Difference between revisions of "Team:UNOTT/Description"

 
(284 intermediate revisions by 4 users not shown)
Line 1: Line 1:
{{:Team:UNOTT/Template/NavBar}}
+
{{:Team:UNOTT/Template/NavBarTest}}
 +
 
 
<html>
 
<html>
 +
 
<head>
 
<head>
<div id="container" style=" background-image: url(https://static.igem.org/mediawiki/2017/e/e7/T--UNOTT--backgroundnorepeat.png);">
+
<meta name="viewport" content="width=device-width, initial-scale=1">
</head>
+
<meta charset="UTF-8">
 +
<link href="https://fonts.googleapis.com/css?family=Karla" rel="stylesheet">
  
 +
<style>
 +
      @import url(https://fonts.googleapis.com/css?family=Lato:300,400,300italic,400italic);
  
<body>
+
      /* Base Styles
 +
      ===================================*/
 +
      body {
 +
     
 +
      font-family: 'Lato', sans-serif;
 +
      font-weight: 400;
 +
      line-height: 1.8;
 +
        background-color: #fff;
 +
        width: auto;
 +
        position:absolute;
  
 +
      }
  
<h1 style="color:#white";>Project Description</h1>
 
  
<h4>Password security is broken</h5>
+
      /* Layout Styles
<p><font size="3" color="white">Due to the recent explosion in hacking incidents, we were interested at looking into how biological systems can be used to overcome the limitations of current passwords. Although there was the possibility to use certain DNA sequences as passwords, the speed of current sequencing technologies and problems with mutating the bacteria to a point where it could not survive were limiting to the success and randomness of this option. For that reason we turned to using physical properties of bacteria such as its metabolome to create a biological password.</font></p>
+
      ===================================*/
 +
      section:not(:first-of-type),
 +
      section:not(:nth-of-type(n2)) {
 +
      margin-top: 80px;
 +
      }
 +
      .section-two,
 +
      .section-three,
 +
      footer {
 +
      margin-top: 80px;
 +
      }
  
  
<h4>The Idea: <i>Key. coli</i></h2>
+
     
<ul>
+
<li> <font size="3" color="white">The first biological password that changes over time!
+
We are looking into transforming bacteria with a unique array of existing iGEM systems to produce a unique signal of secondary metabolites, initially using fluorescence as a proof of concept. Eventually, we will use the system to produce a unique and random configuration of products, as our "key". In order to produce this randomness, alteration of the activity/presence of promoters associated with these metabolites will be applied using one of a few methods currently being considered by the team (detailed below).</li>
+
<li>This key will be used to open safes, secure doors and various other locks. Measurement of certain engineered metabolites such as volatiles will give a distinct mass spectrum. A combination of a detection technique such as gas chromotography-mass spectrometry with a data comparison software will compare the secondary metabolites of the "key" bacteria to the "reference/lock" from which it was taken. If the spectra of both colonies exceeds a threshold of similarity then the system is unlocked.</li>
+
<li>After an amount of time, our Key will have to be renewed from the Lock colony, and when this occurs the configuration of the key is shuffled once again to ensure the key and lock are changing. </li>
+
</ul></font>
+
  
 +
      /* Cover / Jumbotron Styles
 +
      ===================================*/
 +
      section .cover {
 +
      padding-top: 70px;
 +
     
 +
      background-repeat: no-repeat;
 +
      background-size: cover;
 +
      height: 100vh;
 +
        width: 100vw;
 +
     
 +
      display: -ms-flexbox;
 +
      display: flex;
 +
       
 +
      }
  
  
 +
      /* Section One Styles
 +
      ===================================*/
 +
      .section-one-content {
 +
      padding: 40px 20px;
 +
      color: #ffffff;
 +
      font-weight: 300;
 +
      }
 +
      .section-one-content h1 {
 +
      margin: 0 0 20px;
 +
      }
 +
      #section-one-left {
 +
      background: #183532;
 +
      }
 +
      #section-one-middle {
 +
      background: #244F4A;
 +
      }
 +
      #section-one-right {
 +
      background: #2A5C56;
 +
      }
  
