Difference between revisions of "Team:Lethbridge/Software"

Line 151: Line 151:
 
       <div class="card pink darken-3">
 
       <div class="card pink darken-3">
 
         <div class="card-content white-text">
 
         <div class="card-content white-text">
          <span class="card-title">Expanding the Genetic Code</span>
 
 
           <div align="center">
 
           <div align="center">
             <img class="responsive-img" style="max-height:50px" src="https://static.igem.org/mediawiki/2017/4/4a/T--Bielefeld-CeBiTec--expand_monochrome_white_2.svg"/>
+
             <img class="responsive-img" style="max-height:100px" src="https://static.igem.org/mediawiki/2017/4/4a/T--Bielefeld-CeBiTec--expand_monochrome_white_2.svg"/>
 
           </div>
 
           </div>
             <p>Other iGEM Teams are also working on codon reassignment for alternative purposes. Check out the awesome project at Bielefeld!</p>
+
             <p>Other iGEM Teams are also working on codon reassignment for alternative purposes. Check out the awesome project at Bielefeld where they focus on expanding the genetic code!</p>
 
           </div>
 
           </div>
 
           <div class="card-action">
 
           <div class="card-action">
Line 181: Line 180:
 
           <h5><b>The apparent risk of this technology is that genetic recoding may allow harmful sequences to be “encrypted”, thus masking the information contained within while retaining the ability to faithfully produce the encoded protein. </b></h5>
 
           <h5><b>The apparent risk of this technology is that genetic recoding may allow harmful sequences to be “encrypted”, thus masking the information contained within while retaining the ability to faithfully produce the encoded protein. </b></h5>
 
         </blockquote>
 
         </blockquote>
 +
      </div>
 +
    </div>
 +
    <div class="row">
 +
      <div class="col s12 m6">
 
         <p class="flow-text">
 
         <p class="flow-text">
 
           The potential for harm as a result of this technology is not to be underestimated. If recoded systems become as prevalent and easy to obtain as we expect them to be, control over where toxin sequences are sent greatly diminishes. Accordingly, we reached out to gene synthesis companies to determine whether or not current bioinformatic technologies can detect radically re-coded toxin sequences.  
 
           The potential for harm as a result of this technology is not to be underestimated. If recoded systems become as prevalent and easy to obtain as we expect them to be, control over where toxin sequences are sent greatly diminishes. Accordingly, we reached out to gene synthesis companies to determine whether or not current bioinformatic technologies can detect radically re-coded toxin sequences.  
Line 187: Line 190:
 
           Following this reached out to all current members of the IGSC asking them to screen twelve sequences for us. Of the five companies that were willing to help us, all of them correctly identified the un-encrypted toxic proteins. However, no organization could correctly identify the encrypted toxins. The data is available here to try for yourself: LINK TO DATA SET?  
 
           Following this reached out to all current members of the IGSC asking them to screen twelve sequences for us. Of the five companies that were willing to help us, all of them correctly identified the un-encrypted toxic proteins. However, no organization could correctly identify the encrypted toxins. The data is available here to try for yourself: LINK TO DATA SET?  
 
         </p>
 
         </p>
 +
      </div>
 +
      <div class="col s12 m6">
 
         <h2>TABLE OF RESULTS 0%</h2>
 
         <h2>TABLE OF RESULTS 0%</h2>
 
         <p class="flow-text">
 
         <p class="flow-text">
Line 196: Line 201:
 
       </div>   
 
       </div>   
 
     </div>
 
     </div>
  </div>
+
</div>
  
  
Line 206: Line 211:
 
   </div>
 
   </div>
 
   <div class="row">
 
   <div class="row">
     <div class="col s6">
+
     <div class="col s12 m6">
 
       <p>
 
       <p>
 
         Currently the only tool maintaining the safety and security of DNA synthesis is BLAST.  We have shown earlier that recoding completely nullifies the ability of BLAST to detect a sequence, but it remains to be seen how much recording BLAST can tolerate before a sequence becomes totally unmatchable to a reference. BLAST works by breaking a query sequence into small ‘words’ of a specified length. Words that exactly match a sequence within the database are ‘high-scoring pairs’ and contribute to a positive scoring alignment. In essence, the more exact word matches in a query sequence to a database sequence, the better the alignment score will be.  
 
