(7 intermediate revisions by 2 users not shown) | |||
Line 94: | Line 94: | ||
<div class="content" style="width: 74%"> | <div class="content" style="width: 74%"> | ||
− | < | + | <p class="content-subhead">Abstract</p> |
− | + | <p>This model is created to select the relative optimal structure of Locker B, one of the four Lockers based on our previous design, and improve the binding efficiency of Locker B and microRNA.</p> | |
<p class="content-subhead">Theory design</p> | <p class="content-subhead">Theory design</p> | ||
− | <p>In order to further optimize the structure of the default | + | <p>In order to further optimize the structure of the default Locker in the project, we assert that the binding probability of base complementary pairing should be reduced in the sequence of the functional module when the Locker formed the secondary structure, thus increasing the binding probability of base complementary pairing between the functional module and the corresponding microRNA. </p> |
<center> | <center> | ||
<img src="https://static.igem.org/mediawiki/2017/6/6c/T-NUDT_CHINA-MODLE1.jpg" alt=""> | <img src="https://static.igem.org/mediawiki/2017/6/6c/T-NUDT_CHINA-MODLE1.jpg" alt=""> | ||
− | <p style="font: caption">Figure 1. the predicted structure of Locker | + | <p style="text-align: center;font: caption">Figure 1. the predicted structure of Locker B</p></center> |
− | <p>The two pairs of overhangs (The four pale gray segments in Figure 1) that we design to be added between the complementary pairing supporting module and the functional module can open the port where the supporting module is connected to the functional module, but different sequences may have a potential impact on the secondary structure of the | + | <p>The two pairs of overhangs (The four pale gray segments in Figure 1) that we design to be added between the complementary pairing supporting module and the functional module can open the port where the supporting module is connected to the functional module, but different sequences may have a potential impact on the secondary structure of the Locker. So we design to build an overhang candidate library in order to find all possible sequences and predict the secondary structure of each sequence, compare them and select the relative optimal structure as the object of our experiment. </p> |
− | <p>Reducing the probability of base complementary pairing occurred in the sequence of functional module in the formation of the secondary structure of | + | <p>Reducing the probability of base complementary pairing occurred in the sequence of functional module in the formation of the secondary structure of Locker will result in the reduction of the number of the paired bases of entire Lockers. Therefore, we believe that for different sequences, when the number of base pairs reaches the minimum, functional module unmatched base number is the largest, the probability of corresponding to microRNA through the base complementary pairing is maximum and the efficiency is highest.</p> |
<p class="content-subhead">Methods</p> | <p class="content-subhead">Methods</p> | ||
<p class="content-subsub">1.Building an overhang alternative library</p> | <p class="content-subsub">1.Building an overhang alternative library</p> | ||
Line 114: | Line 114: | ||
<li style=" line-height: 40px;font-size: large;">A<sub>2</sub>:GCCT</li> | <li style=" line-height: 40px;font-size: large;">A<sub>2</sub>:GCCT</li> | ||
<li style=" line-height: 40px;font-size: large;">A<sub>3</sub>:GCCT</li> | <li style=" line-height: 40px;font-size: large;">A<sub>3</sub>:GCCT</li> | ||
− | <p>Given the one-to-one relationship between them, we consider that | + | <p>Given the one-to-one relationship between them, we consider that the ratio of the number of A, A<sub>1</sub>, A<sub>2</sub> A<sub>3</sub> is 1: 1: 1: 1. Accordingly, after removing all A<sub>1</sub> and A<sub>3</sub>, the number of overhangs left in the library is:</p> |
<center><img src="https://static.igem.org/mediawiki/2017/b/b6/T-NUDT_CHINA-MODEL8.jpg" alt=""></center> | <center><img src="https://static.igem.org/mediawiki/2017/b/b6/T-NUDT_CHINA-MODEL8.jpg" alt=""></center> | ||