+
      .section-two,
<h4>Bacterial Key Transport Device</h2>
+
      .section-three {
<p><font size="3" color="white">There is a need for a transport mechanism for the key. This presents problems depending on the bacteria used.</p>
+
        margin: auto;
<p> In <i>E. coli</i>, our key transport system would need to keep our colonies alive. We have looked into a few options for key storage:</p>
+
    width: 60%;
<ol>
+
    padding: 10px;
<li>We could freeze the cells after assignment of promoters to genes. Freezing is one of the best ways to store bacteria and the lower the temperature, the longer the culture will retain viable cells. Ice can damage cells due to localised accumulation of salt, and it can also rupture membranes so we would need to use glycerol as a cryoprotectant. Freeze-dried cells could also be useful.</li>
+
    font-family: 'Karla', sans-serif;
<li>We are currently looking into a system of a similar design to a chemostat where a continual supply of medium will allow maintenance of a culture.
+
    background-color: #ffffff;
<li>Other options such as utilising microfluidics. </li>
+
     
</ol>
+
      }
  
<p>For the key to be practical it would need to be portable, this is where the design of our key transport device comes in. We will be contacting experts for advice on the design of a product.</font></p>
+
      /* CSS Image Styles
 +
      ====================================================*/
 +
      .css-img-wrapper {
 +
          display: -webkit-box;
 +
          display: -ms-flexbox;
 +
          display: flex;
 +
          -webkit-box-orient: vertical;
 +
          -webkit-box-direction: normal;
 +
              -ms-flex-direction: column;
 +
                  flex-direction: column;
 +
          -ms-flex-wrap: nowrap;
 +
              flex-wrap: nowrap;
 +
          -webkit-box-pack: center;
 +
              -ms-flex-pack: center;
 +
                  justify-content: center;
 +
          -ms-flex-line-pack: center;
 +
              align-content: center;
 +
          -webkit-box-align: center;
 +
              -ms-flex-align: center;
 +
                  align-items: center;
 +
      }
 +
      .img-designers,
 +
      .img-developers {
 +
      height: 400px;
 +
      width: 400px;
 +
      background-position: center center;
 +
      background-size: cover;
 +
      }
 +
      .img-designers {
 +
      background: #183532;
 +
      }
 +
      .img-developers {
 +
      background: #2A5C56;
 +
      }
  
 
  
  
+
      /* Media Styles
 +
      ===================================*/
 +
      @media (min-width: 480px) {
 +
      body {
 +
      font-size: 16px;
 +
             
 +
               
 +
      }
 +
      }
 +
      @media (min-width: 768px) {
 +
      .section-one-content {
 +
      padding: 40px 40px;
 +
      }
 +
      }
 +
      @media (min-width: 992px) {
 +
      .section-one-content {
 +
      padding: 40px 20px;
 +
      }
 +
      }
 +
      @media (min-width: 1200px) {
 +
      .section-one-content {
 +
      padding: 40px 40px;
 +
      }
 +
      }
  
<img src="http://i.imgur.com/a0liXZt.png">
+
@media only screen and (max-width: 500px) {
 +
    .section.cover {
 +
        max-width:100%;
 +
    }
  
 +
    .cover {
 +
        max-width:100%;
 +
    }
  
  
<h5> Creation of distinct spectra of different metabolite levels </h5>
+
}
<h5> Promoter selection </h5>
+
<p><font size="3" color="white">We would select a range of possible promoters to give a wide variety of product expression levels.</p>
+
<p>We are looking at the following methods to achieve a random selection of product levels within any given bacteria:</p>
+
<ol>
+
<li>Transposon shuffling of promoters between products. </li>
+
<li>dCas9 and a randomly selected gRNA from a library of gRNAs that can interfere differentially with the promoters associated with products.</li>
+
</font></ol>
+
  