         Currently the only tool maintaining the safety and security of DNA synthesis is BLAST.  We have shown earlier that recoding completely nullifies the ability of BLAST to detect a sequence, but it remains to be seen how much recording BLAST can tolerate before a sequence becomes totally unmatchable to a reference. BLAST works by breaking a query sequence into small ‘words’ of a specified length. Words that exactly match a sequence within the database are ‘high-scoring pairs’ and contribute to a positive scoring alignment. In essence, the more exact word matches in a query sequence to a database sequence, the better the alignment score will be.  
Line 218: Line 223:
 
       </p>
 
       </p>
 
     </div>
 
     </div>
     <div class="col s6">
+
     <div class="col s12 m6">
       <p class="flow-text" style="font-size: calc(22px + 0.5vw) !important; text-align: center !important">
+
       <div class="card orange darken-3">
        <b>Check out CODONxCHANGE on Github!</b><br />
+
        <div class="card-content white-text">
        <b>https://github.com/chrisaac/CODONxCHANGE</b></p>
+
          <div align="center">
 +
            <img class="responsive-img" style="max-height:100px" src="https://static.igem.org/mediawiki/2017/4/4a/T--Bielefeld-CeBiTec--expand_monochrome_white_2.svg"/>
 +
          </div>
 +
            <a href="https://2017.igem.org/Team:Bielefeld-CeBiTec">Check out <b>CODONxCHANGE</b> on Github!</a>
 +
          </div>
 +
      </div>
 
     </div>
 
     </div>
 
   </div>
 
   </div>

Revision as of 19:10, 29 October 2017



One of these sequences is a toxin.

Do you know which?

ACAGTTACACGGACAACAAGGTGTTCCAGGCTTCTTTCCTCCCTTCGACGATGTATTTCCAATAGGTGTAATCGTCGGCGAAATCGTGTTCGGTTCTCCCGACGACTGCGAAGGAAACGGATTGTTCGGTGTATTCGGCGTGTACAGCAGAATTTCACCCGACAGCGGTCCTTCTTCACCAAATCCCAGCGGCGGCGG

CTGCGCGATGCTCGACGAGTCAATTCCGCTGTAGTACAGGAAGTCGTACGAGTCATTGCTATTGTATCAGCTAGAGATAATCGCGTACGCGCTCGAGCTCGAGCTATTTCGTCCTGAGCTGATGTCTCCGTCGATAATGAAAAATCCTCCGCTGATGTCCAGGTACAGACCCAGTCCGTCGTATCCTCCAATCGCTGA

GGTGCGAAGATTGACGACCCGCTCTATATTCATCATGTGTGGCCGCATGACCCGACAATTACACATTTCATTTTAAAGCTCGCGCATGCGATTGACATTGACATTACACTATATGAAATTAAGCCGTATCCGAAGCTCTGGCGTTATTATATTAAGCCGGTGCATGTGTCTGTGTATCCGCATTATTATCTCGCGGAA

AGGCACTTCCTACTTCTTAAGAAACGGCTAAGCAGCAGAGTTAAGAGCCTTAAGTCACTATCAAGCCCGCTAGTATTCAAACACAGCCACCTACTTCTACTTCTATCATGGCGGATGCTATTCAAGCGGAAGTTCAAAGTTTGCCGGCGGCTATTCAAGAGAAGCAGACCAAGACGGAAGAGCCGGCGGAAACACATG

V

THE NEXT VIVO CONNECTION

In essence, our project is a rapidly purifiable cell-free system to bring the benefits of synthetic biology to as many people as possible. To do so, we provide methods to easily purify all of the necessary transcriptional and translational components. This includes proteins and RNAs- including functional tRNAs. Furthermore, the Next Vivo system lacks genomic DNA and is instead a minimal simple DNA input and protein output system. Because of these characteristics, Next vivo is highly amenable to genetic recoding.

Genetic Recoding vs. Codon Reassignment

Though there is some discussion surrounding the use of the term “Genetic Recoding” and “Codon Reassignment.” Becuase our system falls in between two proposed definitions, we have chosen to refer to the practice as “Genetic Recoding” in the context of our project and will refer to it accordingly.

