(24 intermediate revisions by 2 users not shown) | |||
Line 4: | Line 4: | ||
<meta charset="utf-8"> | <meta charset="utf-8"> | ||
<meta name="viewport" content="width=device-width, initial-scale=1.0"> | <meta name="viewport" content="width=device-width, initial-scale=1.0"> | ||
− | < | + | <link rel="stylesheet" href="basic.css"> |
+ | <style type="text/css"> | ||
+ | p {font-variant: stacked-fractions; | ||
+ | font-size: large;} | ||
+ | .pure-g p{font-variant: stacked-fractions; | ||
+ | font-size: large;} | ||
+ | .main-title{padding-top:50%; padding-bottom:50%;width:100%;} | ||
+ | .main{width:90%;} | ||
+ | .main-title::before { | ||
+ | content: ''; | ||
+ | width: 20vw; | ||
+ | height: 20vw; | ||
+ | min-width: 3.5em; | ||
+ | min-height: 3.5em; | ||
+ | background: url(https://static.igem.org/mediawiki/2017/f/fe/T-NUDT_CHINA-BigTitle.svg) no-repeat center center; | ||
+ | background-size: cover; | ||
+ | position: absolute; | ||
+ | top: 50%; | ||
+ | left: 50%; | ||
+ | border-radius: 50%; | ||
+ | z-index: 3; | ||
+ | -webkit-transform: translate3d(-50%,-50%,0); | ||
+ | transform: translate3d(-50%,-50%,0);} | ||
+ | .large-header { | ||
+ | background-image: url('https://static.igem.org/mediawiki/2017/5/59/T-NUDT_CHINA-bigheader-Gold.jpg');} | ||
+ | |||
+ | </style> | ||
</head> | </head> | ||
− | |||
− | |||
− | + | <div id="layout"> | |
− | <div id=" | + | <a href="#menu" id="menuLink" class="menu-link"> |
− | <div class=" | + | <span></span> |
− | < | + | </a> |
− | < | + | <div id="menu"> |
+ | <div class="pure-menu"><img src="https://static.igem.org/mediawiki/2017/4/4f/T-NUDT_CHINA-icon01.png" width=240px height=190px alt=""> | ||
+ | <ul class="pure-menu-list"> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA" class="pure-menu-link">HOME</a></li> | ||
+ | |||
+ | <li class="pure-menu-item pure-menu-has-children"> | ||
+ | <a class="pure-menu-link"onclick="Show('team_show')">TEAM</a> | ||
+ | <ul class="pure-menu-children" id="team_show"> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Team" class="pure-menu-link">Team</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Collaborations" class="pure-menu-link">Collaborations</a></li> | ||
+ | </ul> | ||
+ | </li> | ||
+ | <li class="pure-menu-item pure-menu-has-children"> | ||
+ | <a class="pure-menu-link"onclick="Show('project_show')">PROJECT</a> | ||
+ | <ul class="pure-menu-children" id="project_show"> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Description" class="pure-menu-link">Description</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Design" class="pure-menu-link">Design</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Experiments" class="pure-menu-link">Experiment</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Notebook" class="pure-menu-link">Notebook</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Results" class="pure-menu-link">Results</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Demonstrate" class="pure-menu-link">Demonstrate</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Improve" class="pure-menu-link">Improve</a></li> | ||
+ | </ul> | ||
+ | </li> | ||
+ | <li class="pure-menu-item pure-menu-has-children"> | ||
+ | <a class="pure-menu-link"onclick="Show('part_show')">PARTS</a> | ||
+ | <ul class="pure-menu-children" id="part_show"> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Parts" class="pure-menu-link">Parts</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Basic_Part" class="pure-menu-link">Basic Parts</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Composite_Part" class="pure-menu-link">Composite Parts</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Part_Collection" class="pure-menu-link">Part Collection</a></li> | ||
+ | </ul> | ||
