Constructing Bio-molecular Databases on a DNA-based Computer

合集下载

木薯赤霉素途径DELLA蛋白基因克隆及其对干旱胁迫的响应

木薯赤霉素途径DELLA蛋白基因克隆及其对干旱胁迫的响应

木薯赤霉素途径DELLA蛋白基因克隆及其对干旱胁迫的响应廖文彬;彭明【摘要】赤霉素(GA)信号转导途径是通过DELLA抑制蛋白来调控的.笔者利用拟南芥DELLA蛋白基因序列,通过电子克隆方法首次克隆了1个木薯DELLA蛋白基因,长度为1 857 bp,具有完整的蛋白编码框的cDNA序列,命名为MeGAI.生物信息学分析显示,该蛋白具有与拟南芥DELLA蛋白一样的保守结构域,如DELLA结构域、VHYNP结构域、POLY(S/T)结构域、核定位信号、VHVID结构域、亮氨酸结构域、GRAS结构域;该基因在干旱胁迫下的表达模式研究结果表明,该基因在干旱胁迫下是下调表达的;GA生物合成重要基因GA20-氧化酶基因在干旱胁迫下的表达模式研究结果表明,两者在干旱胁迫下的表达模式具有良好的相关性,这说明GA途径可能参与木薯抗旱机制.【期刊名称】《热带生物学报》【年(卷),期】2012(003)004【总页数】7页(P298-304)【关键词】木薯DELLA蛋白;基因克隆;生物信息学分析;干旱胁迫响应【作者】廖文彬;彭明【作者单位】中国热带农业科学院热带生物技术研究所/农业部热带作物生物学与遗传资源利用重点实验室,海南海口571101;中国热带农业科学院热带生物技术研究所/农业部热带作物生物学与遗传资源利用重点实验室,海南海口571101【正文语种】中文【中图分类】Q344+.12在植物体内赤霉素(GA)是通过合成途径与信号转导途径来调控植物的生长与发育的。

高等植物GA的生物合成前体是牻牛儿基焦磷酸(GGPP)[1]。

GA生物合成的相关酶主要有:牻牛儿基焦磷酸合成酶(GGFS)、内根-贝壳杉烯合酶(CPS)、内根-贝壳杉烯台酶(ent-kaurrene synthase,KS)、内根-贝壳杉烯氧化酶(end-kaurene oxidase)、内根-贝壳杉烯酸-7β-羟化酶(ent-kaurene acid-7β-hydroxylase)、GA12醛合酶和GA13-羟化酶、GA 20-氧化酶、GA2氧化酶(GA2ox)和GA3氧化酶(GA3ox)等。