<p>For some of the A and A<sub>2</sub>, they have the same sequence so we have to subtract the corresponding number.</p> | <p>For some of the A and A<sub>2</sub>, they have the same sequence so we have to subtract the corresponding number.</p> | ||
Line 123: | Line 123: | ||
<p>we use MATLAB to screen the above two situations and keep the remaining overhangs in the overhang alternative library.</p> | <p>we use MATLAB to screen the above two situations and keep the remaining overhangs in the overhang alternative library.</p> | ||
<p class="content-subsub">2. Stitching sequence</p> | <p class="content-subsub">2. Stitching sequence</p> | ||
− | <p>Since the number of overhangs in the overhang library is 112 and we have to select two of them, which is the same as simple arrangement combination. Thus the number of possible | + | <p>Since the number of overhangs in the overhang library is 112 and we have to select two of them, which is the same as simple arrangement combination. Thus the number of possible Locker is: </p> |
<center><img src="https://static.igem.org/mediawiki/2017/b/b5/T-NUDT_CHINA-MODEL11.jpg" alt=""></center> | <center><img src="https://static.igem.org/mediawiki/2017/b/b5/T-NUDT_CHINA-MODEL11.jpg" alt=""></center> | ||
<p>It takes a lot of time to accomplish the secondary structure prediction of so many sequences, so we consider completing the sequence splicing and secondary structure prediction using the computer.</p> | <p>It takes a lot of time to accomplish the secondary structure prediction of so many sequences, so we consider completing the sequence splicing and secondary structure prediction using the computer.</p> | ||
− | <p class="content-subsub">3. Predicting the structure of Locker | + | <p class="content-subsub">3. Predicting the structure of Locker B</p> |
<p>We mimic the method of calculating the RNA sequence and use the minimum free energy algorithm to calculate and predict the secondary structure of the single - chain DNA. The RNA-related parameters are replaced by DNA parameters (Matthews model, 2004). The specific algorithm is described as follows:</p> | <p>We mimic the method of calculating the RNA sequence and use the minimum free energy algorithm to calculate and predict the secondary structure of the single - chain DNA. The RNA-related parameters are replaced by DNA parameters (Matthews model, 2004). The specific algorithm is described as follows:</p> | ||
− | <p>Because the formation of base pairing can reduce the energy of DNA molecules and the structure is more stable, the minimum free energy algorithm considers that at certain temperature, RNA molecules can achieve a certain thermodynamic balance through the conformational adjustment, the free energy can be reduced to the minimum and the most stable structure will be formed, then the secondary structure is considered to be the true secondary structure of DNA. Its computational object is not the number of base | + | <p>Because the formation of base pairing can reduce the energy of DNA molecules and the structure is more stable, the minimum free energy algorithm considers that at certain temperature, RNA molecules can achieve a certain thermodynamic balance through the conformational adjustment, the free energy can be reduced to the minimum and the most stable structure will be formed, then the secondary structure is considered to be the true secondary structure of DNA. Its computational object is not the number of base pairs, but a complex set of energy parameters.</p> |
<div class="pure-g"> | <div class="pure-g"> | ||
<div class="pure-u-1-2"><img class="pure-img-responsive" src="https://static.igem.org/mediawiki/2017/0/08/T-NUDT_CHINA-MODLE2.jpg" alt=""></div> | <div class="pure-u-1-2"><img class="pure-img-responsive" src="https://static.igem.org/mediawiki/2017/0/08/T-NUDT_CHINA-MODLE2.jpg" alt=""></div> | ||
<div class="pure-u-1-2"><img class="pure-img-responsive" src="https://static.igem.org/mediawiki/2017/8/8a/T-NUDT_CHINA-MODLE22.jpg" alt=""></div> | <div class="pure-u-1-2"><img class="pure-img-responsive" src="https://static.igem.org/mediawiki/2017/8/8a/T-NUDT_CHINA-MODLE22.jpg" alt=""></div> | ||