Genetic recoding is a process by which the conventional relationships between codon-anticodon and tRNA-amino acid are altered. For instance, the amber stop codon (UAG) can be reassigned to instead incorporate a natural or unnatural amino acid into a growing peptide. CITATION Modifying the relationship between codon and amino acid incorporation is equivalent to the creation of a novel genetic code. This has numerous benefits including the incorporation of unnatural amino acids, biocontainment, and protein engineering. Read more about this on our biocontainment page.

Recoding can be accomplished via:

  • Introducing orthogonal tRNA-aaRS pairs CITATION
  • Mutating tRNA-aaRS pairs CITATION
  • tRNA misacylation by promiscuous RNA enzymes (Flexizymes) CITATION

Other iGEM Teams are also working on codon reassignment for alternative purposes. Check out the awesome project at Bielefeld where they focus on expanding the genetic code!

Though this is a developing field, genetic recoding will only develop as scientific understanding and computational design improve. It is not hard to imagine the construction of a library of tRNAs that can be charged with non-canonical amino acids. Whether this is achieved via flexizymes or mutant pairs, selecting internally consistent sets of tRNAs and charging machinery will make it trivially easy to design a novel genetic code, and the Next vivo system would make it readily obtainable.

When the available sample space provided by the genetic code is analyzed, recoding allows for a potential to generate numerous genetic codes according to the following formula:

Where n is the number of nucleic acid bases, l is the length of the codon, s is the number of switches, and a is the number of amino acids that need a codon.

At a minimum, a single switch means that there are 64 potential internally consistent genetic codes available. When all codons are reassigned, a simplistic estimation (64!/20!) suggests that there are 5.21 x 10^70 possible combinations available. This is a really really large sample space to search combinatorially. However, it remains to be seen whether or not this relationship is cryptographically strong.

The apparent risk of this technology is that genetic recoding may allow harmful sequences to be “encrypted”, thus masking the information contained within while retaining the ability to faithfully produce the encoded protein.

The potential for harm as a result of this technology is not to be underestimated. If recoded systems become as prevalent and easy to obtain as we expect them to be, control over where toxin sequences are sent greatly diminishes. Accordingly, we reached out to gene synthesis companies to determine whether or not current bioinformatic technologies can detect radically re-coded toxin sequences.

Following this reached out to all current members of the IGSC asking them to screen twelve sequences for us. Of the five companies that were willing to help us, all of them correctly identified the un-encrypted toxic proteins. However, no organization could correctly identify the encrypted toxins. The data is available here to try for yourself: LINK TO DATA SET?

TABLE OF RESULTS 0%

This experiment was repeated using all the BLAST software hosted on the NCBI website. (https://blast.ncbi.nlm.nih.gov/Blast.cgi) Again, the software could not identify any of the completely recoded sequences.

Following the initial testing, we have maintained correspondence with individuals at these companies are are looking forward to working closely with them to ensure that DNA synthesis remains a safe and secure practice. Synthetic biologists need DNA, and DNA synthesis needs new bioinformatic screening tools.

BEATING BLAST

Currently the only tool maintaining the safety and security of DNA synthesis is BLAST. We have shown earlier that recoding completely nullifies the ability of BLAST to detect a sequence, but it remains to be seen how much recording BLAST can tolerate before a sequence becomes totally unmatchable to a reference. BLAST works by breaking a query sequence into small ‘words’ of a specified length. Words that exactly match a sequence within the database are ‘high-scoring pairs’ and contribute to a positive scoring alignment. In essence, the more exact word matches in a query sequence to a database sequence, the better the alignment score will be.

BLAST FIGURE

However, it is not intuitively obvious what degree of genetic recoding is required to evade detection via BLAST. To test this, we developed a software tool, CODONxCHANGE, written in Python 2.7 to test the integrity of the BLAST platform against sequences that have been partially encrypted with a set number of recoding events. This tool can also be used prepare genes for implementation in an orthogonal cell-free system for biocontainment purposes.

The tool is designed to take a nucleic acid coding sequence or protein sequence as an input, and return an ‘encrypted’ version of the sequence. It achieves this by translating a DNA sequence into a protein sequence, and then sequentially assigning a random codon to each unique amino acid required within the protein. The resultant sequence is returned in a newly encrypted state.

BUILDING SOLUTIONS

Currently there are a few initiatives worth looking at: funGCAT and IARPA