+ | </li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Attributions" class="pure-menu-link">Attributions</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/InterLab" class="pure-menu-link">InterLab</a></li> | ||
+ | <li class="pure-menu-item"><a class="pure-menu-heading" href="https://2017.igem.org/Team:NUDT_CHINA/Model" class="pure-menu-link">Model</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Safety" class="pure-menu-link">SAFETY</a></li> | ||
+ | <li class="pure-menu-item pure-menu-has-children"> | ||
+ | <a class="pure-menu-link"onclick="Show('HP_show')">HP</a> | ||
+ | <ul class="pure-menu-children" id="HP_show"> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/HP/Silver" class="pure-menu-link">Silver HP</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/HP/Gold_Integrated" class="pure-menu-link">Integrated & Gold</a></li> | ||
+ | <li class="pure-menu-item"><a href="https://2017.igem.org/Team:NUDT_CHINA/Engagement" class="pure-menu-link">Public Engagement</a></li> | ||
+ | </ul> | ||
+ | </li> | ||
+ | </ul> | ||
+ | </div> | ||
</div> | </div> | ||
+ | <div id="main"> | ||
+ | <div id="large-header" class="large-header"> | ||
+ | <canvas id="demo-canvas"></canvas> | ||
+ | <h1 class="main-title">Model</span></h1> | ||
+ | </div> | ||
+ | |||
− | <div class="content" | + | <div class="content" style="width: 74%"> |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | <p class="content-subhead">Abstract</p> | |
− | + | <p>This model is created to select the relative optimal structure of Locker B, one of the four Lockers based on our previous design, and improve the binding efficiency of Locker B and microRNA.</p> | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | size: | + | <p class="content-subhead">Theory design</p> |
− | </p> | + | <p>In order to further optimize the structure of the default Locker in the project, we assert that the binding probability of base complementary pairing should be reduced in the sequence of the functional module when the Locker formed the secondary structure, thus increasing the binding probability of base complementary pairing between the functional module and the corresponding microRNA. </p> |
+ | <center> | ||
+ | <img src="https://static.igem.org/mediawiki/2017/6/6c/T-NUDT_CHINA-MODLE1.jpg" alt=""> | ||
+ | <p style="text-align: center;font: caption">Figure 1. the predicted structure of Locker B</p></center> | ||
+ | <p>The two pairs of overhangs (The four pale gray segments in Figure 1) that we design to be added between the complementary pairing supporting module and the functional module can open the port where the supporting module is connected to the functional module, but different sequences may have a potential impact on the secondary structure of the Locker. So we design to build an overhang candidate library in order to find all possible sequences and predict the secondary structure of each sequence, compare them and select the relative optimal structure as the object of our experiment. </p> | ||
+ | <p>Reducing the probability of base complementary pairing occurred in the sequence of functional module in the formation of the secondary structure of Locker will result in the reduction of the number of the paired bases of entire Lockers. Therefore, we believe that for different sequences, when the number of base pairs reaches the minimum, functional module unmatched base number is the largest, the probability of corresponding to microRNA through the base complementary pairing is maximum and the efficiency is highest.</p> | ||
+ | <p class="content-subhead">Methods</p> | ||
+ | <p class="content-subsub">1.Building an overhang alternative library</p> | ||
+ | <p>Each overhang has 4 bases, so the number of all possible structures is :</p> | ||
