Difference between revisions of "Team:UNOTT/Description"

 
(318 intermediate revisions by 4 users not shown)
Line 1: Line 1:
{{UNOTT}}
+
{{:Team:UNOTT/Template/NavBarTest}}
 +
 
 
<html>
 
<html>
  
 +
<head>
 +
<meta name="viewport" content="width=device-width, initial-scale=1">
 +
<meta charset="UTF-8">
 +
<link href="https://fonts.googleapis.com/css?family=Karla" rel="stylesheet">
  
 +
<style>
 +
      @import url(https://fonts.googleapis.com/css?family=Lato:300,400,300italic,400italic);
  
<div class="column full_size">
+
      /* Base Styles
<h1>Description</h1>
+
      ===================================*/
 +
      body {
 +
     
 +
      font-family: 'Lato', sans-serif;
 +
      font-weight: 400;
 +
      line-height: 1.8;
 +
        background-color: #fff;
 +
        width: auto;
 +
        position:absolute;
  
<h5>Password security is broken</h5>
+
      }
<p>Due to the recent explosion in hacking incidents, we were interested at looking into how biological systems can be used to overcome the limitations of current passwords. Although there was the possibility to use certain DNA sequences as passwords, the speed of current sequencing technologies and problems with mutating the bacteria to a point where it could not survive were limiting to the success and randomness of this option. For that reason we turned to using physical properties of bacteria such as its metabolome to create a biological password.</p>
+
  
  
<h2>The Idea: <i>Key. coli</i></h2>
+
      /* Layout Styles
<ul>
+
      ===================================*/
<li> The first biological password that changes over time!
+
      section:not(:first-of-type),
We are looking into transforming bacteria with a unique array of existing iGEM systems to produce a unique signal of secondary metabolites, initially using fluorescence as a proof of concept. Eventually, we will use the system to produce a unique and random configuration of products, as our "key". In order to produce this randomness, alteration of the activity/presence of promoters associated with these metabolites will be applied using one of a few methods currently being considered by the team (detailed below).</li>
+
      section:not(:nth-of-type(n2)) {
<li>This key will be used to open safes, secure doors and various other locks. Measurement of certain engineered metabolites such as volatiles will give a distinct mass spectrum. A combination of a detection technique such as gas chromotography-mass spectrometry with a data comparison software will compare the secondary metabolites of the "key" bacteria to the "reference/lock" from which it was taken. If the spectra of both colonies exceeds a threshold of similarity then the system is unlocked.</li>
+
      margin-top: 80px;
<li>After an amount of time, our Key will have to be renewed from the Lock colony, and when this occurs the configuration of the key is shuffled once again to ensure the key and lock are changing. </li>
+
      }
</ul>
+
      .section-two,
 +
      .section-three,
 +
      footer {
 +
      margin-top: 80px;
 +
      }
  
  
</div>
+
     
  
<div class="column full_size" >
+
      /* Cover / Jumbotron Styles
<h2>Bacterial Key Transport Device</h2>
+
      ===================================*/
<p>There is a need for a transport mechanism for the key. This presents problems depending on the bacteria used.</p>
+
      section .cover {
<p> In <i>E. coli</i>, our key transport system would need to keep our colonies alive. We have looked into a few options for key storage:</p>
+
      padding-top: 70px;
<ul>
+
     
<li>1. We could freeze the cells after assignment of promoters to genes. Freezing is one of the best ways to store bacteria and the lower the temperature, the longer the culture will retain viable cells. Ice can damage cells due to localised accumulation of salt, and it can also rupture membranes so we would need to use glycerol as a cryoprotectant. Freeze-dried cells could also be useful.</li>
+
      background-repeat: no-repeat;
<li>2. We are currently looking into a system of a similar design to a chemostat where a continual supply of medium will allow maintenance of a culture.
+
      background-size: cover;
<li>3. Other options such as utilising microfluidics. </li>
+
      height: 100vh;
 +
        width: 100vw;
 +
     
 +
      display: -ms-flexbox;
 +
      display: flex;
 +
       
 +
      }
  
<p>For the key to be practical it would need to be portable, this is where the design of our key transport device comes in. We will be contacting experts for advice on the design of a product.</p>
 
  
</ul>
+
      /* Section One Styles
</div>
+
      ===================================*/
 +
      .section-one-content {
 +
      padding: 40px 20px;
 +
      color: #ffffff;
 +
      font-weight: 300;
 +
      }
 +
      .section-one-content h1 {
 +
      margin: 0 0 20px;
 +
      }
 +
      #section-one-left {
 +
      background: #183532;
 +
      }
 +
      #section-one-middle {
 +
      background: #244F4A;
 +
      }
 +
      #section-one-right {
 +
      background: #2A5C56;
 +
      }
  
 +
      .section-two,
 +
      .section-three {
 +
        margin: auto;
 +
    width: 60%;
 +
    padding: 10px;
 +
    font-family: 'Karla', sans-serif;
 +
    background-color: #ffffff;
 +
     
