T--UNOTT--RandomPoints.png" class="border" width="600" height="400" > </p>  
  
 
<p> For comparison, the other values are taken from other pseudo-random and random number generators <sup> 1 </sup> </p>  
 
<p> For comparison, the other values are taken from other pseudo-random and random number generators <sup> 1 </sup> </p>  

Revision as of 21:32, 31 October 2017





SOFTWARE

Overview

Image Comparison Software

Raw Data Differentiating Software

Fluorescence Spectra Simulation

Random Number Generation

Linux Key.Coli Security Layer