− | <center><p style="font: caption">Figure 2. Plain structure drawing of the single - chain DNA</p></center | + | </div><center><p style="text-align: center;font: caption">Figure 2. Plain structure drawing of the single - chain DNA</p></center> |
− | <p>Assume that a<sub>1</sub>,a<sub>2</sub>,a<sub>3</sub>...a<sub>n</sub> is a given DNA sequence. Throughout this section, we let E<sub>i,j</sub> denotes the minimum free energy of a<sub>i</sub>,a<sub>i+1</sub>...a<sub>j</sub>, which is computed and stored in arrays by a dynamic programming algorithm corresponding to the following recursions.</p> | + | <p style="margin-top: 50px;">Assume that a<sub>1</sub>,a<sub>2</sub>,a<sub>3</sub>...a<sub>n</sub> is a given DNA sequence. Throughout this section, we let E<sub>i,j</sub> denotes the minimum free energy of a<sub>i</sub>,a<sub>i+1</sub>...a<sub>j</sub>, which is computed and stored in arrays by a dynamic programming algorithm corresponding to the following recursions.</p> |
<center><img src="https://static.igem.org/mediawiki/2017/c/c4/T-NUDT_CHINA-MODEL6.jpg" alt=""></center> | <center><img src="https://static.igem.org/mediawiki/2017/c/c4/T-NUDT_CHINA-MODEL6.jpg" alt=""></center> | ||
− | <p>we use the notation α<sub>ij</sub> to denote the free energy of a stacked base pair (a<sub>i</sub>,a<sub>j</sub>),β<sub>k</sub> to denote the free energy of a bulge,γ<sub>k+1</sub> to denote the free energy of an internal loop,ε<sub>k+1-j'-i'</sub> to denote the free energy of a multiloop containing, while the free energy δ<sub>j- | + | <p>we use the notation α<sub>ij</sub> to denote the free energy of a stacked base pair (a<sub>i</sub>,a<sub>j</sub>),β<sub>k</sub> to denote the free energy of a bulge,γ<sub>k+1</sub> to denote the free energy of an internal loop,ε<sub>k+1-j'-i'</sub> to denote the free energy of a multiloop containing, while the free energy δ<sub>j-i</sub> for a hairpin.</p> |
− | <p>Once E<sub>1,n</sub> is computed, then the minimum free energy structure can be computed by tracebacks.</p> | + | <p>Here is the formula and description of the energy function of each substructure:</p> |
− | <p class="content-subsub">4. Selecting the structure with the | + | <p><strong>α<sub>ij</sub></strong> This function is used to calculate the stacking energy between two pairs of paired bases (a<sub>i</sub>,a<sub>j</sub>) and (a<sub>i+1</sub>,a<sub>j-1</sub>), which mainly relate to the various combinations of paired bases that make up this stack. Because complementary base-pairing reactions reduce the energy of DNA molecules, α<sub>ij</sub> is generally negative.</p> |
− | <p>In order to facilitate the comparison of the number of bases in each sequence, we directly read the number of the points in dot-bracket notation, and the sequence with the | + | <center><img width="70%" src="https://static.igem.org/mediawiki/2017/c/c3/T-NUDT_CHINA-MODEL12.jpg" alt=""><p style="text-align: center;font: caption">Figure3. the stacking energy between two pairs of paired bases</p></center> |
+ | <p style="margin-top: 50px;"><strong>β<sub>k</sub></strong> This function is used to calculate the energy of a bulge whose number of bases in the single-chain is k.</p> | ||
+ | <p><strong>γ<sub>k+1</sub></strong> This function is used to calculate the energy of an internal loop whose numbers of bases in two single-chains are k and l.</p> | ||
+ | <p><strong>δ<sub>j-i</sub></strong>This function is used to calculate the energy of a hairpin between pair (a<sub>i</sub>,a<sub>j</sub>).</p> | ||
+ | <p><strong>ε<sub>k+1-j'-i'</sub></strong>This function is used to calculate the energy of a multiloop containing that starts from paired bases (a<sub>i</sub>,a<sub>j</sub>) and also has inner paired bases(a<sub>i1</sub>,a<sub>j1</sub>),(a<sub>i2</sub>,a<sub>j2</sub>)…(a<sub>ik</sub>,a<sub>jk</sub>).</p> | ||
+ | <p><strong>ε<sub>k+1-j'-i'</sub>=eM(i,j,i<sub>1</sub>,j<sub>1</sub>,i<sub>2</sub>,j<sub>2</sub>,...i<sub>k</sub>,j<sub>k</sub>,)</strong></p> | ||