+ | <center><img src="https://static.igem.org/mediawiki/2017/9/97/T-NUDT_CHINA-MODEL7.jpg" alt=""></center> | ||
+ | <p>For an overhang A, A<sub>2</sub>(which is paired with A<sub>1 </sub>), A<sub>3</sub>( which is paired with A ) and the reverse sequence A<sub>1</sub> are all included in the possible structures.</p> | ||
+ | <p>Take AGGC for example:</p> | ||
+ | <li style=" line-height: 40px;font-size: large;">A :AGGC</li> | ||
+ | <li style=" line-height: 40px;font-size: large;">A<sub>1</sub>:CGGA</li> | ||
+ | <li style=" line-height: 40px;font-size: large;">A<sub>2</sub>:GCCT</li> | ||
+ | <li style=" line-height: 40px;font-size: large;">A<sub>3</sub>:GCCT</li> | ||
+ | <p>Given the one-to-one relationship between them, we consider that the ratio of the number of A, A<sub>1</sub>, A<sub>2</sub> A<sub>3</sub> is 1: 1: 1: 1. Accordingly, after removing all A<sub>1</sub> and A<sub>3</sub>, the number of overhangs left in the library is:</p> | ||
+ | <center><img src="https://static.igem.org/mediawiki/2017/b/b6/T-NUDT_CHINA-MODEL8.jpg" alt=""></center> | ||
+ | <p>For some of the A and A<sub>2</sub>, they have the same sequence so we have to subtract the corresponding number.</p> | ||
+ | <p>This means that the sequence itself is inversely complementary and the first two base pairs correspond one-to-one with the latter two base pairs, so the number of possible scenarios is:</p> | ||
+ | <center><img src="https://static.igem.org/mediawiki/2017/8/81/T-NUDT_CHINA-MODEL9.jpg" alt=""></center> | ||
+ | <p>The number of the rest is:</p> | ||
+ | <center><img src="https://static.igem.org/mediawiki/2017/3/36/T-NUDT_CHINA-MODEL10.jpg" alt=""></center> | ||
+ | <p>we use MATLAB to screen the above two situations and keep the remaining overhangs in the overhang alternative library.</p> | ||
+ | <p class="content-subsub">2. Stitching sequence</p> | ||
+ | <p>Since the number of overhangs in the overhang library is 112 and we have to select two of them, which is the same as simple arrangement combination. Thus the number of possible Locker is: </p> | ||
+ | <center><img src="https://static.igem.org/mediawiki/2017/b/b5/T-NUDT_CHINA-MODEL11.jpg" alt=""></center> | ||
+ | <p>It takes a lot of time to accomplish the secondary structure prediction of so many sequences, so we consider completing the sequence splicing and secondary structure prediction using the computer.</p> | ||
+ | <p class="content-subsub">3. Predicting the structure of Locker B</p> | ||
+ | <p>We mimic the method of calculating the RNA sequence and use the minimum free energy algorithm to calculate and predict the secondary structure of the single - chain DNA. The RNA-related parameters are replaced by DNA parameters (Matthews model, 2004). The specific algorithm is described as follows:</p> | ||
+ | <p>Because the formation of base pairing can reduce the energy of DNA molecules and the structure is more stable, the minimum free energy algorithm considers that at certain temperature, RNA molecules can achieve a certain thermodynamic balance through the conformational adjustment, the free energy can be reduced to the minimum and the most stable structure will be formed, then the secondary structure is considered to be the true secondary structure of DNA. Its computational object is not the number of base pairs, but a complex set of energy parameters.</p> | ||
+ | <div class="pure-g"> | ||
+ | <div class="pure-u-1-2"><img class="pure-img-responsive" src="https://static.igem.org/mediawiki/2017/0/08/T-NUDT_CHINA-MODLE2.jpg" alt=""></div> | ||
+ | <div class="pure-u-1-2"><img class="pure-img-responsive" src="https://static.igem.org/mediawiki/2017/8/8a/T-NUDT_CHINA-MODLE22.jpg" alt=""></div> | ||