 +
   
 +
.maintext {
 +
position: absolute;
 +
left: 33%%;
 +
top: 10%;
 +
}
  
 +
.maintext2 {
 +
position: absolute;
 +
left: 33%;
 +
top: 40%;
 +
}
  
 +
.mainimage{
 +
max-width: 100%;
 +
height: auto;
 +
}
  
 +
.contentmargin {
 +
    margin: auto;
 +
    width: 60%;
 +
    padding: 10px;
 +
    font-family: 'Karla', sans-serif;
 +
    background-color: #ffffff;
 +
}
  
 +
h1 {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #34495E;
 +
}
 +
h2 {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #34495E;
 +
}
 +
p {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #4b524a;
  
<h5> Transposons </h5>
+
.ourkey {
<p><font size="3" color="white">We are looking at using Tn7 transposase due to its specific target site selection, which is impossible in other transposon species, without this modular increases in promoter activity could not be achieved as random insertions would create a gradient rather than step wise expression pattern of proteins.</p>
+
position: relative;
<ul>
+
top:15px;
<li>Induce the Tn7 transposase to switch a promoter from a range within in a cassette.</li>
+
}
<li>The promoter inserted in front of each 3 of the reporter genes will be random.</li>
+
h5 {
<li>The promoters available for transposition will give different expression levels of the reporter.</li>
+
  font-weight: normal;
<li>Promoters can be switched around again when the transposase is induced again.</li>
+
  letter-spacing: -1px;
</font></ul>
+
  color: #4b524a;
 +
</style>
 +
</head>
  
 +
<body>
 +
<div id="container" style=" background-color: #02263E;">
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<h1 style="text-align: center;"><span style="color: #ffffff;">PROJECT DESCRIPTION</span></h1>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
</div>
  
+
<br>
<h5>CRISPRi or RNAi</h5>
+
<br>
<p><font size="3" color="white">The second idea is using dCas9 and a library of sgRNAs, or a library of interference RNAs. The sgRNA/iRNA that is randomly selected would target one of our promoters in a way that represses transcription of that product, which would lower the levels of that metabolite. Eventually, by adding mutations into these RNA, we would also give more combinations for repressive ability. This would give a large amount of different combinations of metabolite levels for use as our key. Initially however,
+
<br>
we would look at simply having ON/OFF levels for each metabolite.</p>
+
<!-- Section Two; -->
<ul>
+
<section class="container section-two" id="spydesingers">
<li>dCas9 can be used as a transcriptional repressor as it is nuclease deficient. A sgRNA is used as a guide to target a specific region</li>
+
<div class="row">
<li>Antisense RNAs could be used to target promoters and block ribosome binding.</li>
+
<div class="col-md-6 to-match">
<li>We could generate large libraries of sgRNAs/antisense RNAs which could be used to give different ON/OFF levels.</li>
+
<h1>What?</h1>
<li>This would be repeated to target the promoter/coding sequence of each gene in the plasmid.</li>
+
<article>
</font></ul>  
+
<p><b><i>Key. coli</i> provides a new, more secure, form of key for accessing content.</b> It uses random ligations and large repertoires of possible components to generate unique combinations of expression profiles; this next generation biological key could be the next BIG thing in security; watch this space!
  
 +
</p>
 +
                 
 +
 +
 +
</article>
 +
</div>
 +
 +
<img class="ourkey" src="https://static.igem.org/mediawiki/2017/3/36/T--UNOTT--keyk.png" style="width:40%;height:auto;">
  
 +
 +
 +
 +
</section>
 +
<!--//Close Section Two -->
 
 
<h4>Possible Metabolites</h4>
+
<p><font size="3" color="white">The metabolites that will be coded for by our constructs will be those previously registered with iGEM by previous teams,
+
as the focus of this project falls on the assortment and variety of expression levels rather than the specific product. Nevertheless, we are looking into selecting various products that will be detectable by techniques such as volatiles being detected by GCMS. We are also looking at products that will not interfere with eachother. We will also choose products that are easily distinguishable from eachother on spectra. </font></p>
+
<div class="contentmargin">
 +
<h1>Why?</h1>
 +
 +
 +
<p><b>Major hacking incidents are increasingly common,</b> with accounts being hacked and sensitive information stolen. Many companies are moving away from conventional passwords, which are proving to be unreliable in the hands of the public. Banks are now using physical biometric authentication procedures to correctly identify account owners. This new direction opens a market for biological “passwords”. An ideal system would be as separate from online software programs as possible while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers, so we can programme cells to act as a changeable biometric password. </p>
 +
  