 +
      }
  
<div class="column full_size" >
+
      /* CSS Image Styles
<h5> Creation of distinct spectra of different metabolite levels </h5>
+
      ====================================================*/
<h5> Promoter selection </h5>
+
      .css-img-wrapper {
<p>We would select a range of possible promoters to give a wide variety of product expression levels.</p>
+
          display: -webkit-box;
<p>We are looking at the following methods to achieve a random selection of product levels within any given bacteria:</p>
+
          display: -ms-flexbox;
<ul>
+
          display: flex;
<li>1. Transposon shuffling of promoters between products. </li>
+
          -webkit-box-orient: vertical;
<li>2. dCas9 and a randomly selected gRNA from a library of gRNAs that can interfere differentially with the promoters associated with products.</li>
+
          -webkit-box-direction: normal;
</ul>
+
              -ms-flex-direction: column;
</div>
+
                  flex-direction: column;
 +
          -ms-flex-wrap: nowrap;
 +
              flex-wrap: nowrap;
 +
          -webkit-box-pack: center;
 +
              -ms-flex-pack: center;
 +
                  justify-content: center;
 +
          -ms-flex-line-pack: center;
 +
              align-content: center;
 +
          -webkit-box-align: center;
 +
              -ms-flex-align: center;
 +
                  align-items: center;
 +
      }
 +
      .img-designers,
 +
      .img-developers {
 +
      height: 400px;
 +
      width: 400px;
 +
      background-position: center center;
 +
      background-size: cover;
 +
      }
 +
      .img-designers {
 +
      background: #183532;
 +
      }
 +
      .img-developers {
 +
      background: #2A5C56;
 +
      }
  
  
  
 +
      /* Media Styles
 +
      ===================================*/
 +
      @media (min-width: 480px) {
 +
      body {
 +
      font-size: 16px;
 +
             
 +
               
 +
      }
 +
      }
 +
      @media (min-width: 768px) {
 +
      .section-one-content {
 +
      padding: 40px 40px;
 +
      }
 +
      }
 +
      @media (min-width: 992px) {
 +
      .section-one-content {
 +
      padding: 40px 20px;
 +
      }
 +
      }
 +
      @media (min-width: 1200px) {
 +
      .section-one-content {
 +
      padding: 40px 40px;
 +
      }
 +
      }
  
<div class="column half_size" >
+
@media only screen and (max-width: 500px) {
<h5> Transposons </h5>
+
    .section.cover {
<p>Briefly describe transposon idea here: Tn7 Transposon used due to specific target site selection for its transposition, which is impossible in other transposon species, without this modular increases in promoter activity could not be achieved as random insertions would create a gradient rather than step wise expression pattern of proteins.</p>
+
        max-width:100%;
<ul>
+
    }
<li></li>
+
<li></li>
+
<li></li>
+
<li></li>
+
</ul>
+
</div>
+
  
 +
    .cover {
 +
        max-width:100%;
 +
    }
  
<div class="column half_size" >
 
<h5>dCas9 and gRNA library</h5>
 
<p>Briefly describe dCas9 idea here</p>
 
<ul>
 
<li></li>
 
<li></li>
 
<li></li>
 
<li></li>
 
</ul>
 
</div>
 
  
 +
}
  
<div class="column full_size" >
+
   
<h2>Possible Metabolites</h2>
+
.maintext {
<p>The metabolites that will be coded for by our constructs will be those previously registered with iGEM by previous teams,
+
position: absolute;
as the focus of this project falls on the assortment and variety of expression levels rather than the specific product. Nevertheless, we are looking into selecting various products that will be detectable by techniques such as GCMS and will not interact with eachother. We will also choose products that are easily distinguishable from eachother on spectra. Currently our list of potential metabolites includes the following:</p>
+
left: 33%%;
<ul>
+
top: 10%;
<li> product x by team x (insert wiki link here)</li>
+
}
<li> product y by team y (insert wiki link here)</li>
+
 
</ul>
+
.maintext2 {
 +
position: absolute;
 +
left: 33%;
 +
top: 40%;
 +
}
 +
 
 +
.mainimage{
 +
max-width: 100%;
 +
height: auto;
 +
}
 +
 
 +
.contentmargin {
 +
    margin: auto;
 +
    width: 60%;
 +
    padding: 10px;
 +
    font-family: 'Karla', sans-serif;
 +
    background-color: #ffffff;
 +
}
 +
 
 +
h1 {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #34495E;
 +
}
 +
h2 {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #34495E;
 +
}
 +
p {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #4b524a;
 +
 
 +
.ourkey {
 +
position: relative;
 +
top:15px;
 +
}
 +
h5 {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #4b524a;
 +
</style>
 +
</head>
 +
 
 +
<body>
 +
<div id="container" style=" background-color: #02263E;">
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<h1 style="text-align: center;"><span style="color: #ffffff;">PROJECT DESCRIPTION</span></h1>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
</div>
 
</div>
  
 +
<br>
 +
<br>
 +
<br>
 +
<!-- Section Two; -->
 +
<section class="container section-two" id="spydesingers">
 +
<div class="row">
 +
<div class="col-md-6 to-match">
 +
<h1>What?</h1>
 +
<article>
 +
<p><b><i>Key. coli</i> provides a new, more secure, form of key for accessing content.</b> It uses random ligations and large repertoires of possible components to generate unique combinations of expression profiles; this next generation biological key could be the next BIG thing in security; watch this space!
  