自组装铁蛋白在纳米疫苗领域的应用进展

自组装铁蛋白在纳米疫苗领域的应用进展

生物技术进展2019年㊀第9卷㊀第3期㊀240~245CurrentBiotechnology㊀ISSN2095 ̄2341进展评述Reviews㊀收稿日期:2018 ̄12 ̄26ꎻ接受日期:2019 ̄02 ̄22㊀基金项目:国家重点研发计划项目(2017YFD0500706ꎻ2016YFD0500108)ꎻ国家自然科学基金项目(31670156)资助ꎮ㊀作者简介:魏珍珍ꎬ硕士研究生ꎬ研究方向为病毒微生物ꎮE ̄mail:646122815@qq.comꎮ∗通信作者:易咏竹ꎬ副研究员ꎬ研究方向为病毒微生物ꎮE ̄mail:Yiyongzhu@126.com自组装铁蛋白在纳米疫苗领域的应用进展魏珍珍1ꎬ㊀刘兴健2ꎬ㊀王㊀朋1ꎬ㊀张志芳2ꎬ㊀易咏竹3∗1.江苏科技大学生物技术学院ꎬ江苏镇江212003ꎻ2.中国农业科学院生物技术研究所ꎬ北京100081ꎻ3.中国农业科学院蚕业研究所ꎬ江苏镇江212018摘㊀要:自组装蛋白在真核细胞及原核细胞中是普遍存在的ꎬ其对生命体的正常运转具有重要意义ꎬ甚至关系到生命体的进化ꎮ常见的自组装蛋白包括病毒颗粒(virusparticles)㊁血清白蛋白(serumalbumin)㊁丝蛋白(silkprotein)及铁蛋白(ferritin)ꎮ其中ꎬ铁蛋白可形成粒径均一㊁生物相容性良好的纳米材料ꎬ还具有独特的理化性质ꎬ如pH敏感㊁高温耐受㊁大多数变性剂耐受ꎬ即可通过调节pH来控制铁蛋白的自组装特性ꎮ铁蛋白是存在于大多数生物体内的天然蛋白ꎬ在肿瘤的诊断成像及治疗㊁药物载体和纳米疫苗等领域具有广阔的应用前景ꎮ重点探讨了铁蛋白的仿生合成及其在纳米疫苗领域的应用进展ꎬ以期为新型动物纳米疫苗的研发提供参考ꎮ关键词:自组装蛋白ꎻ重组铁蛋白ꎻ纳米疫苗DOI:10.19586/j.2095 ̄2341.2018.0139ApplicationProgressofSelf ̄assembledFerritininNano ̄vaccineWEIZhenzhen1ꎬLIUXingjian2ꎬWANGPeng1ꎬZHANGZhifang2ꎬYIYongzhu3∗1.CollegeofBiotechnologyꎬJiangsuUniversityofScienceandTechnologyꎬJiangsuZhenjiang212003ꎬChinaꎻ2.BiotechnologyResearchInstituteꎬChineseAcademyofAgriculturalSciencesꎬBeijing100081ꎬChinaꎻ3.SericulturalResearchInstituteꎬChineseAcademyofAgriculturalSciencesꎬJiangsuZhenjiang212018ꎬChinaAbstract:Self ̄assembledproteinsareubiquitousineukaryoticandprokaryoticcellsꎬandtheyareimportantforlivingorganismstomaintainthenormaloperationꎬandevenrelatedtotheevolutionoflivingorganisms.Commonself ̄assembledproteinsincludevirusparticlesꎬserumalbuminꎬsilkproteinandferritin.Amongthemꎬferritincanformnanomaterialswithuniformparticlesizeandgoodbiocompatibility.ItalsohasuniquephysicalandchemicalpropertiesꎬsuchaspHsensitivityꎬhightemperaturetoleranceꎬandresistancetomostdenaturantsꎬsoastocontroltheself ̄assemblycharacteristicsofferritinbypHregulation.Ferritinisanaturalproteinfoundinmostlivingorganismsꎬandithasabroadapplicationprospectintumordiagnosticimagingandtherapyꎬdrugcarrierandnano ̄vaccine.Thebionicsynthesisofferritinanditsapplicationinnano ̄vaccineweremainlydiscussedinordertoprovidereferencesfortheresearchanddevelopmentofnovelanimalnano ̄vaccine.Keywords:self ̄assembledproteinꎻrecombinantferritinꎻnano ̄vaccine㊀㊀自组装蛋白在真核细胞及原核细胞中是普遍存在的ꎬ蛋白质亚基间会自发组装构成高度有序的结构ꎬ这是维持机体正常运转的保证ꎬ也是机体进化的推动力[1]ꎮ由自组装蛋白形成的纳米材料ꎬ不仅具有生物相容性良好以及粒径均一㊁稳定的特性ꎬ还在细胞成像㊁病灶检测和药物缓释等方面具有广阔的应用前景ꎮ到目前为止ꎬ研究最多的自组装蛋白纳米颗粒包括病毒颗粒(virusparticles)㊁血清白蛋白(se ̄rumalbumin)㊁丝蛋白(silkprotein)及铁蛋白(fer ̄ritin)ꎮ其中ꎬ病毒颗粒侵染宿主细胞并在宿主细胞内的自组装行为ꎬ是自然界中典型的生物纳米. All Rights Reserved.材料的形成方式ꎬ主要用于特异性检测以及病毒侵染宿主细胞的机制和路径的研究[2ꎬ3]ꎬ经基因修饰后还可用于研制借助病毒释放基因的药物等方面的研究[4]ꎻ血清白蛋白是脊椎动物血浆中含量最高的蛋白质ꎬ其分子的弹性良好ꎬ结构改变后也极易恢复ꎬ不同来源的血清白蛋白的空间构造均十分保守[5]ꎬ在药物传递系统领域拥有潜在的应用前景[6]ꎻ丝蛋白是一类线状蛋白的生物高分子材料ꎬ可抗紫外线ꎬ也可抗蛋白水解酶ꎬ其柔韧性好㊁抗疲劳度高ꎬ有着与钢材类似的张力强度ꎬ还具有良好的热㊁酸㊁碱稳定性和生物相容性ꎬ在生物材料[7]和药物载体[8]领域应用广泛ꎮ而铁蛋白是存在于大多数生物体内的天然蛋白ꎬ具有独特的理化性质:①铁蛋白对pH不耐受ꎬ较为敏感ꎬ在酸性条件(pH2.0)下铁蛋白外壳会解体成亚基ꎬ而当pH回升到生理条件(pH7.4)时ꎬ各亚基又重组形成完整的铁蛋白[9ꎬ10]ꎻ②铁蛋白的天然高级结构不受多种变性剂的影响ꎬ一般蛋白质在1~4mol/L的低浓度盐酸胍或者脲溶液中就会发生变性ꎬ而铁蛋白在6mol/L的盐酸胍或8mol/L的脲溶液中才会发生蛋白质解聚ꎬ即铁蛋白对变性剂的耐受性高[11]ꎻ③铁蛋白对高温具有较高的耐受性ꎬ大多数蛋白质在温度高于生理条件后极易变性ꎬ但铁蛋白在高温(70ħ~80ħ)时可维持10min以上不会发生变性ꎬ且其高级结构维持完好[12]ꎮ基于铁蛋白独特的理化性质ꎬ本文主要对铁蛋白的仿生合成及其在肿瘤的诊断成像及治疗㊁药物载体和纳米疫苗领域的应用进展进行了综述ꎬ阐述了天然铁蛋白的结构及修饰㊁人工制备重组铁蛋白的研究进程ꎬ分析了重组铁蛋白在各领域中的应用ꎬ以期为研发对机体无害㊁适应不同生物体的新型疫苗提供参考ꎮ1㊀铁蛋白的结构及其修饰在生命体中ꎬ天然的铁蛋白主要由水合氧化铁核和蛋白质外壳2个部分组成ꎬ其结构是高度对称的ꎬ封闭的笼形结构由24个亚基组成ꎮ哺乳动物铁蛋白外壳的分子量约为480kDaꎬ外直径约为12nmꎬ可容纳约4500个铁原子的内腔直径约为8nmꎮ哺乳动物机体中的铁蛋白外壳是由H亚基和L亚基组成的ꎬ但亚铁氧化酶活性中心(ferroxidasecenter)只存在于H亚基上[13]ꎮ许多在机体中发挥重要作用的蛋白质和辅酶的组成成分都含有铁元素ꎻ而广泛存在于机体中的铁蛋白在铁离子代谢中起着至关重要的作用ꎬ可维持铁的稳态ꎬ抵抗氧化应激ꎻ此外ꎬ铁蛋白还可以捕捉游离二价铁将其氧化并形成稳定的铁核ꎬ从而消除过量金属离子的其他毒性作用[14]ꎮ自然界中的铁蛋白都含有铁核ꎬ其组分是水铁矿(5Fe2O3 9H2O)ꎬ也可称之为全铁蛋白(ho ̄loferritin)ꎬ即铁蛋白(ferritin)ꎬ而不含铁内核的铁蛋白ꎬ称为去铁铁蛋白(apoferritin)ꎮ铁蛋白的球形中空结构有3个界面:内表面㊁外表面及亚基间接触面(图1)[15]ꎮ在对铁蛋白进行修饰改造时ꎬ其内表面可将材料包裹于铁蛋白内核ꎬ作为纳米复合材料合成的纳米反应器ꎻ外表面可连接配体ꎬ赋予铁蛋白特殊功能ꎻ亚基间接触面可通过调节溶液pH完成解聚与重组ꎬ开发铁蛋白的新功能ꎮ图1㊀可用于修饰的铁蛋白3个界面[16]Fig.1㊀Threeinterfacesofferritinthatcanbeusedformodification[16].2㊀重组铁蛋白的人工制备随着交叉学科的快速发展㊁生物学与纳米技术的联用ꎬ仿生合成铁蛋白技术也逐渐得到改善ꎮ1991年ꎬ英国巴斯大学首次合成了磁性铁蛋白ꎬ他们以天然马脾铁蛋白为模板ꎬ人工除去了水铁矿(5Fe2O3 9H2O)的天然内核ꎬ并将磁性铁核在马脾铁蛋白的空腔内合成[17]ꎬ这项工作开辟了一个新领域 仿生合成纳米颗粒ꎮ但这同样也存在着问题ꎬ在利用天然马脾铁蛋白外壳作为模板142魏珍珍ꎬ等:自组装铁蛋白在纳米疫苗领域的应用进展. All Rights Reserved.合成纳米颗粒前ꎬ首先要除去蛋白质内的天然水铁矿内核ꎬ而去核的过程需要利用可破坏蛋白质外壳的强还原剂处理铁蛋白ꎬ以致亚铁离子不能全部进入蛋白质外壳的内核中ꎬ而是吸附到蛋白质外壳的表面被氧化ꎬ从而导致合成的铁蛋白聚集[18]ꎮ天然铁蛋白的自组装特性ꎬ使得在大肠杆菌中批量表达重组铁蛋白成为可能ꎮ利用大肠杆菌表达的铁蛋白亚基可以自组装形成24聚体的铁蛋白外壳ꎬ与天然铁蛋白相比ꎬ结构一致㊁分散性好㊁粒径均一ꎬ所以在不破坏铁蛋白外壳完整性的前提下ꎬ可将大肠杆菌作为优良的模式生物来仿生合成铁蛋白纳米颗粒ꎮ2006年ꎬ美国蒙大拿州立大学首次利用大肠杆菌成功获得几乎纯的铁蛋白外壳ꎬ并以这些铁蛋白外壳为模板ꎬ仿生合成了磁性铁蛋白[19]ꎮ这种新技术不仅极大地简化了分离纯化天然铁蛋白外壳的过程ꎬ而且避免了强还原剂对蛋白质外壳的破坏ꎬ保持了蛋白质外壳良好的完整性ꎬ使得整个合成过程高效且快速ꎮ值得注意的是ꎬ虽然利用大肠杆菌可仿生合成与天然铁蛋白结构相似的铁蛋白ꎬ但是二者内核晶型不同ꎬ仿生合成铁蛋白的内核为Fe3O4ꎬ具有超顺磁性ꎬ这也是仿生合成的铁蛋白被称为磁性铁蛋白的原因ꎮ目前ꎬ已能够成功构建基于大肠杆菌的铁蛋白原核表达体系ꎬ利用IPTG诱导表达后ꎬ经过纯化㊁复性等步骤ꎬ即可获得与天然结构相同的铁蛋白纳米颗粒ꎬ其在生物医药领域具有广泛的应用前景[20]ꎮ仿生合成的铁蛋白纳米颗粒与其他纳米颗粒相比ꎬ具有以下优点:①粒径小ꎬ约为12nmꎬ有利于其在病灶组织(如肿瘤)的渗透和积累[21]ꎻ②粒径均一ꎬ在大肠杆菌中能仿生合成理想的粒径均匀且分散性良好的铁蛋白纳米颗粒ꎻ③生物相容性良好ꎬ利用大肠杆菌表达的人重组铁蛋白纳米颗粒制成的生物技术药物ꎬ应用于机体后ꎬ不易引起免疫排斥反应ꎬ对机体的毒性有较大程度的降低ꎻ④易于靶向性修饰ꎬ铁蛋白纳米颗粒在合成时可直接通过基因修饰ꎬ在外壳及亚基间接触面上修饰所需肽段等ꎬ使其成为纳米载体ꎮ此外ꎬ仿生合成的磁性铁蛋白纳米颗粒内核为Fe3O4ꎬ具有超顺磁性和过氧化物酶活性的双功能特性ꎮFe3O4的内核直径在4~7nmꎬ具有超顺磁性ꎬ使其成为潜在的MRI造影剂[22]ꎮ而我国科学家于2007年发现ꎬFe3O4磁性纳米颗粒还具有过氧化物酶的活性[23]ꎬ即在显色底物中含有H2O2时ꎬFe3O4磁性纳米颗粒可以将其催化氧化发生颜色反应ꎮ已有研究表明ꎬ铁蛋白的表达量在病变的脑组织和多种类型的肿瘤细胞中都较正常组织细胞多[24]ꎮ目前ꎬ检测脑神经退化性疾病及各种肿瘤的无创伤性的手段即为磁共振成像(magneticresonanceimagingꎬMRI)ꎬ可以对病变组织内的铁含量进行定量检测[25]ꎮ因此ꎬ仿生合成的磁性铁蛋白纳米颗粒在病灶诊断及治疗中具有巨大的应用前景(图2)ꎮ3㊀铁蛋白纳米颗粒的应用3.1㊀铁蛋白纳米颗粒在药物载体领域的应用铁蛋白纳米颗粒在药物载体领域ꎬ不仅可作为载体ꎬ同时还可作为信号分子ꎮ基于铁蛋白纳米颗粒具有的良好的生物相容性和特殊的球形空腔结构ꎬ其可成为铁氰化物㊁荧光素等各类小分子探针的理想载体ꎮ英国诺丁汉大学以无内核的铁蛋白外壳作为纳米材料的载体ꎬ系统地评估了铁蛋白包装对纳米材料稳定性及生物相容性的影响ꎮ实验结果表明ꎬ包装有探针的纳米颗粒不仅具有量子点优异的荧光性质ꎬ同时ꎬ还因为被铁蛋白包裹而降低了相应的毒性ꎻ通过进一步对铁蛋白外壳的修饰ꎬ包裹有量子点的铁蛋白纳米颗粒还可实现靶向细胞识别ꎬ并使得靶向过程可视[28]ꎬ为后期的临床诊断及病灶组织治疗提供了重要的技术支持ꎮ此外ꎬ铁蛋白也可作为信号分子ꎬ在生物传感器中利用其纳米材料的特性ꎬ双向放大电信号ꎬ构建一种电化学免疫检测方法ꎮ如利用金纳米颗粒与rGO ̄AuNPs材料修饰的玻碳电极合成AuNPs ̄Ab2 ̄Ferritin复合物ꎬ通过2次免疫反应可形成AuNPs ̄Ab2 ̄ferritin/Ag/Ab1/rGO ̄Au ̄chi/GCꎬ一种特殊的夹心免疫结构ꎬ该结构能实现检测人血浆硝化铜蓝蛋白(nitratedceruloplasmin)的目的[29]ꎮ3.2㊀铁蛋白纳米颗粒在纳米疫苗领域的应用研究人员基于铁蛋白特殊的空间结构ꎬ对其进行改造ꎬ结果表明ꎬ生物基因改造不会影响铁蛋白亚基间的自组装ꎬ而且24个亚基的基因均可进242生物技术进展CurrentBiotechnology. All Rights Reserved.图2㊀可用于靶向肿瘤并使其可视化的磁性铁蛋白纳米颗粒Fig.2㊀Magneticferritinnanoparticlesthatcanbeusedtotargetandvisualizetumors.注:A:仿生合成磁性铁蛋白[26]ꎻB:磁性铁蛋白的双功能特性ꎻC:常规免疫组化方法ꎻD:磁性铁蛋白检测肿瘤新技术[27]ꎮ行改造ꎬ这一发现使得铁蛋白纳米颗粒成为一个疫苗开发和抗原递呈的平台[30]ꎮ2006年ꎬ美国新世纪医药公司首次利用铁蛋白外壳作为呈递抗原的疫苗研发平台ꎬ在铁蛋白L亚基的N端融合表达HIV ̄1病毒的Tat肽段ꎬ利用铁蛋白的自组装特性生成融合蛋白ꎬ随后进行动物免疫实验ꎬ实验结果表明ꎬ该融合蛋白在动物机体内可激起免疫应答反应[30]ꎮ2013年ꎬ美国国家卫生研究所和过敏与传染病研究所将铁蛋白应用于流感疫苗的研发ꎬ将幽门螺杆菌铁蛋白亚基的N端与流感病毒的血凝素蛋白(hemagglutininꎬHA)基因融合ꎬ当铁蛋白自组装形成融合蛋白时ꎬ由蛋白核心向外伸出引入的血凝素HAꎬ由于铁蛋白具有三重对称轴ꎬ因而可形成8个HA突起ꎬ与流感病毒表面的突起相似(图3)[32]ꎮ将该融合蛋白纳米颗粒作为抗原进行动物免疫实验ꎬ在动物体内成功诱导了中和性抗体ꎬ达到了流感病毒疫苗的作用ꎮ同时ꎬ与传统灭活病毒疫苗相比ꎬ这种流感血凝素融合蛋白纳米颗粒在动物体内产生的中和性抗体水平高10倍以上ꎬ而且存在于铁蛋白表面的HA突起能特异性识别流感病毒HA三聚体蛋白的茎部和头部这2个高度保守的位点ꎮ此外ꎬ这种新型疫苗的免疫范围更广ꎬ能中和绝大多数同型病毒ꎮ通过基因修饰ꎬ铁蛋白自组装纳米图3㊀流感病毒HA的铁蛋白纳米颗粒的分子设计和表征[32]Fig.3㊀ThemoleculardesignandcharacterizationofferritinnanoparticlesfrominfluenzavirusHA[32].