Team:TUDelft/Algorithm

From 2009.igem.org

(Difference between revisions)
(Lock construction (weak RBS (B0031) example))
(Key construction (weak RBS (B0031) example))
Line 35: Line 35:
In this step you have to change (arbitrarily) one nucleotide in the RBS for its complementary before to get the reverse complementary, this will give a mismatch. This mismatch is necessary in order to allow the key to easily open the lock.
In this step you have to change (arbitrarily) one nucleotide in the RBS for its complementary before to get the reverse complementary, this will give a mismatch. This mismatch is necessary in order to allow the key to easily open the lock.
-
=''Key construction (weak RBS ([http://partsregistry.org/Part:BBa_B0031 B0031]) example)''=
+
==Key construction (weak RBS ([http://partsregistry.org/Part:BBa_B0031 B0031]) example)==
1. Choose a RBS and make the complementary RNA strand.
1. Choose a RBS and make the complementary RNA strand.
-
5’- UCACACAGGAAACC-3                RNA
+
'''5’- UCACACAGGAAACC-3                RNA'''
2. Attach the nucleotide sequence ACCCAAAGUCC upstream the RBS. This sequence is complementary to the loop formed in the lock.
2. Attach the nucleotide sequence ACCCAAAGUCC upstream the RBS. This sequence is complementary to the loop formed in the lock.
-
5’- ACCCAAAGUCC  UCACACAGGAAACC-3
+
'''5’- ACCCAAAGUCC  UCACACAGGAAACC-3’'''
3. Attach the sequence UGGUUAAUGAAAAUUAACUUA downstream the RBS. This sequence forms a loop and a helix with one mismatch.
3. Attach the sequence UGGUUAAUGAAAAUUAACUUA downstream the RBS. This sequence forms a loop and a helix with one mismatch.
-
5’- ACCCAAAGUCC  UCACACAGGAAACC  UGGUUAAUGAAAAUUAACUUA -3
+
'''5’- ACCCAAAGUCC  UCACACAGGAAACC  UGGUUAAUGAAAAUUAACUUA -3’'''
4. Attach the RBS’s* reverse complementary nucleotide sequence downstream the last construct.
4. Attach the RBS’s* reverse complementary nucleotide sequence downstream the last construct.
-
5’- ACCCAAAGUCC  UCACACAGGAAACC  UGGUUAAUGAAAAUUAACUUA  GGUUUCCACUGUGA -3
+
'''5’- ACCCAAAGUCC  UCACACAGGAAACC  UGGUUAAUGAAAAUUAACUUA  GGUUUCCACUGUGA -3’'''
5. (optional?) Attach the nucleotide sequence AAAAAGCCGAGUUAUUAAUCCGGCUU downstream the last construct. This sequence forms a second loop which may be useful for stability.
5. (optional?) Attach the nucleotide sequence AAAAAGCCGAGUUAUUAAUCCGGCUU downstream the last construct. This sequence forms a second loop which may be useful for stability.
-
5’- ACCCAAAGUCC  UCACACAGGAAACC  UGGUUAAUGAAAAUUAACUUA  GGUUUCCACUGUGA  AAAAAGCCGAGUUAUUAAUCCGGCUU -3
+
'''5’- ACCCAAAGUCC  UCACACAGGAAACC  UGGUUAAUGAAAAUUAACUUA  GGUUUCCACUGUGA  AAAAAGCCGAGUUAUUAAUCCGGCUU -3’'''
To sum-up a simplified construction protocol is: add the RBS and the RBS’s reverse complementary* in the next sequence inside brackets 1 and 2 respectively.
To sum-up a simplified construction protocol is: add the RBS and the RBS’s reverse complementary* in the next sequence inside brackets 1 and 2 respectively.
-
5’-ACCCAAAGUCC [ 1 ] UGGUUAAUGAAAAUUAACUUA [ 2 ]AAAAAGCCGAGUUAUUAAUCCGGCUU -3
+
'''5’-ACCCAAAGUCC [ 1 ] UGGUUAAUGAAAAUUAACUUA [ 2 ]AAAAAGCCGAGUUAUUAAUCCGGCUU -3’'''
In this step you have to change (arbitrarily) two nucleotide in the RBS for its complementary before to get the reverse complementary, this will give a mismatched. This mismatch is necessary in order to allow the key to easily open the lock.
In this step you have to change (arbitrarily) two nucleotide in the RBS for its complementary before to get the reverse complementary, this will give a mismatched. This mismatch is necessary in order to allow the key to easily open the lock.