  
</body>
 
  
 +
 +
 +
<h1>How?</h1>
 +
 +
<p><b>A key must be unique, measurable and unpredictable.</b> In <i>Key. coli</i>, all these requirements are achieved by the random generation of modular vectors that are expressed in Escherichia coli to produce a unique and detectable fluorescent pattern. This pattern is obtained when different fluorescent proteins (GFP, RFP, CFP) and various promoters, subjected to transcription interference by dCas9, are randomly combined during ligation and transformed into the cells to generate the key. </p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
 +
<img src="https://static.igem.org/mediawiki/2017/8/84/UNOTT2017-How1.png" alt="" width="100%" height="100%">
 +
<h5><b> Figure 1:</b> Two-plasmid modular process used to generate random<i>Key. coli</i> construct(s)<p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p><p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<img src="https://static.igem.org/mediawiki/2017/b/bc/UNOTT2017-How2.png" alt="" width="100%" height="100%"></h5>
 +
 +
<h5><b>Figure 2:</b> Random ligation process and colony picking allows large numbers of plasmid variants to be created for use in keys. </p> <p><span style="color: #ffffff;">&nbsp;</span></p></h5>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<br>
 +
<p>A key transport device, based on freeze-dried <i>Key. coli</i>, allows the bacteria to survive and be transported anywhere with ease. Once entry to a lock is desired, the <i>Key. coli</i> device can be activated, and the output read in a suitable detection device. </p>
 +
 +
<h1><i>Key. coli</i> Summary</h1>
 +
 +
 +
<p><img src="https://static.igem.org/mediawiki/2017/8/83/UNOTT2017-summary.png" alt="" width="100%" height="auto" /></p>
 +
<br>
 +
<br>
 +
<br>
 +
<br>
 +
 +
 +
</div>
 +
</body>
 
</html>
 
</html>
 
{{:Team:UNOTT/Template/Footer}}
 
{{:Team:UNOTT/Template/Footer}}

Latest revision as of 03:45, 2 November 2017

 

 

 

PROJECT DESCRIPTION

 




What?

Key. coli provides a new, more secure, form of key for accessing content. It uses random ligations and large repertoires of possible components to generate unique combinations of expression profiles; this next generation biological key could be the next BIG thing in security; watch this space!

Why?

Major hacking incidents are increasingly common, with accounts being hacked and sensitive information stolen. Many companies are moving away from conventional passwords, which are proving to be unreliable in the hands of the public. Banks are now using physical biometric authentication procedures to correctly identify account owners. This new direction opens a market for biological “passwords”. An ideal system would be as separate from online software programs as possible while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers, so we can programme cells to act as a changeable biometric password.

How?

A key must be unique, measurable and unpredictable. In Key. coli, all these requirements are achieved by the random generation of modular vectors that are expressed in Escherichia coli to produce a unique and detectable fluorescent pattern. This pattern is obtained when different fluorescent proteins (GFP, RFP, CFP) and various promoters, subjected to transcription interference by dCas9, are randomly combined during ligation and transformed into the cells to generate the key.

 

 

Figure 1: Two-plasmid modular process used to generate randomKey. coli construct(s)

 

 

 

 

Figure 2: Random ligation process and colony picking allows large numbers of plasmid variants to be created for use in keys.

 

 


A key transport device, based on freeze-dried Key. coli, allows the bacteria to survive and be transported anywhere with ease. Once entry to a lock is desired, the Key. coli device can be activated, and the output read in a suitable detection device.

Key. coli Summary