+ | </div><center><p style="text-align: center;font: caption">Figure 2. Plain structure drawing of the single - chain DNA</p></center> | ||
+ | <p style="margin-top: 50px;">Assume that a<sub>1</sub>,a<sub>2</sub>,a<sub>3</sub>...a<sub>n</sub> is a given DNA sequence. Throughout this section, we let E<sub>i,j</sub> denotes the minimum free energy of a<sub>i</sub>,a<sub>i+1</sub>...a<sub>j</sub>, which is computed and stored in arrays by a dynamic programming algorithm corresponding to the following recursions.</p> | ||
+ | <center><img src="https://static.igem.org/mediawiki/2017/c/c4/T-NUDT_CHINA-MODEL6.jpg" alt=""></center> | ||
+ | <p>we use the notation α<sub>ij</sub> to denote the free energy of a stacked base pair (a<sub>i</sub>,a<sub>j</sub>),β<sub>k</sub> to denote the free energy of a bulge,γ<sub>k+1</sub> to denote the free energy of an internal loop,ε<sub>k+1-j'-i'</sub> to denote the free energy of a multiloop containing, while the free energy δ<sub>j-i</sub> for a hairpin.</p> | ||
+ | <p>Here is the formula and description of the energy function of each substructure:</p> | ||
+ | <p><strong>α<sub>ij</sub></strong> This function is used to calculate the stacking energy between two pairs of paired bases (a<sub>i</sub>,a<sub>j</sub>) and (a<sub>i+1</sub>,a<sub>j-1</sub>), which mainly relate to the various combinations of paired bases that make up this stack. Because complementary base-pairing reactions reduce the energy of DNA molecules, α<sub>ij</sub> is generally negative.</p> | ||
+ | <center><img width="70%" src="https://static.igem.org/mediawiki/2017/c/c3/T-NUDT_CHINA-MODEL12.jpg" alt=""><p style="text-align: center;font: caption">Figure3. the stacking energy between two pairs of paired bases</p></center> | ||
+ | <p style="margin-top: 50px;"><strong>β<sub>k</sub></strong> This function is used to calculate the energy of a bulge whose number of bases in the single-chain is k.</p> | ||
+ | <p><strong>γ<sub>k+1</sub></strong> This function is used to calculate the energy of an internal loop whose numbers of bases in two single-chains are k and l.</p> | ||
+ | <p><strong>δ<sub>j-i</sub></strong>This function is used to calculate the energy of a hairpin between pair (a<sub>i</sub>,a<sub>j</sub>).</p> | ||
+ | <p><strong>ε<sub>k+1-j'-i'</sub></strong>This function is used to calculate the energy of a multiloop containing that starts from paired bases (a<sub>i</sub>,a<sub>j</sub>) and also has inner paired bases(a<sub>i1</sub>,a<sub>j1</sub>),(a<sub>i2</sub>,a<sub>j2</sub>)…(a<sub>ik</sub>,a<sub>jk</sub>).</p> | ||
+ | <p><strong>ε<sub>k+1-j'-i'</sub>=eM(i,j,i<sub>1</sub>,j<sub>1</sub>,i<sub>2</sub>,j<sub>2</sub>,...i<sub>k</sub>,j<sub>k</sub>,)</strong></p> | ||
+ | <center><img width="90%" src="https://static.igem.org/mediawiki/2017/6/65/T-NUDT_CHINA-MODEL13.jpg" alt=""><p style="text-align: center;font: caption">Figure4. the flow diagram of algorithm</p></center> | ||
− | |||
− | |||
− | |||
+ | |||
+ | <p style="margin-top: 50px;">Once E<sub>1,n</sub> is computed, then the minimum free energy structure can be computed by tracebacks.</p> | ||
+ | <p class="content-subsub">4. Selecting the structure with the maximum/minimum paired bases</p> | ||
+ | <p>In order to facilitate the comparison of the number of bases in each sequence, we directly read the number of the points in dot-bracket notation, and the sequence with the maximum points means that the number of unpaired bases is the largest and the sequence pairing base number is the least in the case of the length of all the Lockers is equal, which means structure is relatively optimal.</p> | ||
+ | <p class="content-subhead">Results</p> | ||
+ | <p>By calculating we can get structures of the selected Lockers with the maximum and minimum paired bases, corresponding to the relatively worst and optimal structure.</p> | ||