注:纳米粒子的负面染色TEM图像ꎮ1~6代表了HA尖峰在图像中的编号ꎮ342魏珍珍ꎬ等:自组装铁蛋白在纳米疫苗领域的应用进展. All Rights Reserved.颗粒还可以融合表达其他病毒抗原作为抗原递呈的制备疫苗平台ꎬ为各类动物病毒病的防治提供了较好的技术支持ꎮ目前ꎬ在制备双组分铁蛋白纳米颗粒ꎬ即同时表达多种抗原的铁蛋白纳米颗粒方面也做了尝试(图4)ꎬ纳米颗粒上的抗原多聚化可以使中和抗体响应得到改善[33]ꎮ在此研究中ꎬ设计了双组分铁蛋白变体ꎬ允许在1个颗粒上以确定的比例和几何图案黏着2种不同的抗原ꎮ双组分铁蛋白专门设计用于三聚体抗原ꎬ每个抗原接受每个颗粒图4㊀双组分铁蛋白纳米粒子的设计ꎬ用于附着不同的三聚体抗原[33]Fig.4㊀Designoftwo ̄componentferritinnanoparticlesforattachmentofdifferenttrimericantigens[33].注:单组分铁蛋白的示意图ꎮ其具有8个拷贝的三聚体抗原A(黑色)和双组分铁蛋白ꎬ每个三聚体抗原A具有4个拷贝(黑色)和B(灰色)ꎮ4个三聚体ꎬ并用来自HIV ̄1包膜(Env)和流感血凝素(HA)的抗原进行测试ꎮ用具有不同Env㊁HA或2种抗原的双组分铁蛋白颗粒对豚鼠进行免疫ꎬ引发针对各病毒的中和抗体应答ꎮ该结果证明了铁蛋白表面可展示不只1种抗原ꎬ也提供了双组分纳米颗粒自组装原理的证据ꎬ将来可作为三聚体抗原的多聚体免疫原呈递的一般技术ꎮ此研究的成功展开ꎬ为后期新型疫苗的制备开拓了新的思路ꎮ相比于直接在铁蛋白表面表达抗原ꎬ也可在铁蛋白表面或者空腔内连接衍生自卵清蛋白的抗原肽OT ̄1(SIINFEKL)或OT ̄2(ISQAVHAA ̄HAEINEAGR)ꎬ然后再将重组铁蛋白作用于树突细胞ꎬ其可启动和控制抗原特异性免疫应答ꎮ树突细胞在其中起着重要作用ꎬ即将抗原内化ꎬ再加工和呈递给原始T淋巴细胞并诱导其增殖和分化为效应细胞(图5)ꎬ导致抗原特异性靶细胞的选择性杀伤[21]ꎬ同时ꎬIFN ̄γ/IL ̄2和IL ̄10/IL ̄13细胞因子的产生可证实铁蛋白纳米疫苗会增强机体的免疫反应ꎮ基于树突细胞的铁蛋白纳米颗粒疫苗的开发已成为体内直接抗原特异性适应性免疫的非常有前景的一种方法ꎮ图5㊀携带OT肽的铁蛋白蛋白笼纳米颗粒诱导的抗原特异性T细胞增殖和随后的免疫应答[34]Fig.5㊀FerroproteinproteincagenanoparticlescarryingOTpeptideinducedantigen ̄specificTcellproliferationandsubsequentimmuneresponse[34].4㊀展望自组装蛋白广泛存在于机体中ꎬ与其他自组装蛋白相比ꎬ自组装铁蛋白具有独特的解聚与重组方式ꎬ可耐受高热和高浓度变性剂ꎬ同时其独特的高级空间结构也便于进行基因定向修饰ꎬ可在一定程度上对修饰过程实现精准控制ꎮ通过生物手段与化学方法相结合的修饰方法ꎬ如在铁蛋白表面共价连接各类大分子ꎬ可实现特异性修饰特定位点ꎬ还可赋予铁蛋白更多新的性能ꎬ铁蛋白的应用范围也被拓宽ꎻ而通过将标记蛋白与铁蛋白亚基融合表达ꎬ使融合蛋白有序的展示在铁蛋白外壳的外表面ꎬ可提高抗体或药物等目标蛋白的载量和效率ꎬ从而作为一种潜在的新型疫苗ꎮ同时ꎬ基于铁蛋白的纳米颗粒特性ꎬ其也可作为信号442生物技术进展CurrentBiotechnology. All Rights Reserved.分子在生物传感器中双向放大信号ꎬ构建电化学免疫检测方法ꎬ在疾病诊治方面具有广阔的应用前景ꎮ因而ꎬ实现铁蛋白的改造及修饰多功能化是未来研究的重要方向ꎮ不过ꎬ有关自组装铁蛋白的研究仍有以下3个方面亟待深入探究:①铁蛋白的磁学性质及生理机制ꎻ②铁蛋白表面展示融合蛋白后ꎬ其具体的作用机制及通路ꎻ③目前作为抗原载体的铁蛋白多为昆虫的铁蛋白及马脾铁蛋白ꎬ其他生物体内的铁蛋白的具体分类及差异ꎮ使用从机体提取的天然无害蛋白来生产各种疫苗是值得期待的ꎬ并且生产纳米级疫苗是近期的研究重点ꎬ利用铁蛋白表面表达单种融合抗原甚至可能是多种融合抗原来生产新型疫苗必将成为未来的研究热点ꎮ参㊀考㊀文㊀献[1]㊀BergerBꎬWaldispühlJ.Novelperspectivesonproteinstructureprediction[A].In:ProblemSolvingHandbookinComputationalBiologyandBioinformatics[M].Boston:Spring ̄erꎬ2010ꎬ179-207.[2]㊀BeecherJF.Organicmaterials:Woodꎬtreesandnanotechnology[J].Nat.Nanotechnol.ꎬ2007ꎬ2(8):466-467. [3]㊀DouglasTꎬYoungM.Host ̄guestencapsulationofmaterialsbyassembledvirusproteincages[J].Natureꎬ1998ꎬ393(6681):152-155.[4]㊀WeaverJꎬZakeriRꎬAouadiSꎬetal..Synthesisandcharacter ̄izationofquantumdot ̄polymercomposites[J].J.Mater.Chem.ꎬ2009ꎬ19(20):3198-3206.[5]㊀BeattieWGꎬDugaiczykA.Structureandevolutionofhumanα ̄fetoproteindeducedfrompartialsequenceofclonedcDNA[J].Geneꎬ1982ꎬ20(3):415-422.[6]㊀何乃普ꎬ潘素娟ꎬ王荣民.热诱导白蛋白与壳聚糖在溶液中的自组装[J].高分子学报ꎬ2015(1):61-69. [7]㊀吴蕾.丝素蛋白取向凝胶/羟基磷灰石复合支架的设计及对骨髓间充质干细胞成骨性能的调控研究[D].江苏苏州:苏州大学ꎬ硕士学位论文ꎬ2017.[8]㊀雷容.多孔丝素蛋白颗粒的制备及其作为阿霉素药物载体的研究[D].杭州:浙江理工大学ꎬ硕士学位论文ꎬ2018. [9]㊀KangSꎬOltroggeLMꎬBroomellCCꎬetal..Controlledas ̄semblyofbifunctionalchimericproteincagesandcompositionanalysisusingnoncovalentmassspectrometry[J].J.Am.Chem.Soc.ꎬ2008ꎬ130(49):16527-16529.[10]㊀王占通.基于铁蛋白纳米颗粒的诊断治疗一体化探针研究[D].福建厦门:厦门大学ꎬ博士学位论文ꎬ2017. [11]㊀SantambrogioPꎬPintoPꎬSoniaLꎬetal..Effectsofmodifica ̄tionsnearthe2 ̄ꎬ3 ̄and4 ̄foldsymmetryaxesonhumanfer ̄ritinrenaturation[J].Biochem.J.ꎬ1997ꎬ322(2):461-468. [12]㊀StefaniniSꎬCavalloSꎬWangCQꎬetal..ThermalstabilityofhorsespleenapoferritinandhumanrecombinantHapoferritin[J].Arch.Biochem.Biophys.ꎬ1996ꎬ325(1):58-64. [13]㊀StillmanTJꎬHempsteadPDꎬArtymiukPJꎬetal..Thehigh ̄resolutionX ̄raycrystallographicstructureoftheferritin(EcFt ̄nA)ofEscherichiacoliꎻcomparisonwithhumanHferritin(HuHF)andthestructuresoftheFe3+andZn2+derivatives[J].J.Mol.Biol.ꎬ2001ꎬ307(2):587-603.[14]㊀AlkhateebAAꎬConnorJR.Nuclearferritin:Anewroleforferritinincellbiology[J].BBAGeneSubjectsꎬ2010ꎬ1800(8):793-797.[15]㊀UchidaMꎬKangSꎬReichhardtCꎬetal..Theferritinsuper ̄family:Supramoleculartemplatesformaterialssynthesis[J].BBAGeneSubjectsꎬ2010ꎬ1800(8):834-845.[16]㊀胡有生ꎬ邹国林.用铁蛋白合成纳米粒子的研究进展[J].氨基酸和生物资源ꎬ2003ꎬ25(3):34-36.[17]㊀MeldrumFCꎬWadeVJꎬNimmoDLꎬetal..Synthesisofin ̄organicnanophasematerialsinsupramolecularproteincages[J].Natureꎬ1991ꎬ349(6311):684-687.[18]㊀MoskowitzBMꎬFrankelRBꎬWaltonSAꎬetal..Determina ̄tionofthepreexponentialfrequencyfactorforsuper ̄paramagneticmaghemiteparticlesinmagnetoferritin[J].J.Geophys.Res.Sol.Ea.ꎬ1997ꎬ102(B10):22671-22680. [19]㊀OkudaMꎬKobayashiYꎬSuzukiKꎬetal..Self ̄organizedinor ̄ganicnanoparticlearraysonproteinlattices[J].NanoLett.ꎬ2005ꎬ5(5):991-993.[20]㊀李志鹏ꎬ刘福航ꎬ崔奎青ꎬ等.铁蛋白Ferritin原核表达和纯化及纳米颗粒胞外自组装[J].畜牧兽医学报ꎬ2018ꎬ49(1):75-82.[21]㊀DreherMRꎬLiuWꎬMichelichCRꎬetal..Tumorvascularpermeabilityꎬaccumulationꎬandpenetrationofmacromoleculardrugcarriers[J].J.NatlCancerI.ꎬ2006ꎬ98(5):335-344. [22]㊀UchidaMꎬTerashimaMꎬCunninghamCHꎬetal..Ahumanferritinironoxidenano ̄compositemagneticresonancecontrastagent[J].Magnet.Reson.Med.ꎬ2008ꎬ60(5):1073-1081. [23]㊀阎锡蕴ꎬ高利增ꎬ聂棱ꎬ等.磁性纳米材料的新功能及新用途:中国ꎬ101037676B[P].2011-05-04.[24]㊀SabbahENꎬKadoucheJꎬEllisonDꎬetal..InvitroandinvivocomparisonofDTPA ̄andDOTA ̄conjugatedantiferritinmono ̄clonalantibodyforimagingandtherapyofpancreaticcancer[J].Nucl.Med.Biol.ꎬ2007ꎬ34(3):293-304.[25]㊀HammondKEꎬMetcalfMꎬCarvajalLꎬetal..Quantitativeinvivomagneticresonanceimagingofmultiplesclerosisat7Teslawithsensitivitytoiron[J].Ann.Neurol.ꎬ2008ꎬ64(6):707-713.[26]㊀FanKꎬCaoCꎬPanYꎬetal..Magnetoferritinnanoparticlesfortargetingandvisualizingtumourtissues[J].Nat.Nanotechnol.ꎬ2012ꎬ7(7):459-464.[27]㊀FanKꎬGaoLꎬYanX.Humanferritinfortumordetectionandtherapy[J].WIRESNanomed.Nanobiotechnol.ꎬ2013ꎬ5(4):287-298.[28]㊀TuryanskaLꎬBradshawTDꎬSharpeJꎬetal..Thebiocompati ̄bilityofapoferritin ̄encapsulatedPbSquantumdots[J].Smallꎬ2009ꎬ5(15):1738-1741.[29]㊀刘碧荣.基于纳米技术的免疫传感器在生物标志物检测中的应用[D].武汉:华中师范大学ꎬ硕士学位论文ꎬ2014. [30]㊀张婷婷.基于铁蛋白的纳米结构可控自组装与功能化[D].河南开封:河南大学ꎬ硕士学位论文ꎬ2016.[31]㊀CarterDCꎬLiCQ.Ferritinfusionproteinsforuseinvaccinesandotherapplications:USꎬ20040006001A1[P].2004-01-08. [32]㊀KanekiyoMꎬWeiCJꎬYassineHMꎬetal..Self ̄assemblinginfluenzananoparticlevaccineselicitbroadlyneutralizingH1N1antibodies[J].Natureꎬ2013ꎬ499(7456):102-106. [33]㊀GeorgievISꎬJoyceMGꎬChenREꎬetal..Two ̄componentferritinnanoparticlesformultimerizationofdiversetrimericanti ̄gens[J].ACSInfect.Dis.ꎬ2018ꎬ4(5):788-796. [34]㊀HanJAꎬKangYJꎬShinCꎬetal..Ferritinproteincagenano ̄particlesasversatileantigendeliverynanoplatformsfordendriticcell(DC) ̄basedvaccinedevelopment[J].Nanomedicineꎬ2014ꎬ10(3):561-569.542魏珍珍ꎬ等:自组装铁蛋白在纳米疫苗领域的应用进展. All Rights Reserved.。