+ | <center><img width="90%" src="https://static.igem.org/mediawiki/2017/6/65/T-NUDT_CHINA-MODEL13.jpg" alt=""><p style="text-align: center;font: caption">Figure4. the flow diagram of algorithm</p></center> | ||
+ | |||
+ | |||
+ | |||
+ | <p style="margin-top: 50px;">Once E<sub>1,n</sub> is computed, then the minimum free energy structure can be computed by tracebacks.</p> | ||
+ | <p class="content-subsub">4. Selecting the structure with the maximum/minimum paired bases</p> | ||
+ | <p>In order to facilitate the comparison of the number of bases in each sequence, we directly read the number of the points in dot-bracket notation, and the sequence with the maximum points means that the number of unpaired bases is the largest and the sequence pairing base number is the least in the case of the length of all the Lockers is equal, which means structure is relatively optimal.</p> | ||
<p class="content-subhead">Results</p> | <p class="content-subhead">Results</p> | ||
− | <p>By calculating we can get structures of the selected | + | <p>By calculating we can get structures of the selected Lockers with the maximum and minimum paired bases, corresponding to the relatively worst and optimal structure.</p> |
<p style="font-weight: bold;">The sequence of the optimal secondary structure:</p> | <p style="font-weight: bold;">The sequence of the optimal secondary structure:</p> | ||
<p style="text-indent: 0;">AAGGGTAAGGATAATCGCACATGTTCTGCGGACCACTAAATCCTTACCCTTCGTAATCCTTGGCTACTGCCTGTCTGTGCCTGCTGTTCGGAAGGATTACG</p> | <p style="text-indent: 0;">AAGGGTAAGGATAATCGCACATGTTCTGCGGACCACTAAATCCTTACCCTTCGTAATCCTTGGCTACTGCCTGTCTGTGCCTGCTGTTCGGAAGGATTACG</p> | ||
<p style="font-weight: bold;">The optimal secondary structure in dot-bracket notation:</p> | <p style="font-weight: bold;">The optimal secondary structure in dot-bracket notation:</p> | ||
− | <p style="text-indent: 0;">((((((((((((...((((.......))))............))))))))))))(((((((((((((....)))....................))))))))))</p> | + | <center><p style="text-indent: 0;">((((((((((((...((((.......))))............))))))))))))(((((((((((((....)))....................))))))))))</p></center> |
− | <p>Plain structure drawing of the optimal secondary structure:</p> | + | <p style="margin-top: 40px;">Plain structure drawing of the optimal secondary structure:</p> |
<center><img width="50%" width="100%" src="https://static.igem.org/mediawiki/2017/1/16/T-NUDT_CHINA-MODLE3.jpg" alt=""> | <center><img width="50%" width="100%" src="https://static.igem.org/mediawiki/2017/1/16/T-NUDT_CHINA-MODLE3.jpg" alt=""> | ||
− | <p style="font: caption">Figure 3. Plain structure drawing of the optimal secondary structure</p></center> | + | <p style="text-align: center;font: caption">Figure 3. Plain structure drawing of the optimal secondary structure</p></center> |
− | <p style="font-weight: bold;">The sequence of the worst secondary structure:</p> | + | <p style="font-weight: bold; margin-top: 50px;">The sequence of the worst secondary structure:</p> |
<p style="text-indent: 0;">AAGGGTAAGGATAACGGCACATGTTCTGCGGCCCACCAGCAAATCCTTACCCTTCGTAATCCTTACGGACTGCCTGTCTGTGCCTGCTGTGGCAAAGGATTACG</p> | <p style="text-indent: 0;">AAGGGTAAGGATAACGGCACATGTTCTGCGGCCCACCAGCAAATCCTTACCCTTCGTAATCCTTACGGACTGCCTGTCTGTGCCTGCTGTGGCAAAGGATTACG</p> | ||
<p style="font-weight: bold;">The worst secondary structure in dot-bracket notation:</p> | <p style="font-weight: bold;">The worst secondary structure in dot-bracket notation:</p> | ||
− | <p style="text-indent: 0;">((((((((((((((((.....)))).(((((....)).))).))))))))))))((((((((((((((((.....))))))...(((....)))))))))))))</p> | + | <center><p style="text-indent: 0;">((((((((((((((((.....)))).(((((....)).))).))))))))))))((((((((((((((((.....))))))...(((....)))))))))))))</p></center> |
− | <p>Plain structure drawing of the worst secondary structure:</p> | + | <p style="margin-top: 40px;">Plain structure drawing of the worst secondary structure:</p> |
<center><img width="50%" width="100%" src="https://static.igem.org/mediawiki/2017/8/89/T-NUDT_CHINA-MODLE4.jpg" alt=""> | <center><img width="50%" width="100%" src="https://static.igem.org/mediawiki/2017/8/89/T-NUDT_CHINA-MODLE4.jpg" alt=""> | ||