 +
</p>
 +
                 
 +
 +
 +
</article>
 +
</div>
 +
 +
<img class="ourkey" src="https://static.igem.org/mediawiki/2017/3/36/T--UNOTT--keyk.png" style="width:40%;height:auto;">
  
 +
  
 +
 +
</section>
 +
<!--//Close Section Two -->
 +
 +
 +
 +
<div class="contentmargin">
 +
<h1>Why?</h1>
 +
 +
 +
<p><b>Major hacking incidents are increasingly common,</b> with accounts being hacked and sensitive information stolen. Many companies are moving away from conventional passwords, which are proving to be unreliable in the hands of the public. Banks are now using physical biometric authentication procedures to correctly identify account owners. This new direction opens a market for biological “passwords”. An ideal system would be as separate from online software programs as possible while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers, so we can programme cells to act as a changeable biometric password. </p>
 +
  
  
  
 +
 +
 +
<h1>How?</h1>
 +
 +
<p><b>A key must be unique, measurable and unpredictable.</b> In <i>Key. coli</i>, all these requirements are achieved by the random generation of modular vectors that are expressed in Escherichia coli to produce a unique and detectable fluorescent pattern. This pattern is obtained when different fluorescent proteins (GFP, RFP, CFP) and various promoters, subjected to transcription interference by dCas9, are randomly combined during ligation and transformed into the cells to generate the key. </p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
 +
<img src="https://static.igem.org/mediawiki/2017/8/84/UNOTT2017-How1.png" alt="" width="100%" height="100%">
 +
<h5><b> Figure 1:</b> Two-plasmid modular process used to generate random<i>Key. coli</i> construct(s)<p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p><p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<img src="https://static.igem.org/mediawiki/2017/b/bc/UNOTT2017-How2.png" alt="" width="100%" height="100%"></h5>
 +
 +
<h5><b>Figure 2:</b> Random ligation process and colony picking allows large numbers of plasmid variants to be created for use in keys. </p> <p><span style="color: #ffffff;">&nbsp;</span></p></h5>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<br>
 +
<p>A key transport device, based on freeze-dried <i>Key. coli</i>, allows the bacteria to survive and be transported anywhere with ease. Once entry to a lock is desired, the <i>Key. coli</i> device can be activated, and the output read in a suitable detection device. </p>
 +
 +
<h1><i>Key. coli</i> Summary</h1>
 +
 +
 +
<p><img src="https://static.igem.org/mediawiki/2017/8/83/UNOTT2017-summary.png" alt="" width="100%" height="auto" /></p>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
 +
 +
</div>
 +
</body>
 
</html>
 
</html>
 +
{{:Team:UNOTT/Template/Footer}}

Latest revision as of 03:45, 2 November 2017

 

 

 

PROJECT DESCRIPTION

 




What?

Key. coli provides a new, more secure, form of key for accessing content. It uses random ligations and large repertoires of possible components to generate unique combinations of expression profiles; this next generation biological key could be the next BIG thing in security; watch this space!

Why?

Major hacking incidents are increasingly common, with accounts being hacked and sensitive information stolen. Many companies are moving away from conventional passwords, which are proving to be unreliable in the hands of the public. Banks are now using physical biometric authentication procedures to correctly identify account owners. This new direction opens a market for biological “passwords”. An ideal system would be as separate from online software programs as possible while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers, so we can programme cells to act as a changeable biometric password.

How?

A key must be unique, measurable and unpredictable. In Key. coli, all these requirements are achieved by the random generation of modular vectors that are expressed in Escherichia coli to produce a unique and detectable fluorescent pattern. This pattern is obtained when different fluorescent proteins (GFP, RFP, CFP) and various promoters, subjected to transcription interference by dCas9, are randomly combined during ligation and transformed into the cells to generate the key.

 

 

Figure 1: Two-plasmid modular process used to generate randomKey. coli construct(s)

 

 

 

 

Figure 2: Random ligation process and colony picking allows large numbers of plasmid variants to be created for use in keys.

 

 


A key transport device, based on freeze-dried Key. coli, allows the bacteria to survive and be transported anywhere with ease. Once entry to a lock is desired, the Key. coli device can be activated, and the output read in a suitable detection device.

Key. coli Summary