Revision as of 21:23, 21 September 2009

This page is still under construction

Lock construction (weak RBS ([http://partsregistry.org/Part:BBa_B0031 B0031]) example)

1. Choose a RBS and make the complementary RNA strand

5’- UCACACAGGAAACC-3 RNA

2. Attach the nucleotide sequence UUUGGGUAGAUCAC upstream the RBS. This sequence will be part of the loop and contains a pyrimidine-uracil-nucleotide-purine (YUNR) consensus sequence that shown to be critical for the interaction key-lock.

5’- UUUGGGUAGAUCAC UCACACAGGAAACC- 3

3. (Optional) Attach the scar (UACUAG) and initiation codon (AUG) downstream the RBS

5’- UUUGGGUAGAUCAC UCACACAGGAAACC UACUAG AUG

4. Attach the nucleotide sequence GGAC upstream the last construct. This produces two mismatch nucleotides (red section underline).

5’- GGAC UUUGGGUAGAUCAC UCACACAGGAAACC UACUAG AUG – 3’

5. Attach the RBS’s* reverse complementary nucleotide sequence upstream the last construct.

5’- GGAUUCCUGUGUGA GGAC UUUGGGUAGAUCAC UCACACAGGAAACC UACUAG AUG – 3’

6. Attach the nucleotide sequence GUA, which is complementary to one part of the scar, upstream the last construct

5’- GUA GGAUUCCUGUGUGA GGAC UUUGGGUAGAUCAC UCACACAGGAAACC UACUAG AUG-3’

To sum-up, a simplified construction protocol is: add the RBS and the RBS’s reverse complementary* in the next sequence inside brackets 1 and 2 respectively.

5’- GUA [ 2 ] GGAC UUUGGGUAGAUCAC [ 1 ] UACUAG AUG-3’

In this step you have to change (arbitrarily) one nucleotide in the RBS for its complementary before to get the reverse complementary, this will give a mismatch. This mismatch is necessary in order to allow the key to easily open the lock.

Key construction (weak RBS ([http://partsregistry.org/Part:BBa_B0031 B0031]) example)

1. Choose a RBS and make the complementary RNA strand.

5’- UCACACAGGAAACC-3 RNA

2. Attach the nucleotide sequence ACCCAAAGUCC upstream the RBS. This sequence is complementary to the loop formed in the lock.

5’- ACCCAAAGUCC UCACACAGGAAACC-3’

3. Attach the sequence UGGUUAAUGAAAAUUAACUUA downstream the RBS. This sequence forms a loop and a helix with one mismatch.

5’- ACCCAAAGUCC UCACACAGGAAACC UGGUUAAUGAAAAUUAACUUA -3’

4. Attach the RBS’s* reverse complementary nucleotide sequence downstream the last construct.

5’- ACCCAAAGUCC UCACACAGGAAACC UGGUUAAUGAAAAUUAACUUA GGUUUCCACUGUGA -3’

5. (optional?) Attach the nucleotide sequence AAAAAGCCGAGUUAUUAAUCCGGCUU downstream the last construct. This sequence forms a second loop which may be useful for stability.

5’- ACCCAAAGUCC UCACACAGGAAACC UGGUUAAUGAAAAUUAACUUA GGUUUCCACUGUGA AAAAAGCCGAGUUAUUAAUCCGGCUU -3’

To sum-up a simplified construction protocol is: add the RBS and the RBS’s reverse complementary* in the next sequence inside brackets 1 and 2 respectively.

5’-ACCCAAAGUCC [ 1 ] UGGUUAAUGAAAAUUAACUUA [ 2 ]AAAAAGCCGAGUUAUUAAUCCGGCUU -3’

In this step you have to change (arbitrarily) two nucleotide in the RBS for its complementary before to get the reverse complementary, this will give a mismatched. This mismatch is necessary in order to allow the key to easily open the lock.

The result of this algorithm can be found in the Lock/Key Generator

Return