− | <p style="font: caption">Figure 4. Plain structure drawing of the worst secondary structure</p></center> | + | <p style="text-align: center;font: caption">Figure 4. Plain structure drawing of the worst secondary structure</p></center> |
<style> | <style> | ||
.reference{margin-top: 100px;} | .reference{margin-top: 100px;} | ||
Line 163: | Line 175: | ||
<div class="reference"> | <div class="reference"> | ||
<p style=" font-size: x-large; font-weight:bold;">References</p> | <p style=" font-size: x-large; font-weight:bold;">References</p> | ||
− | <p> | + | <p>1 Zuker, M. & Sankoff, D. RNA secondary structures and their prediction. Bulletin of Mathematical Biology 46, 591-621 (1984).</p> |
− | <p> | + | <p>2 Zuker, M., Mathews, D. H. & Turner, D. H. Algorithms and Thermodynamics for RNA Secondary Structure Prediction: A Practical Guide. (Springer Netherlands, 1999</p> |
</div> | </div> | ||
Latest revision as of 03:00, 2 November 2017
Model
Abstract
This model is created to select the relative optimal structure of Locker B, one of the four Lockers based on our previous design, and improve the binding efficiency of Locker B and microRNA.
Theory design
In order to further optimize the structure of the default Locker in the project, we assert that the binding probability of base complementary pairing should be reduced in the sequence of the functional module when the Locker formed the secondary structure, thus increasing the binding probability of base complementary pairing between the functional module and the corresponding microRNA.
Figure 1. the predicted structure of Locker B
The two pairs of overhangs (The four pale gray segments in Figure 1) that we design to be added between the complementary pairing supporting module and the functional module can open the port where the supporting module is connected to the functional module, but different sequences may have a potential impact on the secondary structure of the Locker. So we design to build an overhang candidate library in order to find all possible sequences and predict the secondary structure of each sequence, compare them and select the relative optimal structure as the object of our experiment.
Reducing the probability of base complementary pairing occurred in the sequence of functional module in the formation of the secondary structure of Locker will result in the reduction of the number of the paired bases of entire Lockers. Therefore, we believe that for different sequences, when the number of base pairs reaches the minimum, functional module unmatched base number is the largest, the probability of corresponding to microRNA through the base complementary pairing is maximum and the efficiency is highest.
Methods
1.Building an overhang alternative library
Each overhang has 4 bases, so the number of all possible structures is :
For an overhang A, A2(which is paired with A1 ), A3( which is paired with A ) and the reverse sequence A1 are all included in the possible structures.
Take AGGC for example:
Given the one-to-one relationship between them, we consider that the ratio of the number of A, A1, A2 A3 is 1: 1: 1: 1. Accordingly, after removing all A1 and A3, the number of overhangs left in the library is:
For some of the A and A2, they have the same sequence so we have to subtract the corresponding number.
This means that the sequence itself is inversely complementary and the first two base pairs correspond one-to-one with the latter two base pairs, so the number of possible scenarios is:
The number of the rest is:
we use MATLAB to screen the above two situations and keep the remaining overhangs in the overhang alternative library.
2. Stitching sequence
Since the number of overhangs in the overhang library is 112 and we have to select two of them, which is the same as simple arrangement combination. Thus the number of possible Locker is:
It takes a lot of time to accomplish the secondary structure prediction of so many sequences, so we consider completing the sequence splicing and secondary structure prediction using the computer.