合成生物学整理

合成生物学整理

本课程。。。综合Wikipedia和Wikigenes的基础上,整合了班级同学的共同努力,为今后的合成生物学教学提供参考。
所有编者(按姓氏拼音):
陈鹏祥、陈颂赞、丁彦甫、高嘉豪、胡大辉、林汉扬、刘苏滢、蒋刘一琦、潘唯玮、沈浩卿、盛涛涛、冉雪彬、王紫鑫、吴芑柔、肖雨曦、薛继统、杨文君、叶青、袁略真、张霈婧、张正越、郑炯壕、仲策、周丽娜
合成生物学的快速发展由三项关键的技术促成——数学模型的建立、DNA的合成以及DNA测序技术。
4.1 数学模型的建立
正如系统生物学,合成生物学的发展离不开生物过程的数学模型建立。近来,人们开始发展更大规模、更多层次的基因调节网络模型,以达到模拟整体基因调控网络中的生物分子相互作用,其中包括转录、翻译和基因表达调控的激活与抑制。目前有很多商业化的免费软件可供系统生物学家们使用,但是我们也注意到了合成生物学家们对整合的开发环境(IDE)的需求,例如各种工程化领域中的计算机辅助设计系统(CAD)。除了整合开发环境的需求,高通量的计算也对合成生物学的研究起到关键作用,例如使用并行计算、云计算等方式进行有效的药物发现。具体来说,模式设计、模型建立、校验合成生物学设备与系统,以及生物学参数的量化处理都是合成生物学中模型建立的重要组成部分,原因在于生物学过程的模型预测与真实情况的差异可能让我们发现对生物学过程的假设的一些缺陷,并且提示我们合成生物系统中存在的“故障”。未来,合成生物学的强力工具将帮助我们完成时间依赖的参数测量,以及大量的参数平行测量。
(合成生物学中的一些工具以及他们的应用描述已经展示在了下面的链接中:/e/art/e/187.html)
4.2 DNA合成
DNA或寡核苷酸的化学合成是合成生物学的重要组分。多亏了自动DNA合成仪的进步,现在合成和集成完整的基因、调控元件、基因回路或者整个微生物基因组已经成为可能。Khorana和他的同事们先驱性地探究了从寡核苷酸合成DNA的工作,并首次完成了一个酵母tRNA基因。这个过程也叫作基因的人工合成,因为不需要使用起始DNA模板。生长激素抑制素是第一个被化学合成的肽链,而白细胞干扰素则是第一个能在细菌里表达的人工蛋白合成基因。这些研究揭示了合成生物学的可能具有的应用。DNA的化学合成通常比重组DNA克隆更加直接经济,且被生物技术常规使用。