+ | <p style="font-weight: bold;">The sequence of the optimal secondary structure:</p> | ||
+ | <p style="text-indent: 0;">AAGGGTAAGGATAATCGCACATGTTCTGCGGACCACTAAATCCTTACCCTTCGTAATCCTTGGCTACTGCCTGTCTGTGCCTGCTGTTCGGAAGGATTACG</p> | ||
+ | <p style="font-weight: bold;">The optimal secondary structure in dot-bracket notation:</p> | ||
+ | <center><p style="text-indent: 0;">((((((((((((...((((.......))))............))))))))))))(((((((((((((....)))....................))))))))))</p></center> | ||
+ | <p style="margin-top: 40px;">Plain structure drawing of the optimal secondary structure:</p> | ||
+ | <center><img width="50%" width="100%" src="https://static.igem.org/mediawiki/2017/1/16/T-NUDT_CHINA-MODLE3.jpg" alt=""> | ||
+ | <p style="text-align: center;font: caption">Figure 3. Plain structure drawing of the optimal secondary structure</p></center> | ||
+ | <p style="font-weight: bold; margin-top: 50px;">The sequence of the worst secondary structure:</p> | ||
+ | <p style="text-indent: 0;">AAGGGTAAGGATAACGGCACATGTTCTGCGGCCCACCAGCAAATCCTTACCCTTCGTAATCCTTACGGACTGCCTGTCTGTGCCTGCTGTGGCAAAGGATTACG</p> | ||
+ | <p style="font-weight: bold;">The worst secondary structure in dot-bracket notation:</p> | ||
+ | <center><p style="text-indent: 0;">((((((((((((((((.....)))).(((((....)).))).))))))))))))((((((((((((((((.....))))))...(((....)))))))))))))</p></center> | ||
+ | <p style="margin-top: 40px;">Plain structure drawing of the worst secondary structure:</p> | ||
+ | <center><img width="50%" width="100%" src="https://static.igem.org/mediawiki/2017/8/89/T-NUDT_CHINA-MODLE4.jpg" alt=""> | ||
+ | <p style="text-align: center;font: caption">Figure 4. Plain structure drawing of the worst secondary structure</p></center> | ||
+ | <style> | ||
+ | .reference{margin-top: 100px;} | ||
+ | .reference p{text-indent: 0;line-height: initial; | ||
+ | font-size: large; | ||
+ | font-family: monospace;} | ||
+ | </style> | ||
+ | <div class="reference"> | ||
+ | <p style=" font-size: x-large; font-weight:bold;">References</p> | ||
+ | <p>1 Zuker, M. & Sankoff, D. RNA secondary structures and their prediction. Bulletin of Mathematical Biology 46, 591-621 (1984).</p> | ||
+ | <p>2 Zuker, M., Mathews, D. H. & Turner, D. H. Algorithms and Thermodynamics for RNA Secondary Structure Prediction: A Practical Guide. (Springer Netherlands, 1999</p> | ||
</div> | </div> | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | </div> | ||
+ | </div></div> | ||
+ | |||
+ | <script type="text/javascript"> | ||
+ | function send(num) { | ||
+ | var openClass = 'is-open'; | ||
+ | var add1=document.getElementById(num); | ||
+ | var add2=document.getElementById('Lay'+num); | ||
+ | addClass(add1,openClass); | ||
+ | addClass(add2,openClass); | ||
+ | function hasClass(element,csName){ | ||
+ | return element.className.match(RegExp('(\\s|^)'+csName+'(\\s|$)')); | ||
+ | }; | ||
+ | function addClass(element,csName){ | ||
+ | if(!hasClass(element,csName)){ | ||
+ | |||
+ | element.className+=' '+csName; | ||
+ | |||
+ | } | ||
+ | };} | ||
+ | function show(num) { | ||
+ | var openClass = 'is-open'; | ||
+ | var remove1=document.getElementById(num); | ||
+ | var remove2=document.getElementById('Lay'+num); | ||
+ | deleteClass(remove1,openClass); | ||
+ | deleteClass(remove2,openClass); | ||
+ | function hasClass(element,csName){ | ||
+ | return element.className.match(RegExp('(\\s|^)'+csName+'(\\s|$)')); | ||
+ | }; | ||
+ | function deleteClass(element,csName){ | ||
+ | if (hasClass(element,csName)) { | ||
+ | var reg = new RegExp("(\\s|^)" + csName + "(\\s|$)"); | ||
+ | element.className = element.className.replace(reg, " "); | ||
+ | } | ||
+ | }; | ||
+ | } | ||
+ | |||
+ | </script> | ||