3. Predicting the structure of Locker B
We mimic the method of calculating the RNA sequence and use the minimum free energy algorithm to calculate and predict the secondary structure of the single - chain DNA. The RNA-related parameters are replaced by DNA parameters (Matthews model, 2004). The specific algorithm is described as follows:
Because the formation of base pairing can reduce the energy of DNA molecules and the structure is more stable, the minimum free energy algorithm considers that at certain temperature, RNA molecules can achieve a certain thermodynamic balance through the conformational adjustment, the free energy can be reduced to the minimum and the most stable structure will be formed, then the secondary structure is considered to be the true secondary structure of DNA. Its computational object is not the number of base pairs, but a complex set of energy parameters.
Figure 2. Plain structure drawing of the single - chain DNA
Assume that a1,a2,a3...an is a given DNA sequence. Throughout this section, we let Ei,j denotes the minimum free energy of ai,ai+1...aj, which is computed and stored in arrays by a dynamic programming algorithm corresponding to the following recursions.
we use the notation αij to denote the free energy of a stacked base pair (ai,aj),βk to denote the free energy of a bulge,γk+1 to denote the free energy of an internal loop,εk+1-j'-i' to denote the free energy of a multiloop containing, while the free energy δj-i for a hairpin.
Here is the formula and description of the energy function of each substructure:
αij This function is used to calculate the stacking energy between two pairs of paired bases (ai,aj) and (ai+1,aj-1), which mainly relate to the various combinations of paired bases that make up this stack. Because complementary base-pairing reactions reduce the energy of DNA molecules, αij is generally negative.
Figure3. the stacking energy between two pairs of paired bases
βk This function is used to calculate the energy of a bulge whose number of bases in the single-chain is k.
γk+1 This function is used to calculate the energy of an internal loop whose numbers of bases in two single-chains are k and l.
δj-iThis function is used to calculate the energy of a hairpin between pair (ai,aj).
εk+1-j'-i'This function is used to calculate the energy of a multiloop containing that starts from paired bases (ai,aj) and also has inner paired bases(ai1,aj1),(ai2,aj2)…(aik,ajk).
εk+1-j'-i'=eM(i,j,i1,j1,i2,j2,...ik,jk,)
Figure4. the flow diagram of algorithm
Once E1,n is computed, then the minimum free energy structure can be computed by tracebacks.
4. Selecting the structure with the maximum/minimum paired bases
In order to facilitate the comparison of the number of bases in each sequence, we directly read the number of the points in dot-bracket notation, and the sequence with the maximum points means that the number of unpaired bases is the largest and the sequence pairing base number is the least in the case of the length of all the Lockers is equal, which means structure is relatively optimal.
Results
By calculating we can get structures of the selected Lockers with the maximum and minimum paired bases, corresponding to the relatively worst and optimal structure.
The sequence of the optimal secondary structure:
AAGGGTAAGGATAATCGCACATGTTCTGCGGACCACTAAATCCTTACCCTTCGTAATCCTTGGCTACTGCCTGTCTGTGCCTGCTGTTCGGAAGGATTACG
The optimal secondary structure in dot-bracket notation:
((((((((((((...((((.......))))............))))))))))))(((((((((((((....)))....................))))))))))
Plain structure drawing of the optimal secondary structure:
Figure 3. Plain structure drawing of the optimal secondary structure
The sequence of the worst secondary structure:
AAGGGTAAGGATAACGGCACATGTTCTGCGGCCCACCAGCAAATCCTTACCCTTCGTAATCCTTACGGACTGCCTGTCTGTGCCTGCTGTGGCAAAGGATTACG
The worst secondary structure in dot-bracket notation:
((((((((((((((((.....)))).(((((....)).))).))))))))))))((((((((((((((((.....))))))...(((....)))))))))))))
Plain structure drawing of the worst secondary structure:
Figure 4. Plain structure drawing of the worst secondary structure
References
1 Zuker, M. & Sankoff, D. RNA secondary structures and their prediction. Bulletin of Mathematical Biology 46, 591-621 (1984).
2 Zuker, M., Mathews, D. H. & Turner, D. H. Algorithms and Thermodynamics for RNA Secondary Structure Prediction: A Practical Guide. (Springer Netherlands, 1999