J. Comput. Chem.

J. Comput. Chem.

2D Depiction of Nonbonding Interactions forProtein ComplexesPENG ZHOU,1FEIFEI TIAN,2ZHICAI SHANG11Institute of Molecular Design&Molecular Thermodynamics,Department of Chemistry,Zhejiang University,Hangzhou310027,China2College of Bioengineering,Chongqing University,Chongqing400044,ChinaReceived7May2008;Revised25June2008;Accepted22July2008DOI10.1002/jcc.21109Published online22October2008in Wiley InterScience().Abstract:A program called the2D-GraLab is described for automatically generating schematic representation of nonbonding interactions across the protein binding interfaces.The inputfile of this program takes the standard PDB format,and the outputs are two-dimensional PostScript diagrams giving intuitive and informative description of the protein–protein interactions and their energetics properties,including hydrogen bond,salt bridge,van der Waals interaction,hydrophobic contact,p–p stacking,disulfide bond,desolvation effect,and loss of conformational en-tropy.To ensure these interaction information are determined accurately and reliably,methods and standalone pro-grams employed in the2D-GraLab are all widely used in the chemistry and biology community.The generated dia-grams allow intuitive visualization of the interaction mode and binding specificity between two subunits in protein complexes,and by providing information on nonbonding energetics and geometric characteristics,the program offers the possibility of comparing different protein binding profiles in a detailed,objective,and quantitative manner.We expect that this2D molecular graphics tool could be useful for the experimentalists and theoreticians interested in protein structure and protein engineering.q2008Wiley Periodicals,Inc.J Comput Chem30:940–951,2009Key words:protein–protein interaction;nonbonding energetics;molecular graphics;PostScript;2D-GraLabIntroductionProtein–protein recognition and association play crucial roles in signal transduction and many other key biological processes. Although numerous studies have addressed protein–protein inter-actions(PPIs),the principles governing PPIs are not fully under-stood.1,2The ready availability of structural data for protein complexes,both from experimental determination,such as by X-ray crystallography,and by theoretical modeling,such as protein docking,has made it necessary tofind ways to easily interpret the results.For that,molecular graphics tools are usually employed to serve this purpose.3Although a large number of software packages are available for visualizing the three-dimen-sional(3D)structures(e.g.PyMOL,4GRASP,5VMD,6etc.)and interaction modes(e.g.MolSurfer,7ProSAT,8PIPSA,9etc.)of biomolecules,the options for producing the schematic two-dimensional(2D)representation of nonbonding interactions for PPIs are very scarce.Nevertheless,a few2D graphics programs were developed to depict protein-small ligand interactions(e.g., LIGPLOT,10PoseView,11MOE,12etc.).These tools,however, are incapable of handling the macromolecular complexes.Some other available tools presenting macromolecular interactions in 2D level mainly include DIMPLOT,10NUCPLOT,13and MON-STER,14etc.Amongst,only the DIMPLOT can be used for aesthetically visualizing the nonbinding interactions of PPIs. However,such a program merely provides a simple description of hydrogen bonds,hydrophobic interactions,and steric clashes across the binding interfaces.In this article,we describe a new molecular graphics tool, called the two-dimensional graphics lab for biosystem interac-tions(2D-GraLab),which adopts the page description language (PDL)to intuitively,exactly,and detailedly reproduce the non-bonding interactions and energetics properties of PPIs in Post-Script page.Here,the following three points are the emphasis of the2D-GraLab:(i)Reliability.To ensure the reliability,the pro-grams and methods employed in2D-GraLab are all widely used in chemistry and biology community;(ii)Comprehensiveness. 2D-GraLab is capable of handling almost all the nonbonding interactions(and even covalent interactions)across binding Additional Supporting Information may be found in the online version of this article.Correspondence to:Z.Shang;e-mail:shangzc@interface of protein complexes,such as hydrogen bond,salt bridge,van der Waals(vdW)interaction,hydrophobic contact, p–p stacking,disulfide bond,desolvation effect,and loss of con-formational entropy.The outputted diagrams are diversiform, including individual schematic diagram and summarized sche-matic diagram;(iii)Artistry.We elaborately scheme the layout, color match,and page style for different diagrams,with the goal of producing aesthetically pleasing2D images of PPIs.In addi-tion,2D-GraLab provides a graphical user interface(GUI), which allows users to interact with this program and displays the spatial structure and interfacial feature of protein complexes (see .Fig.S1).Identifying Protein Binding InterfacesAn essential step in understanding the molecular basis of PPIs is the accurate identification of interprotein contacts,and based upon that,subsequent works are performed for analysis and lay-out of nonbonding mon methods identifyingprotein–protein binding interfaces include a Voronoi polyhedra-based approach,changes in solvent accessible surface area(D SASA),and various radial cutoffs(e.g.,closest atom,C b,andcentroid,etc.).152D-GraLab allows for the identification of pro-tein–protein binding interfaces at residue and atom levels.Identifying Binding Interfaces at Residue LevelAll the identifying interface methods at residue level belong toradial cutoff approach.In the radial cutoff approach,referencepoint is defined in advance for each residue,and the residues areconsidered in contact if their reference points fell within thedefined cutoff ually,the C a,C b,or centroid are usedas reference point.16–18In2D-GraLab,cutoff distance is moreflexible:cutoff distance5r A1r B1d,where r A and r B are residue radii and d is set by users(as the default d54A˚,which was suggested by Cootes et al.19).Identifying Binding Interfaces at Atom LevelAt atom level,binding interfaces are identified using closestatom-based radial cutoff approach20and D SASA-basedapproach.21For the closest atom-based radial cutoff approach,ifthe distance between any two atoms of two residues from differ-ent chains is less than a cutoff value,the residues are consideredin contact;In the D SASA-based approach,the SASA is calcu-lated twice to identify residues involved in a binding interface,once for the monomers and once for the complex,if there is achange in the SASA(D SASA)of a residue when going from themonomers to the dimer form,then it is considered involved inthe binding interface.In2D-GraLab,three manners are provided for visualizing thebinding interfaces,including spatial structure exhibition,residuedistance plot,and residue-pair contact map(see .Figs.S2–S4).Analysis and2D Layout of NonbondingInteractionsThe inputfile of2D-GraLab is standard PDB format,and the outputs are two-dimensional PostScriptfile giving intuitive and informative representation of the PPIs and their strengths, including hydrogen bond,salt bridge,vdW interaction,desolva-tion effect,ion-pair,side-chain conformational entropy(SCE), etc.The outputs are in two forms as individual schematic dia-gram and summarized schematic diagram.The individual sche-matic diagram is a detailed depiction of each nonbonding profile,whereas the summarized schematic diagram covers all nonbonding interactions and disulfide bonds across the binding interface.To produce the aesthetically high quality layouts,which pos-sess reliable and accurate parameters,several widely used pro-grams listed in Table1are employed in2D-GraLab to perform the core calculations and analysis of different nonbonding inter-actions.2D-GraLab carries out prechecking procedure for pro-tein structures and warns the structural errors,but not providing revision and refinement functions.Therefore,prior to2D-GraLab analysis,protein structures are strongly suggested to be prepro-cessed by programs such as PROCHECK(structure valida-tion),27Scwrl3(side-chain repair),28and X-PLOR(structure refinement).29Individual Schematic DiagramHydrogen BondThe program we use for analyzing hydrogen bonds across bind-ing interfaces is HBplus,23which calculates all possible posi-tions for hydrogen atoms attached to donor atoms which satisfy specified geometrical criteria with acceptor atoms in the vicinity. In2D-GraLab,users can freely select desired hydrogen bonds involving N,O,and/or S atoms.Besides,the water-mediated hydrogen bond is also given consideration.Bond strength of conventional hydrogen bonds(except those of water-mediated Table1.Standalone Programs Employed in2D-GraLab.Program FunctionReduce v3.0322Adding hydrogen atoms for proteinsHBplus v3.1523Identifying hydrogen bonds and calculatingtheir geometric parametersProbe v2.1224Identifying steric contacts and clashes at atomlevelMSMS v2.6125Calculating SASA values of protein atoms andresiduesDelphi v4.026Calculating Coulombic energy and reactionfield energy,determining electrostatic energyof ion-pairsDIMPLOT v4.110Providing application programming interface,users can directly set and executeDIMPLOT in the2D-GraLab GUI9412D Depiction of Nonbonding Interactions for Protein ComplexesFigure1.(a)Schematic representation of a conventional hydrogen bond and a water-mediated hydro-gen bond across the binding interface of IGFBP/IGF complex(PDB entry:2dsr).This diagram was produced using2D-Gralab.The conventional hydrogen bond is formed between the atom N(at the backbone of residue Leu69in chain B)and the atom OE1(at the side-chain of residue Glu3in chain I);The water-mediated hydrogen bond is formed between the atom ND1(at the side-chain of residue His5in chain B)and the atom O(at the backbone of residue Asp20in chain I),and because hydrogen positions of water are almost never known in the PDBfile,the water molecule,when serving as hydrogen bond donor,is not yet determined for its H...A length and D—H...A angle,denoted as mark ‘‘????.’’In this diagram,chains,residues,and atoms are labeled according to the PDB format.(b)Spa-tial conformation of the conventional hydrogen bond.(c)Spatial conformation of the water-mediated hydrogen bond.hydrogen bonds)is calculated using Lennard-Jones 8-6potential with angle weighting.30D U HB¼E m 3d m 8À4d m6"#cos 4h ðh >90 Þ(1)where d is the separation between the heavy acceptor atom andthe donor hydrogen atom in angstroms;E m ,the optimum hydro-gen-bond energy for the particular hydrogen-bonding atoms con-sidered;d m ,the optimum hydrogen-bond length for the particu-lar hydrogen-bonding atoms considered.E m and d m vary accord-ing to the chemical type of the hydrogen-bonding atoms.The hydrogen bond potential is set to zero when angle h 908.31Hydrogen bond parameters are taken from CHARMM force field (for N and O atoms)and Autodock (for S atom).32,33Figure 1a is the schematic representation of a conventional hydrogen bond and a water-mediated hydrogen bond across the binding interface of insulin-like growth factor-binding protein (IGFBP)/insulin-like growth factor (IGF)complex.In this dia-gram,abundant information about the hydrogen bond geometry and energetics properties is presented in a readily acceptant manner.Figures 1b and 1c are spatial conformations of the cor-responding conventional hydrogen bond and water-mediated hydrogen bond.Van der Waals InteractionThe small-probe approach developed in Richardson’s laboratory enables us to detect the all atom contact profile in protein pack-ing.2D-GraLab uses program Probe 24to realize this method to identity steric contacts and clashes on the binding interfaces.Word et al.pointed out that explicit hydrogen atoms can effec-tively improve Probe’s performance.24However,considering calculations with explicit hydrogen atoms are time-consuming,and implicit hydrogen mode is also possibly used in some cases;therefore,in 2D-GraLab,both explicit and implicit hydrogen modes are provided for users.In addition,2D-GraLab uses the Reduce 22to add hydrogen atoms for proteins,and this programis also developed in Richardson’s laboratory and can be wellcompatible with Probe.According to previous definition,vdW interaction between two adjacent atoms is classified into wide contact,close contact,small overlap,and bad overlap.24Typically,vdW potential function has two terms,a repulsive term and an attractive term.In 2D-GraLab,vdW interaction is expressed as Lennard-Jones 12-6potential.34D U SI ¼E m d m d 12À2d md6"#(2)where E m is the Lennard-Jones well depth;d m is the distance at the Lennard-Jones minimum,and d is the distance between two atoms.The Lennard-Jones parameters between pairs of different atom types are obtained from the Lorentz–Berthelodt combina-tion rules.35Atomic Lennard-Jones parameters are taken from Probe and AMBER force field.24,36Figure 2a was produced using 2D-GraLab and gives a sche-matic representation of steric contacts and clashes (overlaps)between the heavy chain residue Tyr131and two light chain res-idues Ser121and Gln124of cross-reaction complex FAB (the antibody fragment of hen egg lysozyme).By this diagram,we can obtain the detail about the local vdW interactions around the residue Tyr131.In contrast,such information is inaccessible in the 3D structural figure (Fig.2b).Desolvation EffectIn 2D-GraLab,program MSMS 25is used to calculate the SASA values of interfacial residues at atom level,and four atomic radii sets are provided for calculating the SASA,including Bondi64,Chothia75,Li98,and CHARMM83.32,37–39Bondi64is based on contact distances in crystals of small molecules;Chothia75is based on contact distances in crystals of amino acids;Li98is derived from 1169high-resolution protein crystal structures;CHARMM83is the atomic radii set of CHARMM force field.Desolvation free energy of interfacial residues is calculated using empirical additive model proposed by Eisenberg andFigure 2.(a)Schematic representation of steric contacts and overlaps between the residue Tyr131in heavy chain (chain H)and the surrounding residues Ser121and Gln124in light chain (chain L)of cross-reaction complex FAB (PDB entry:1fbi).This diagram was produced using 2D-Gralab in explicit hydrogen mode.In this diagram,interface is denoted by the broken line;Wide contact,close contact,small overlap,and bad overlap are marked by blue circle,green triangle,yellow square,and pink rhombus,respectively;Moreover,vdW potential of each atom-pair is given in the histogram,with the value measured by energy scale,and the red and blue indicate favorable (D U \0)and unfav-orable (D U [0)contributions to the binding,respectively;Interaction potential 20.324kcal/mol in the center circle denotes the total vdW contribution by residue Tyr131;Chains,residues,and heavy atoms are labeled according to the PDB format,and hydrogen atoms are labeled in Reduce format.(b)Spatial conformation of chain H residue Tyr131and its local environment.Green or yellow stands forgood contacts (green for close contact and yellow for slight overlaps \0.2A˚),blue for wide contacts [0.25A˚,hot pink spikes for bad overlaps !0.4A ˚.It is revealed that Tyr131is in an intensive clash with chain L Gln124,while in slight contact with chain L Ser121,which is well consistent with the 2D schematic diagram.9432D Depiction of Nonbonding Interactions for Protein Complexes944Zhou,Tian,and Shang•Vol.30,No.6•Journal of Computational ChemistryFigure2.(Legend on page943.)Maclachlam,40and the conformation of interfacial residues is assumed to be invariant during the binding process.D G dslv¼Xic i D A i(3)where the sum is over all the atoms;c i and D A i are the atomic solvation parameter(ASP)and the changes in solvent accessible surface area(D SASA)of atom i,respectively.Juffer et al.41 found that although desolvation free energies calculated from different ASP sets are linear correlation to each other,the abso-lute values are greatly different.In view of that,2D-GraLab pro-vides four ASP sets published in different periods:Eisenberg86, Kim90,Schiffer93,and Zhou02.40,42–44As shown in Figure3,the D SASA and desolvation free energy of interfacial residues in chain A of HLA-A*0201pro-tein complex during the binding process are reproduced in a rotiform diagram form using2D-GraLab.In this diagram,the desolvation free energy contributed by chain A is28.056kcal/ mol,and moreover,the D SASA value of each interfacial residue is also presented clearly.Ion-PairThere are six types of residue-pairs in the ion-pairs:Lys-Asp, Lys-Glu,Arg-Asp,Arg-Glu,His-Asp,and ually,ion-pairs include three kinds:salt bridge,NÀÀO bridge,and longer-range ion-pair,and found that most of the salt bridges are stabi-lizing toward proteins;the majority of NÀÀO bridges are stabi-lizing;the majority of the longer-range ion-pairs are destabiliz-ing toward the proteins.45The salt bridge can be further distin-guished as hydrogen-bonded salt bridge(HB-salt bridge)and nonhydrogen-bonded salt bridge(NHB-salt bridge or salt bridge).46In2D-GraLab,the longer-range ion-pair is neglected, and for short-range ion-pair,four kinds are defined:HB-salt bridge,NHB-salt bridge or salt bridge,hydrogen-bonded NÀÀO bridge(HB-NÀÀO bridge),and nonhydrogen-bonded N-O bridge (NHB-NÀÀO bridge or NÀÀO bridge).Although both the N-terminal and C-terminal residues of a given protein are also charged,the large degree offlexibility usually experienced by the ends of a chain and the poor structural resolution resulting from it.47Therefore,we preclude these terminal residues in the 2D-GraLab.A modified Hendsch–Tidor’s method is used for calculating association energy of ion-pairs across binding interfaces.48D G assoc¼D G dslvþD G brd(4)where D G dslv represents the sum of the unfavorable desolvation penalties incurred by the individual ion-pairing residues due to the change in their environment from a high dielectric solvent (water)in the unassociated state;D G brd represents the favorable bridge energy due to the electrostatic interaction of the side-chain charged groups.We usedfinite difference solutions to the linearized Poisson–Boltzmann equations in Delphi26to calculate the D G dslv and D G brd.Centroid of the ion-pair system is used as grid center,with temperature of298.15K(in this way,1kT50.593kcal/mol),and the Debye-Huckel boundary conditions are applied.49Considering atomic parameter sets have a great influ-ence on the continuum electrostatic calculations of ion-pair asso-ciation energy,502D-GraLab provides three classical atomic parameter sets for users,including PARSE,AMBER,and CHARMM.51–53Figure4is the schematic representation of four ion-pairs formed across the binding interface of penicillin acylase enzyme complex.This diagram clearly illustrates the information about the geometries and energetics properties of ion-pairs,such as bond length,centroid distance,association energy,and angle. The ion-pair angle is defined as the angle between two unit vec-tors,and each unit vector joins a C a atom and a side-chain charged group centroid in an ion-pairing residue.54In this dia-gram,the four ion-pairs,two HB-salt bridges,and two HB-NÀÀO bridges formed across the binding interface are given out. Association energies of the HB-salt bridges are both\21.5 kcal/mol,whereas that of the HB-NÀÀO bridges are all[20.5 kcal/mol.Therefore,it is believed that HB-salt bridge is more stable than HB-NÀÀO bridge,which is well consistent with the conclusion of Kumar and Nussinov.45,46Side-Chain Conformational EntropyIn general,SCE can be divided into the vibrational and the con-formational.55Comparison of several sets of results using differ-ent techniques shows that during protein folding process,the mean conformational free energy change(T D S)is1kcal/mol per side-chain or0.5kcal/mol per bond.Changes in vibrational entropy appear to be negligible compared with the entropy change resulted from the loss of accessible rotamers.56SCE(S) can be calculated quite simply using Boltzmann’s formulation.57S¼ÀRXip i ln p i(5)where R is the universal gas constant;The sum is taken over all conformational states of the system and p i is the probability of being in state i.Typical methods used for SCE calculations, include self-consistent meanfield theory,58molecular dynam-ics,59Monte Carlo simulation,60etc.,that are all time-consum-ing,thus not suitable for2D-GraLab.For that,the case is sim-plified,when we calculate the SCE of an interfacial residue,its local surrounding isfixed(adopting crystal conformation).In this way,SCE of each interfacial residue is calculated in turn.For the20coded amino acids,Gly,Ala,Pro,and Cys in disulfide bonds are excluded.57For other cases,each residue’s side-chain conformation is modeled as a rotamer withfinite number of discrete states.61The penultimate rotamer library used was developed by Lovell et al.,62as recommended by Dun-brack for the study of SCE.63For an interfacial residue,the potential E i of each rotamer i is calculated in both binding state and unbinding state,and subsequently,rotamer’s probability dis-tribution(p)of this residue is resulted by Boltzmann’s distribu-tion law,then the SCE in different states are solved out using eq.(5).The situation of rotamer i is defined as serious clash or nonclash:serious clash is the clash score of rotamer i more than a given threshold value,and then E i511;whereas for the9452D Depiction of Nonbonding Interactions for Protein Complexes946Zhou,Tian,and Shang•Vol.30,No.6•Journal of Computational ChemistryFigure3.Schematic representation of desolvation effect for interfacial residues in chain A of HLA-A*0201complex(PDB entry:1duz).This diagram was produced using2D-GraLab.In this diagram,the pie chart is equally divided,with each section indicates an interfacial residue in chain A;In a sec-tor,red1blue is the SASA of corresponding residue in unbinding state,the blue is in binding state,and the red is thus of D SASA;The green polygonal line is made by linking desolvation free energy ofeach interfacial residue,and at the purple circle,desolvation free energy is0(D U50),beyond thiscircle indicates unfavorable contributions to binding(D U[0),otherwise is favorable(D U\0);Inthe periphery,residue symbols are colored in red,blue,and black in terms of favorable,unfavorable,and neutral contributions to the binding,respectively;The SASA and desolvation free energy for eachinterfacial residue can be measured qualitatively by the horizontally black and green scales.[Colorfigure can be viewed in the online issue,which is available at .]Figure4.Four ion-pairs formed across the binding interface of penicillin acylase enzyme complex (PDB entry:1gkf).In thisfigure,left is2D schematic diagram produced using2D-GraLab,and posi-tively and negatively charged residues are colored in blue and red,respectively;Bridge-bonds formed between the charged atoms of ion-pairs are colored in green,blue,and yellow dashed lines for the hydrogen-bonded bridge,nonhydrogen-bonded bridge,and long-range interactions,respectively;The three parameters in bracket are ion-pair type,angle,and association energy.The right in thisfigure is the spatial conformations of corresponding ion-pairs.[Colorfigure can be viewed in the online issue, which is available at .]Figure5.(a)Loss of side-chain conformational entropy of chain B interfacial residues in HIV-1 reverse transcriptase complex(PDB entry:1rt1).This diagram was produced using2D-GraLab.In this diagram,the pie chart is equally divided,with each section indicates an interfacial residue in chain B; In a sector,side-chain conformational entropies in unbinding and binding state are colored in yellow and blue,respectively;The green polygonal line is made by linking conformational free energy of each interfacial residue;The conformational entropy and conformational free energy for each interfa-cial residue can be measured qualitatively by the horizontally black and green scales,respectively;In the periphery,residue symbols are colored in yellow,blue,and black in terms of favorable,unfavora-ble,and neutral contributions to binding,respectively.(b)The rotamers of chain B interfacial residues Lys20,Lys22,Tyr56,Asn136,Ile393,and Trp401in HIV-1reverse transcriptase complex.These rotamers were generated using2D-GraLab.[Colorfigure can be viewed in the online issue,which is available at .]9472D Depiction of Nonbonding Interactions for Protein Complexes948Zhou,Tian,and Shang•Vol.30,No.6•Journal of Computational ChemistryFigure5.(Legend on page947.)Figure6.The summarized schematic diagram of nonbonding interactions and disulfide bond across the interface of AIV hemagglutinin H5complex(PDB entry:1jsm).Length of chain A and chain B are321and160,represented as two bold horizontal lines.Interface parts in the bold lines are colored in orange,and residue-pairs in interactions are linearly linked;Conventional hydrogen bond,water-mediated hydrogen bond,ionpair,hydrophobic force,steric clash,p–p stacking,and disulfide bond are colored in aqua,bottle green,red,blue,purple,yellow,and brown,respectively;In the‘‘dumbbell shape’’symbols,residue-pair types and distances are also presented.[Colorfigure can be viewed in the online issue,which is available at .]9492D Depiction of Nonbonding Interactions for Protein Complexescase of nonclash,four potential functions are used in2D-Gra-Lab:(i)E i5E0,a constant61;(ii)statistical potential,the poten-tial energy E i of rotamer i is calculated from database-derived probability61;(iii)coarse-grained model,E i of rotamer i is esti-mated by atomic contact energies(ACE)64;and(iv)Lennard-Jones potential.58Loss of binding entropy of chain B interfacial residues in HIV-1reverse transcriptase complex is schematically repre-sented in Figure5a.Similar to desolvation effect diagram,loss of binding entropy is also presented in a rotiform diagram form. This diagram reveals that during the process of forming HIV-1 reverse transcriptase complex,the total loss of conformational free energy of chain B is9.14kcal/mol,indicating a strongly unfavorable contribution to binding(D G[0),and the average loss of conformational free energy for each residue is about0.3 kcal/mol,much less than those in protein folding(about1kcal/ mol56).Figure5b shows the rotamers of six interfacial residues in chain B.Summarized Schematic DiagramFigure6illustrates nonbonding interactions and disulfide bond formed across the binding interface of avian influenza virus (AIV)hemagglutinin H5.This protein is a dimer linked by a disulfide bond.In this diagram,conventional hydrogen bond, water-mediated hydrogen bond,ion-pair,hydrophobic force, steric clash,p–p stacking,and disulfide bond are represented in different colors.Hydrogen bonds,colored in aqua,are calculated by program HBplus.23Data in this diagram are the separation between the acceptor atom and the heavy donor atom.Water-mediated hydrogen bonds are colored in bottle green, also calculated by HBplus.23Ion-pairs,colored in red,include salt bridge and NÀÀO bridge,determined by the Kumar’s rule.45,46Data in this dia-gram are centroid distance of ion-pair.Hydrophobic forces are colored in blue.According to the D SASA rule,if the two apolar and/or aromatic interfacial resi-dues(Leu,Ala,Val,Ile,Met,Cys,Pro,Tyr,Phe,and Trp)are within the distance d\r A1r B12.8(r A and r B are side-chain radii,2.8is the diameter of water molecule),they are considered in hydrophobic contact.Data in this diagram are centroid–cent-roid separation between the two residues.Steric clashes are colored in purple.Here,only bad overlaps calculated by Probe24are presented.In2D-GraLab,explicit and implicit hydrogen modes are provided,hydrogen atoms in explicit hydrogern mode are added using Reduce.22Data in this diagram are the centroid–centroid separation when the two atoms are badly overlapped.p–p stacking are colored in yellow.Presently,studies on pro-tein stacking interactions are in lack.In2D-GraLab,p–p stack-ing is identified using the McGaughey’s rule,65i.e.,if the cent-roid–centroid separation between two aromatic rings is within 7.5A˚,they are regarded as p–p stacking(aromatic residues are Phe,Tyr,Trp,and His).This rule has been successfully adopted to study the p–p stacking across protein interfaces by Cho et al.66Besides,2D-GraLab also sets the constraints of stacking angle(dihedral angel between the planes of two aromatic rings).Data in this diagram are centroid–centroid separations between two aromatic rings in stacking state.Disulfide bonds are colored in brown,taken from the PDB records.Data in this diagram are the separations of two sulfide atoms.ConclusionsMost,if not all,biological processes are regulated through asso-ciation and dissociation of protein molecules and essentially controlled by nonbonding energetics.67Graphically-intuitive vis-ualization of these nonbonding interactions is an important approach for understanding the mechanism of a complex formed between two proteins.Although a large number of software packages are available for visualizing the3D structures,the options for producing schematic2D summaries of nonbonding interactions for a protein complex are comparatively few.In practice,the2D and3D visualization methods are complemen-tary.In this article,we have described a new2D molecular graphics tool for analyzing and visualizing PPIs from spatial structures,and the intended goal is to schematically present the nonbonding interactions stabilizing the macromolecular complex in a graphically-intuitive manner.We anticipate that renewed in-terest in automated generation of2D diagrams will significantly reduce the burden of protein structure analysis and make insights into the mechanism of PPIs.2D-GraLab is written in C11and OpenGL,and the output-ted2D schematic diagrams of nonbinding interactions are described in PostScript.Presently,2D-GraLab v1.0is available to academic users free of charge by contacting us. References1.Chothia,C.;Janin,J.Nature1974,256,705.2.Jones,S.;Thornton,J.M.Proc Natl Acad Sci USA1996,93,13.3.Luscombe,N.M.;Laskowski,R.A.;Westhead,D.R.;Milburn,D.;Jones,S.;Karmirantzoua,M.;Thornton,J.M.Acta Crystallogr D 1998,54,1132.4.DeLano,W.L.The PyMOL Molecular Graphics System;DeLanoScientific:San Carlos,CA,2002.5.Petrey,D.;Honig,B.Methods Enzymol2003,374,492.6.Humphrey,W.;Dalke,A.;Schulten,K.J Mol Graphics1996,14,33.7.Gabdoulline,R.R.;Wade,R.C.;Walther,D.Nucleic Acids Res2003,31,3349.8.Gabdoulline,R.R.;Hoffmann,R.;Leitner,F.;Wade,R.C.Bioin-formatics2003,19,1723.9.Wade,R. C.;Gabdoulline,R.R.;De Rienzo, F.Int J QuantumChem2001,83,122.10.Wallace, A. C.;Laskowski,R. A.;Thornton,J.M.Protein Eng1995,8,127.11.Stierand,K.;Maaß,P.C.;Rarey,M.Bioinformatics2006,22,1710.12.Clark,A.M.;Labute,P.J Chem Inf Model2007,47,1933.13.Luscombe,N.M.;Laskowski,R. A.;Thorntonm J.M.NucleicAcids Res1997,25,4940.14.Salerno,W.J.;Seaver,S.M.;Armstrong,B.R.;Radhakrishnan,I.Nucleic Acids Res2004,32,W566.15.Fischer,T.B.;Holmes,J.B.;Miller,I.R.;Parsons,J.R.;Tung,L.;Hu,J.C.;Tsai,J.J Struct Biol2006,153,103.950Zhou,Tian,and Shang•Vol.30,No.6•Journal of Computational Chemistry。