+ | <script type="text/javascript"> | ||
+ | ( function(window,document){ | ||
+ | |||
+ | var layout = document.getElementById('layout'), | ||
+ | menu = document.getElementById('menu'), | ||
+ | menuLink = document.getElementById('menuLink'), | ||
+ | content = document.getElementById('main'); | ||
+ | |||
+ | function toggleClass(element, className) { | ||
+ | var classes = element.className.split(/\s+/), | ||
+ | length = classes.length, | ||
+ | i = 0; | ||
+ | |||
+ | for(; i < length; i++) { | ||
+ | if (classes[i] === className) { | ||
+ | classes.splice(i, 1); | ||
+ | break; | ||
+ | } | ||
+ | } | ||
+ | // The className is not found | ||
+ | if (length === classes.length) { | ||
+ | classes.push(className); | ||
+ | } | ||
+ | |||
+ | element.className = classes.join(' '); | ||
+ | } | ||
+ | |||
+ | function toggleAll(e) { | ||
+ | var active = 'active'; | ||
+ | |||
+ | e.preventDefault(); | ||
+ | toggleClass(layout, active); | ||
+ | toggleClass(menu, active); | ||
+ | toggleClass(menuLink, active); | ||
+ | } | ||
+ | |||
+ | menuLink.onclick = function (e) { | ||
+ | toggleAll(e); | ||
+ | }; | ||
+ | |||
+ | content.onclick = function(e) { | ||
+ | if (menu.className.indexOf('active') !== -1) { | ||
+ | toggleAll(e); | ||
+ | } | ||
+ | }; | ||
+ | |||
+ | }(this, this.document)); | ||
+ | </script> | ||
+ | |||
+ | <script type="text/javascript" > | ||
+ | function Show(tagId) { | ||
+ | if (document.getElementById(tagId).style.display=="none") { | ||
+ | document.getElementById(tagId).style.display="block"; | ||
+ | |||
+ | } | ||
+ | else { | ||
+ | document.getElementById(tagId).style.display="none"; | ||
+ | } | ||
+ | } | ||
+ | </script> | ||
+ | <script type="text/javascript" > | ||
+ | (function() { | ||
+ | |||
+ | var width, height, largeHeader, canvas, ctx, circles, target, animateHeader = true; | ||
+ | |||
+ | // Main | ||
+ | initHeader(); | ||
+ | addListeners(); | ||
+ | |||
+ | function initHeader() { | ||
+ | width = window.innerWidth; | ||
+ | height = window.innerHeight; | ||
+ | target = {x: 0, y: height}; | ||
+ | |||
+ | largeHeader = document.getElementById('large-header'); | ||
+ | largeHeader.style.height = height+'px'; | ||
+ | |||
+ | canvas = document.getElementById('demo-canvas'); | ||
+ | canvas.width = width; | ||
+ | canvas.height = height; | ||
+ | ctx = canvas.getContext('2d'); | ||
+ | |||
+ | // create particles | ||
+ | circles = []; | ||
+ | for(var x = 0; x < width*0.5; x++) { | ||
+ | var c = new Circle(); | ||
+ | circles.push(c); | ||
+ | } | ||
+ | animate(); | ||
+ | } | ||
+ | |||
+ | // Event handling | ||
+ | function addListeners() { | ||
+ | window.addEventListener('scroll', scrollCheck); | ||
+ | window.addEventListener('resize', resize); | ||
+ | } | ||
+ | |||
+ | function scrollCheck() { | ||
+ | if(document.body.scrollTop > height) animateHeader = false; | ||
+ | else animateHeader = true; | ||
+ | } | ||
+ | |||
+ | function resize() { | ||
+ | width = window.innerWidth; | ||
+ | height = window.innerHeight; | ||
+ | largeHeader.style.height = height+'px'; | ||
+ | canvas.width = width; | ||
+ | canvas.height = height; | ||
+ | } | ||
+ | |||
+ | function animate() { | ||
+ | if(animateHeader) { | ||
+ | ctx.clearRect(0,0,width,height); | ||
+ | for(var i in circles) { | ||
+ | circles[i].draw(); | ||
+ | } | ||
+ | } | ||
+ | requestAnimationFrame(animate); | ||
+ | } | ||
+ | |||
+ | // Canvas manipulation | ||
+ | function Circle() { | ||
+ | var _this = this; | ||
+ | |||
+ | // constructor | ||
+ | (function() { | ||
+ | _this.pos = {}; | ||
+ | init(); | ||
+ | console.log(_this); | ||
+ | })(); | ||
+ | |||
+ | function init() { | ||
+ | _this.pos.x = Math.random()*width; | ||
+ | _this.pos.y = height+Math.random()*100; | ||
