Line 44: | Line 44: | ||
| | ||
<h5>This information was used by the wet lab to assist them by informing them in what to expect. This was done through the use of programming to create visual graphs. </h5> | <h5>This information was used by the wet lab to assist them by informing them in what to expect. This was done through the use of programming to create visual graphs. </h5> | ||
− | <a href="https://github.com/BurgundyIsAPublicEnemy/iGEMNotts2017/blob/master/Tellurium%20-%20Python%20Models%20for%20IGEM%20NOTTS%202017"> | + | <a href="https://github.com/BurgundyIsAPublicEnemy/iGEMNotts2017/blob/master/Tellurium%20-%20Python%20Models%20for%20IGEM%20NOTTS%202017">The source code for these models can be accessed from our GitHub page</a> |
<h5>The models weren't perfect at first: refinement from lab results helped to optimize and correct the models</h5> | <h5>The models weren't perfect at first: refinement from lab results helped to optimize and correct the models</h5> | ||
| | ||
Line 60: | Line 60: | ||
| | ||
<h5>In order to achieve these aims, it was decided to create a simulation for measuring fluorescence intensity when given parameters such as protein concentrations and wavelengths of lasers added. </h5> | <h5>In order to achieve these aims, it was decided to create a simulation for measuring fluorescence intensity when given parameters such as protein concentrations and wavelengths of lasers added. </h5> | ||
− | <a href=" | + | <a href="https://github.com/BurgundyIsAPublicEnemy/iGEMNotts2017/blob/master/LuciferA.c">This simulation can be downloaded from our GitHub page</a> |
</center> | </center> |
Revision as of 11:09, 23 August 2017
Modelling()
Our aims when creating the models were the following:
- To assist the processes within the Wet Lab by informing them and allowing for simulations. This would be especially useful when predicting the required fluorescence
- Test our biological systems with conditions that might not be possible to replicate in a lab environment. This allows us to future proof our methods as well as identify any vulnerabilities