异质结构-NaGdF_(4)Yb,Er纳米棒负载在金属有机框架上以调节上转换光致发光

异质结构-NaGdF_(4)Yb,Er纳米棒负载在金属有机框架上以调节上转换光致发光

第40卷第2期2021年4月红外与毫米波学报J.Infrared Millim.Waves Vol.40,No.2 April,2021文章编号:1001-9014(2021)02-0166-06DOI:10.11972/j.issn.1001-9014.2021.02.005The heterostructure NaGdF4:Yb,Er nanorods loaded on metal-organicframeworks for tuning upconversion photoluminescenceLIU Yi,JIAO Ji-Qing*,LYU Bai-Ze,WANG Jiu-Xing(College of Materials Science and Engineering,National Center of International Joint Research for Hybrid Materials Technology,National Base of International Sci.&Tech.Cooperation,Qingdao University,Qingdao266071,China)Abstract:Multi-component heterostructure nanocomposites can not only inherit the original properties of eachcomponent,but also induce new chemical and electronic properties through the interaction between the compo⁃nents.The heterostructure zeolitic imidazolate framework/NaGdF4:Yb,Er(ZIF-67/NaGdF4:Yb,Er)was pre⁃pared by a stepwise synthesis strategy.And it avoided agglomeration and quenching of upconversion(UC)nanoparticles,and displayed better stability.In the heterostructure nanocomposites,ZIF-67is employed as an en⁃ergy transmission platform under980nm pared to pure NaGdF4:Yb,Er nanorods,the UC photo⁃luminescence of heterostructure ZIF-67/NaGdF4:Yb,Er is tuned from green to red owing to the synergistic effect of each component.Key words:heterostructure,controllable synthesis,nanocomposite,luminescence,upconversionPACS:42异质结构—NaGdF4:Yb,Er纳米棒负载在金属有机框架上以调节上转换光致发光刘毅,焦吉庆*,吕柏泽,王久兴(青岛大学材料科学与工程学院国家杂化材料技术国际联合研究中心国际科学技术合作国家基地,山东青岛266071)摘要:多组分异质结构纳米复合材料不仅可以继承每个组分原有的性能,而且还可以通过组分之间的相互作用诱导出新的化学、电子性能。