+ | _this.alpha = 0.1+Math.random()*0.3; | ||
+ | _this.scale = 0.1+Math.random()*0.3; | ||
+ | _this.velocity = Math.random(); | ||
+ | } | ||
+ | |||
+ | this.draw = function() { | ||
+ | if(_this.alpha <= 0) { | ||
+ | init(); | ||
+ | } | ||
+ | _this.pos.y -= _this.velocity; | ||
+ | _this.alpha -= 0.0005; | ||
+ | ctx.beginPath(); | ||
+ | ctx.arc(_this.pos.x, _this.pos.y, _this.scale*10, 0, 2 * Math.PI, false); | ||
+ | ctx.fillStyle = 'rgba(255,255,255,'+ _this.alpha+')'; | ||
+ | ctx.fill(); | ||
+ | }; | ||
+ | } | ||
+ | |||
+ | })(); | ||
+ | </script> | ||
</body> | </body> | ||
</html> | </html> |
Latest revision as of 03:00, 2 November 2017
Model
Abstract
This model is created to select the relative optimal structure of Locker B, one of the four Lockers based on our previous design, and improve the binding efficiency of Locker B and microRNA.
Theory design
In order to further optimize the structure of the default Locker in the project, we assert that the binding probability of base complementary pairing should be reduced in the sequence of the functional module when the Locker formed the secondary structure, thus increasing the binding probability of base complementary pairing between the functional module and the corresponding microRNA.
Figure 1. the predicted structure of Locker B
The two pairs of overhangs (The four pale gray segments in Figure 1) that we design to be added between the complementary pairing supporting module and the functional module can open the port where the supporting module is connected to the functional module, but different sequences may have a potential impact on the secondary structure of the Locker. So we design to build an overhang candidate library in order to find all possible sequences and predict the secondary structure of each sequence, compare them and select the relative optimal structure as the object of our experiment.
Reducing the probability of base complementary pairing occurred in the sequence of functional module in the formation of the secondary structure of Locker will result in the reduction of the number of the paired bases of entire Lockers. Therefore, we believe that for different sequences, when the number of base pairs reaches the minimum, functional module unmatched base number is the largest, the probability of corresponding to microRNA through the base complementary pairing is maximum and the efficiency is highest.
Methods
1.Building an overhang alternative library
Each overhang has 4 bases, so the number of all possible structures is :
For an overhang A, A2(which is paired with A1 ), A3( which is paired with A ) and the reverse sequence A1 are all included in the possible structures.
Take AGGC for example:
Given the one-to-one relationship between them, we consider that the ratio of the number of A, A1, A2 A3 is 1: 1: 1: 1. Accordingly, after removing all A1 and A3, the number of overhangs left in the library is:
For some of the A and A2, they have the same sequence so we have to subtract the corresponding number.
This means that the sequence itself is inversely complementary and the first two base pairs correspond one-to-one with the latter two base pairs, so the number of possible scenarios is:
The number of the rest is:
we use MATLAB to screen the above two situations and keep the remaining overhangs in the overhang alternative library.
2. Stitching sequence
Since the number of overhangs in the overhang library is 112 and we have to select two of them, which is the same as simple arrangement combination. Thus the number of possible Locker is:
It takes a lot of time to accomplish the secondary structure prediction of so many sequences, so we consider completing the sequence splicing and secondary structure prediction using the computer.