数据库系统英文文献

数据库系统英文文献

Database Systems1. Fundamental Concepts of DatabaseDatabase and database technology are having a major impact on the growing use of computers. It is fair to say that database will play a critical role in almost all areas where computers are used, including business, engineering, medicine, law, education, and library science, to name a few. The word "database" is in such common use that we must begin by defining what a database is. Our initial definition is quit general.A database is a collection of related data. By data, we mean known facts that can be recorded and that have implicit meaning. For example, consider the names, telephone numbers, and addresses of all the people you know. Y ou may have recorded this data in an indexed address book, or you may have stored it on a diskette using a personal computer and software such as DBASE III or Lotus 1-2-3. This is a collection of related data with an implic it meaning and hence is a database.The above definition of database is quite general; for example, we may consider the collection of words that make up thispage of text to be related data and hence a database. However, the common use of the term database is usually more restricted.A database has the following implicit properties:.A database is a logically coherent collection of data with some inherent meaning. A random assortment of data cannot bereferred to as a database..A database is designed, built, and populated with data for a specific purpose. It has an intended group of users and somepreconceived applications in which these users are interested..A database represents some aspect of the real world, sometimes called the mini world. Changes to the mini world are reflected in the database.In other words, a database has some source from which data are derived, some degree of interaction with events in the real world, and an audience that is actively interested in the contents of the database.A database can be of any size and of varying complexity. For example, the list of names and addresses referred to earlier may have only a couple of hundred records in it, each with asimple structure. On the other hand, the card catalog of a large library may contain half a million cards stored under different categories-by primary author’s last name, by subject, by book title, and the like-with each category organized in alphabetic order. A database of even greater size and complexity may be that maintained by the Internal Revenue Service to keep track of the tax forms filed by taxpayers of the United States. If we assume that there are 100million taxpayers and each taxpayer files an average of five forms with approximately 200 characters of information per form, we would get a database of 100*(106)*200*5 characters(bytes) of information. Assuming the IRS keeps the past three returns for each taxpayer in addition to the current return, we would get a database of 4*(1011) bytes. This huge amount of information must somehow be organized and managed so that users can search for, retrieve, and update the data as needed.A database may be generated and maintained manually or by machine. Of course, in this we are mainly interested in computerized database. The library card catalog is an example of a database that may be manually created and maintained. A computerized database may be created and maintained either by a group of application programs written specifically for that task or by a database management system.A data base management system (DBMS) is a collection of programs that enables users to create and maintain a database. The DBMS is hence a general-purpose software system that facilitates the processes of defining, constructing, and manipulating databases for various applications. Defining a database involves specifying the types of data to be stored in the database, along with a detailed description of each type of data. Constructing the database is the process of storing the data itself on some storage medium that is controlled by the DBMS. Manipulating a database includes such functions as querying the database to retrieve specific data, updating the database to reflect changes in the mini world, and generating reports from the data.Note that it is not necessary to use general-purpose DBMS software for implementing a computerized database. We could write our own set of programs to create and maintain the database, in effect creating our own special-purpose DBMS software. In either case-whether we use a general-purpose DBMS or not-we usually have a considerable amount of software to manipulate the database in addition to the database itself. The database and software are together called a database system.2. Data ModelsOne of the fundamental characteristics of the database approach is that it provides some level of data abstraction by hiding details of data storage that are not needed by most database users. A data model is the main tool for providing this abstraction. A data is a set of concepts that can beused to describe the structure of a database. By structure of a database, we mean the data types, relationships, and constraints that should hold on the data. Most data models also include a set of operations for specifying retrievals and updates on the database.Categories of Data ModelsMany data models have been proposed. We can categorize data models based on the types of concepts they provide to describe the database structure. High-level or conceptual data models provide concepts that are close to the way many users perceive data, whereas low-level or physical data models provide concepts that describe the details of how data is stored in the computer. Concepts provided by low-level data models are generally meant for computer specialists, not for typical end users. Between these two extremes is a class of implementation data models, which provide concepts that may be understood by end users but that are not too far removed from the way data is organized within the computer. Implementation data models hide some details of data storage but can be implemented on a computer system in a direct way.High-level data models use concepts such as entities, attributes, and relationships. An entity is an object that is represented in the database. An attribute is a property that describes some aspect of an object. Relationships among objects are easily represented in high-level data models, which are sometimes called object-based models because they mainly describe objects and their interrelationships.Implementation data models are the ones used most frequently in current commerc ial DBMSs and include the three most widely used data models-relational, network, and hierarchical. They represent data using record structures and hence are sometimes called record-based data modes.Physical data models describe how data is stored in the computer by representing information such as record formats, record orderings, and access paths. An access path is a structure that makes the search for particular database records much faster.3. Classification of Database Management SystemsThe main criterion used to classify DBMSs is the data model on which the DBMS is based. The data models used most often in current commercial DBMSs are the relational, network, and hierarchical models. Some recent DBMSs are based on conceptual or object-oriented models. We will categorize DBMSs as relational, hierarchical, and others.Another criterion used to classify DBMSs is the number of users supported by the DBMS. Single-user systems support only one user at a time and are mostly used with personal computer. Multiuser systems include the majority of DBMSs and support many users concurrently.A third criterion is the number of sites over which the database is distributed. Most DBMSs are centralized, meaning that their data is stored at a single computer site. A centralized DBMS can support multiple users, but the DBMS and database themselves reside totally at a single computer site. A distributed DBMS (DDBMS) can have the actual database and DBMS software distributed over many sites connected by a computer network. Homogeneous DDBMSs use the same DBMS software at multiple sites. A recent trend is to develop software to access several autonomous preexisting database stored under heterogeneous DBMSs. This leads to a federated DBMS (or multidatabase system),, where the participating DBMSs are loosely coupled and have a degree of local autonomy.We can also classify a DBMS on the basis of the types of access paty options available for storing files. One well-known family of DBMSs is based on inverted file structures. Finally, a DBMS can be general purpose of special purpose. When performance is a prime consideration, a special-purpose DBMS can be designed and built for a specific application and cannot be used for other applications, Many airline reservations and telephone directory systems are special-purpose DBMSs.Let us briefly discuss the main criterion for classifying DBMSs: the data mode. The relational data model represents a database as a collection of tables, which look like files. Mos t relational databases have high-level query languages and support a limited form of user views.The network model represents data as record types and also represents a limited type of 1:N relationship, called a set type. The network model, also known as the CODASYL DBTG model, has an associated record-at-a-time language that must be embedded in a host programming language.The hierarchical model represents data as hierarchical tree structures. Each hierarchy represents a number of related records. There is no standard language for the hierarchical model, although most hierarchical DBMSs have record-at-a-time languages.4. Client-Server ArchitectureMany varieties of modern software use a client-server architecture, in which requests by one process (the client) are sent to another process (the server) for execution. Database systems are no exception. In the simplest client/server architecture, the entire DBMS is a server, except for the query interfaces that interact with the user and send queries or other commands across to the server. For example, relational systems generally use the SQL language for representing requests from the client to the server. The database server then sends the answer, in the form of a table or relation, back to the client. The relationship between client and server can get more work in theclient, since the server will e a bottleneck if there are many simultaneous database users.。

农村集体土地确权登记工作流程和特点--广东省广州市花都案例

农村集体土地确权登记工作流程和特点--广东省广州市花都案例

农村集体土地确权登记工作流程和特点--广东省广州市花都案例周羽【摘要】完善我国农村集体土地确权登记发证系统是我国土地管理重要工作之一。

这将有助于加强农村土地管理、盘活农村土地、推动土地制度改革、实现土地集约化利用。

此项工作涉及多个部门与单位,工作量庞大。

其主要工作包括:确定宗地面积界限、面积、权利主体、地籍数据数据库建库、申请的审批、归档。

以广州市花都区为例,通过调查该区域的基础农村地籍资料的完整程度,分析各个乡镇街道的土地情况,回顾整个农村集体土地确权登记的工作流程,总结2012-2013年全国农村集体土地确权登记到“经济社”一级工作中采用的新方式、新特点。

%It is among the most important jobs for the land management of China to improve the system of rural collective land right verification,registration and certification,which will strengthen rural land management,efficiently use land,promote institutional reform of land,and achieve intensified useof land.Many departments will be involved in this job as its main tasks include identifying the parcellboundary,area and ownership,constructing databases,examining and approving the applications, and archiving the files. With Huadu District as an example, this paper analyzes and summarizes the new mode and characteristics in rural collective land verification and registration from 2012 to 2013,based on the investigation of basic rural land registration information and the analysis of land situation.【期刊名称】《国土资源科技管理》【年(卷),期】2014(000)004【总页数】4页(P139-142)【关键词】农村土地;工作流程;确权登记【作者】周羽【作者单位】广东省核工业地质测绘院,广东广州 510800【正文语种】中文【中图分类】F301(265)农村集体土地确权发证包含两方面内容:一是农村集体所有权的确权登记,另外一方面是农村集体土地使用权确权登记[1]。

一种基于结构域的蛋白质功能分类预测新方法

一种基于结构域的蛋白质功能分类预测新方法
这个方法局部计算结构域属于各个功能分类中的可能性只有那些属于某个功能分类的蛋白质的结构域组成信息才会被计算进去但是那些不属于这个功能分类的蛋白质的信息就被忽略了所以这个简单方法没有充分利用所有的信息
第 49 卷 第 20 期
2004 年 10 月
论 文
一种基于结构域的蛋白质功能分类预测新方法
俞晓晶 ①② * 林建成 ① * 石铁流 ① † 李亦学 ① †
功能分类目录
功能
下式计算得出 : F ( Dm , Cn ) = Smn . N mn
3 CELL CYCLE AND DNA PROCESSING 4 TRANSCRIPTION 5 PROTEIN SYNTHESIS 6 PROTEIN FATE (folding, modification, destination) 7 CELLULAR TRANSPORT AND TRANSPORT MECHANISMS 8 CELL RESCUE, DEFENSE AND VIRULENCE 9 REGULATION OF/INTERACTION WITH CELLULAR ENVIRONMENT 10 CELL FATE 11 CONTROL OF CELLULAR ORGANIZATION 12 SUBCELLULAR LOCALISATION 13 TRANSPORT FACILITATION
Dn ∈P i
Requirement (structural or catalytic)”包含的 ORF 数目 太少(少于 25), 不能进行统计计算, 所以在分析中没 有包含它们. PFAM 数据库包含用多序列比对和隐马 尔可夫模型 (HMM) 得到的完整的蛋白质结构域的谱 图 . 结构域的边界、家族成员以及比对是通过基于专 家经验、序列相似性、 HMM-profiles 和其他蛋白质 家族数据库的半自动的方法得到的 [33,34]. 本研究中 使用了 PFAM 数据库的一个子集 PFAM- A(Version 8.0), 它包含了 5193 个知名的结构域类型 . PFAM 的 另一个子集 PFAM-B 包含了大量的由 Domainer 程序 自动运算生成的小家族 [35], 但是这些比对的结果可 靠性比较低而且不生成 HMM-profiles, 也不被稳定 的支持和注释 [33], 所以不采用它作为蛋白质的结构 域组成成分. 将 Swiss-prot40 中的所有酵母蛋白质的 PFAM 结构域组成信息提取出来 [36], 在所有包含结构 域信息的 3010 个酵母蛋白质中, 1517 个蛋白质它们 的 ORF 在 MIPS 的功能目录中已有分类. 这样, 把数 据分成 2 个独立的数据集合, 即由 1200 个蛋白质组 成的训练集合和由 317 个蛋白质组成的测试集合. 然 后 , 用训练集合中的蛋白质结构域组成信息计算每 个结构域属于每个功能分类的可能性. 随后, 用对测 试集合中蛋白质分类的预测来评估方法 . 最后, 对用 “简单 ”方法和 MLE 方法得到的结果进行了比较 . (ⅱ ) 简单方法[28]. F(Dm, Cn )表示结构域 Dm 属 于功能分类 Cn 的可能性. 我们构造了一个直观简单 的 F 量度, 即用功能分类 Cn 中所有蛋白质包含结构 域 Dm 的数目除以功能分类 Cn 中所有蛋白质包含的所 有结构域的数目 . 这样 , 可能性的简单量度就可以由

生物反应器工程国家重点实验室-华东理工大学

生物反应器工程国家重点实验室-华东理工大学

2010年学术活动第169次SKLBE学术论坛作者:管理员发布:2010年12月16日浏览次数: 172报告人:中国科学技术大学生命科学学院合肥微尺度物质科学国家实验室(筹)刘海燕教授报告题目:分子间相互作用的再造与合成生物学元件摘要:合成生物学的重要理念之一是用模块化、标准化的单元构建有功能的生物系统。

在生物系统中,不同单元之间的“接口”主要需通过分子间相互作用实现,相互作用的特异性决定了不同“接口”之间的绝缘性。

由于生物大分子序列、结构和功能具有模块化的特点,通过分子间相互作用的设计和再造可作为一种通用的元件设计策略,包括:通过对酶-底物结合特异性的改造获得新的催化分子;通过对信号传导分子间结合特异性的改造改变信号通路、通过再造蛋白质-DNA、小分子-RNA相互作用获得通用的转录调控元件等。