3. Predicting the structure of Locker B
We mimic the method of calculating the RNA sequence and use the minimum free energy algorithm to calculate and predict the secondary structure of the single - chain DNA. The RNA-related parameters are replaced by DNA parameters (Matthews model, 2004). The specific algorithm is described as follows:
Because the formation of base pairing can reduce the energy of DNA molecules and the structure is more stable, the minimum free energy algorithm considers that at certain temperature, RNA molecules can achieve a certain thermodynamic balance through the conformational adjustment, the free energy can be reduced to the minimum and the most stable structure will be formed, then the secondary structure is considered to be the true secondary structure of DNA. Its computational object is not the number of base pairs, but a complex set of energy parameters.
Figure 2. Plain structure drawing of the single - chain DNA
Assume that a1,a2,a3...an is a given DNA sequence. Throughout this section, we let Ei,j denotes the minimum free energy of ai,ai+1...aj, which is computed and stored in arrays by a dynamic programming algorithm corresponding to the following recursions.
we use the notation αij to denote the free energy of a stacked base pair (ai,aj),βk to denote the free energy of a bulge,γk+1 to denote the free energy of an internal loop,εk+1-j'-i' to denote the free energy of a multiloop containing, while the free energy δj-i for a hairpin.
Here is the formula and description of the energy function of each substructure:
αij This function is used to calculate the stacking energy between two pairs of paired bases (ai,aj) and (ai+1,aj-1), which mainly relate to the various combinations of paired bases that make up this stack. Because complementary base-pairing reactions reduce the energy of DNA molecules, αij is generally negative.
Figure3. the stacking energy between two pairs of paired bases
βk This function is used to calculate the energy of a bulge whose number of bases in the single-chain is k.
γk+1 This function is used to calculate the energy of an internal loop whose numbers of bases in two single-chains are k and l.
δj-iThis function is used to calculate the energy of a hairpin between pair (ai,aj).
εk+1-j'-i'This function is used to calculate the energy of a multiloop containing that starts from paired bases (ai,aj) and also has inner paired bases(ai1,aj1),(ai2,aj2)…(aik,ajk).
εk+1-j'-i'=eM(i,j,i1,j1,i2,j2,...ik,jk,)
Figure4. the flow diagram of algorithm
Once E1,n is computed, then the minimum free energy structure can be computed by tracebacks.
4. Selecting the structure with the maximum/minimum paired bases
In order to facilitate the comparison of the number of bases in each sequence, we directly read the number of the points in dot-bracket notation, and the sequence with the maximum points means that the number of unpaired bases is the largest and the sequence pairing base number is the least in the case of the length of all the Lockers is equal, which means structure is relatively optimal.
Results
By calculating we can get structures of the selected Lockers with the maximum and minimum paired bases, corresponding to the relatively worst and optimal structure.
The sequence of the optimal secondary structure:
AAGGGTAAGGATAATCGCACATGTTCTGCGGACCACTAAATCCTTACCCTTCGTAATCCTTGGCTACTGCCTGTCTGTGCCTGCTGTTCGGAAGGATTACG
The optimal secondary structure in dot-bracket notation:
((((((((((((...((((.......))))............))))))))))))(((((((((((((....)))....................))))))))))
Plain structure drawing of the optimal secondary structure:
Figure 3. Plain structure drawing of the optimal secondary structure
The sequence of the worst secondary structure:
AAGGGTAAGGATAACGGCACATGTTCTGCGGCCCACCAGCAAATCCTTACCCTTCGTAATCCTTACGGACTGCCTGTCTGTGCCTGCTGTGGCAAAGGATTACG
The worst secondary structure in dot-bracket notation:
((((((((((((((((.....)))).(((((....)).))).))))))))))))((((((((((((((((.....))))))...(((....)))))))))))))
Plain structure drawing of the worst secondary structure:
Figure 4. Plain structure drawing of the worst secondary structure
References
1 Zuker, M. & Sankoff, D. RNA secondary structures and their prediction. Bulletin of Mathematical Biology 46, 591-621 (1984).
2 Zuker, M., Mathews, D. H. & Turner, D. H. Algorithms and Thermodynamics for RNA Secondary Structure Prediction: A Practical Guide. (Springer Netherlands, 1999