本文将结合我们在计算方法、人工转录元件设计方面的工作讨论蛋白质参与的分子间相互作用再造。

时间:2010-12-16 下午2∶00地点:实验十八楼315会议室第170次SKLBE学术论坛作者:管理员发布:2010年12月15日浏览次数: 96报告人:复旦大学生科院副院长、复旦大学遗传工程国家重点实验室副主任王红艳教授报告题目:出生缺陷的遗传基础研究时间:2010-12-15下午3∶30地点:实验十八楼315会议室第168次SKLBE学术论坛作者:管理员发布:2010年12月2日浏览次数: 168报告人:生物芯片上海国家工程研究中心副主任张庆华研究员报告题目:蛋白磷酸化抗体芯片技术及在生命科学研究中的应用报告内容:1. 蛋白芯片技术的发展状况 2. 抗体芯片技术应用案例 3. 蛋白磷酸化抗体芯片的技术与产品特点 4. 蛋白与抗体芯片技术的应用与服务时间:2010-12-2 下午3:15地点:实验十八楼315会议室第167次SKLBE学术论坛作者:管理员发布:2010年11月29日浏览次数: 101报告人:日本九州工业大学清水和幸教授(Prof. Kazuyuki Shimizu)题目: Metabolic reguration analysis of a cell focusing on the relationship between global regulators and the metabolic pathway genes together with 13C-metabolic flux analysis时间: 2010年11月29日上午9:00地点: 实验十八楼315室第166次SKLBE学术论坛作者:管理员发布:2010年11月25日浏览次数: 104报告人:华东理工大学资源与环境工程学院危险化学物质风险评价与控制中心教授、博士生导师冯耀宇教授题目: 水回用和水安全—新发水源性病原微生物的检测和污染源追踪时间: 2010年11月25日下午2:00地点: 实验十八楼315室第165次SKLBE学术论坛作者:管理员发布:2010年10月27日浏览次数: 101报告人:Hesham M. Amin, Assiociate Professor, The University of Texas M. D. Anderson Cancer Center, Houston, TX题目: Novel oncogenic systems in lymphoma时间: 2010年10月27日星期三9:30地点: 实验十八楼315室第164次SKLBE学术论坛作者:管理员发布:2010年10月19日浏览次数: 105报告题目:1.含纤维原料制取生物友好型蛋白-糖饲料添加剂2.石油污染土壤生物修复方法,高效应用和反应条件报告人:俄罗斯科学院通讯院士、微生物学家、门捷列夫化工大学生物工程教研组教授妮娜.葛拉朵娃教授时间:2010年10月19上午9:45地点:实验18楼315室第163次SKLBE学术论坛作者:管理员发布:2010年10月18日浏览次数: 103报告题目:嗜热酶结构、功能及分子进化报告人:上海交通大学生命科学技术学院冯雁教授时间:2010年10月18日上午10:30-11:30地点:实验18楼315室第162次SKLBE学术论坛作者:管理员发布:2010年10月18日浏览次数: 119报告题目:Microbial Synthesis of Drugs and Fuels via Synthetic Biology报告人: 美国伊利诺伊大学厄巴纳香槟分校赵惠民教授时间:2010年10月18日上午9:00-10:30地点:实验18楼315第161次SKLBE学术论坛作者:管理员发布:2010年10月16日浏览次数: 106报告题目:Inorganic Surfaces that Selectively Bind Phosphate: Applications in Bioarrays, Biotargeting, and Supported Lipid Bilayers报告人:美国Florida Univeristy化学系主任Dan Talham教授时间:2010年10月16日上午9:30地点:一教101室第160次SKLBE学术论坛作者:管理员发布:2010年10月14日浏览次数: 101报告题目:Growth and Lipidomics Characterization of Nannochloropsis salina for Biofuels报告人:Prof. Peter Lammers, New Mexico State University, USA时间:2010年10月14日上午9:00地点:实验十八楼315室第159次SKLBE学术论坛作者:管理员发布:2010年10月13日浏览次数: 106报告题目:Refining the Vision for Cost-Competive Biofuel Production from Microalgae报告人:Prof. Bryan Willson, Colorado State University, USA时间:2010年10月13日上午9:00地点:实验十八楼315室第158次SKLBE学术论坛作者:管理员发布:2010年9月26日浏览次数: 107报告题目:极端环境微生物资源与利用报告人:浙江大学生命科学学院微生物研究所博士生导师吴敏教授报告时间:2010年9月26日下午2:30地点:实验18楼315室第157次SKLBE学术论坛作者:管理员发布:2010年9月20日浏览次数: 121报告题目:纤维素乙醇糖平台技术的研究进展和展望报告人:山东大学微生物技术国家重点实验室、国家糖工程技术研究中心方诩教授报告时间:2010年9月20日下午2:00地点:实验18楼315室第156次SKLBE学术论坛作者:管理员发布:2010年9月6日浏览次数: 110报告人:我校特聘讲座教授、日本立命馆大学今中忠行教授题目:Application of nano-bubble to biological systems时间:2010年9月6日上午9:00地点:实验十八楼315室第155次SKLBE学术论坛作者:管理员发布:2010年9月1日浏览次数: 93报告人:庞正宇博士,通用电气公司全球研发中心生命科学技术部,高级研究员题目:molecular pathology时间:2010年9月1日下午1:30地点:实验十八楼315室第154次SKLBE学术论坛作者:管理员发布:2010年8月25日浏览次数: 113报告人:Junyong Zhu, Ph.D Scientific Team Leader USDA Forest Products Laboratory题目:Studies on Cellulase Adsorption in Lignocellulosic Suspensions时间:2010年8月25日星期三下午2:00地点:实验十八楼315室第152次SKLBE学术论坛作者:管理员发布:2010年7月23日浏览次数: 106报告人:Dawei Lin, Ph.D. Director, Bioinformatics Core, UC Davis Genome Center题目:Next Generation Biology Through Next Generation Sequencing时间:2010.7.23日(星期五)下午3:00-4:30地点:实验十八楼315室第153次SKLBE学术论坛作者:管理员发布:2010年7月23日浏览次数: 104报告人:国家自然科学基金会审专家、校学位评定委员会委员、生物工程学院院长张元兴教授题目:国家自然科学基金和职称晋升的申请、答辩与评审时间:2010.7.23日(星期五)上午9:00地点:实验十八楼315室第151次SKLBE学术论坛作者:管理员发布:2010年7月21日浏览次数: 120报告人:美国佛罗里达大学化学系V.T and Louis Jackson杰出讲座教授谭蔚泓教授题目:Elucidation of the Molecular Foundation of Cancer:A Chemical Biology Approach时间:2010.7.21日(星期三)下午14:00地点:实验十八楼315室第150次SKLBE学术论坛作者:管理员发布:2010年7月9日浏览次数: 125报告人:华东理工大学药学院杨有军副教授题目: A Highly Selective Low-Background Fluorescent Imaging Agent for NO using Chemodosimeter Involving *in situ* Fluorophore Synthesis (CIFS) Approach时间:2010-7-9(周五)上午9:00地点:实验十八楼315室第149次SKLBE学术论坛作者:管理员发布:2010年7月1日浏览次数: 1811.报告人:Kal Karim 博士,英国克兰菲尔德大学题目:Advancing a healthy life- Education and business activities in Cranfield Health时间:2010-7-1(星期四)上午10:30地点:实验十八楼315室2.报告人:葛屹博士,英国克兰菲尔德大学题目:Exploring unique and holistic solutions to facilitate and promote good health - Cranfield Health’s cuttin g edge researches & technologies时间:2010-7-1(星期四)下午14:00地点:实验十八楼315室3.报告人:李松军博士,英国克兰菲尔德大学题目:智能分子印迹聚合物设计、合成及其可控制、可调节的催化作用时间:2010-7-1(星期四)下午15:30地点:实验十八楼315室第148次SKLBE学术论坛作者:管理员发布:2010年6月29日浏览次数: 122报告人:Dr. Zhen-Yu CHEN (陳振宇教授)Associate Editor, Journal of Agricultural and Food Chemistry题目:How to Write a Manuscript如何撰写高水准的学术论文时间:2010-6-29(星期二)下午2:00地点:实验十八楼315室第147次SKLBE学术论坛作者:管理员发布:2010年6月9日浏览次数: 104报告人: Department of Pharmaceutical Sciences, University of Tennessee Health Science Center Ram I Mahato, PhD题目: Polymeric Nanomedicines and Combination Therapy for treating Prostate Cancer时间: 2010年6月9日星期三下午3:00地点: 实验十八楼315室第146次SKLBE学术论坛作者:管理员发布:2010年6月7日浏览次数: 107报告人:瑞典Attana生物传感器公司高级研究员\生物芯片研发部经理裴志超题目: QCM生物传感器和微阵列技术研究糖-蛋白,蛋白-蛋白相互作用时间:2010年6月7日星期一下午1:30地点:实验十八楼315室第145次SKLBE学术论坛作者:管理员发布:2010年6月1日浏览次数: 107报告人: 中国药科大学化学生物学研究室主任、特聘教授陈依军题目: 诺卡沙星衍生物及其生物合成途径时间: 2010年6月1日星期二下午2:00地点: 实验十八楼315室第144次SKLBE学术论坛作者:管理员发布:2010年5月28日浏览次数: 111报告人: 美国德州农工大学刘文设教授题目: Expanding the Genetic Code时间: 2010年5月28日星期五上午10:00地点: 实验十八楼315室第143次SKLBE学术论坛作者:管理员发布:2010年5月26日浏览次数: 118报告人: 美国弗吉尼亚理工大学、美国能源部生物能源科学中心张以恒教授(我校校友) Y.-H. Percival Zhang, Associate Professor, Virginia Polytechnic Institute and State University, DOE BioEnergy Science Center (BSEC)题目: Constructing the Carbon-Neutral Carbohydrate Economy for Sustainability时间: 2010年5月26日星期三下午3:00地点: 实验十八楼315室第142次SKLBE学术论坛作者:管理员发布:2010年5月24日浏览次数: 214报告人: 乔治亚医学院生物化学和分子生物学系Huidong Shi(石慧东)教授题目: Next-Generation Sequencing: Applications Beyond Genomes时间: 2010年5月24日星期一上午10:00地点: 实验十八楼315室第141次SKLBE学术论坛作者:管理员发布:2010年5月21日浏览次数: 239报告人:日本京都大学Sugiyama教授题目:Observation and Control of Enzymatic Reaction in DNA Nano Frame时间: 2010年5月21日星期五下午3:30地点: 实验十八楼315室第140次SKLBE学术论坛作者:管理员发布:2010年5月10日浏览次数: 101附件为第140次SKLBE学术论坛信息,请阅。

中药植物紫草天然产物的生物合成及其功能研究进展

中药植物紫草天然产物的生物合成及其功能研究进展

Hereditas (Beijing) 2021年5月, 43(5): 459―472 收稿日期: 2020-10-10; 修回日期: 2021-03-04基金项目:国家自然科学基金项目(编号:U1903201, 31670298, 31771413, 21702100, 21907051)和教育部创新团队项目(编号:IRT_14R27)资助[Supported by the National Natural Science Foundation of China (Nos. U1903201, 31670298, 31771413, 21702100, 21907051), and theProgram for Changjiang Scholars and Innovative Research Team in University from the Ministry of Education of China (No. IRT_14R27)]作者简介: 林红燕,博士,助理研究员,研究方向:药用植物天然产物化学和分子药理。

E-mail:*************.cn王煊,博士研究生,研究方向:植物分子代谢。

E-mail:*******************林红燕和王煊并列第一作者。

通讯作者:杨永华,教授,博士生导师,研究方向:分子代谢与生物技术安全。

E-mail:**************.cn DOI: 10.16288/j.yczz.20-341 网络出版时间: 2021/3/29 11:37:11URI: https:///kcms/detail/11.1913.R.20210326.0956.002.html综 述中药植物紫草天然产物的生物合成及其功能研究进展林红燕,王煊,何聪,周紫玲,杨旻恺,文钟灵,韩洪苇,陆桂华, 戚金亮,杨永华南京大学医药生物技术国家重点实验室,植物分子生物学研究所,生命科学学院,南京 210023摘要: 紫草为我国传统的重要药用植物资源,其根部代谢产生的紫红色萘醌类天然产物—紫草素及其衍生物,临床上常被用于治疗疮疡和皮肤炎症。

Bioinformatics

Bioinformatics
Bioinformatics
Chien-Yu Chen Graduate school of biotechnology and bioinformatics, Yuan Ze University
Course Information

Web page
– .tw/~cychen/course/922BioInfo/922-BioInfo-CourseInformation.htm
12
Functional Genomics – Research Issues

Which genes are expressed in which tissues? How is the expression of a gene affected by extracellular influences? Which genes are expressed during the development of an organism? What is the effect of misregulated expression of a gene? What patterns of gene expression cause a disease or lead to disease progression? What patterns of gene expression influence response to treatmen Reading Frames
Consider the double-stranded DNA sequence below
5' CAATGGCTAGGTACTATGTATGAGATCATGATCTTTACAAATCCGAG 3' 3' GTTACCGATCCATGATACATACTCTAGTACTAGAAATGTTTAGGCTC 5'

基于壳聚糖的纳米材料在骨组织工程与再生医学中的研究进展

基于壳聚糖的纳米材料在骨组织工程与再生医学中的研究进展

基于壳聚糖的纳米材料在骨组织工程与再生医学中的研究进展李晓静;王新木;董研;苟中入【摘要】壳聚糖是目前发现的唯一与细胞外基质糖胺聚糖的化学结构相似的天然阳离子多聚糖,具有极为优良的生物相容性、生物可降解性和生物学活性.近年来,基于壳聚糖的纳米材料在组织工程中的研究较为广泛.对壳聚糖的纳米材料、壳聚糖复合纳米材料、壳聚糖纳米纤维和壳聚糖纳米粒子等在骨组织工程与再生医学中的研究进展进行回顾和阐述.近年来的研究显示,壳聚糖复合纳米材料生物支架、壳聚糖纳米纤维支架及包载具有骨诱导性的生物活性因子,以及外源基因的壳聚糖纳米粒子及纳米纤维,在骨组织工程与再生医学中具有良好的应用前景.【期刊名称】《中国生物医学工程学报》【年(卷),期】2013(032)005【总页数】6页(P620-625)【关键词】壳聚糖;纳米材料;骨组织工程【作者】李晓静;王新木;董研;苟中入【作者单位】浙江大学医学院附属第二医院口腔修复科,杭州310009;杭州市第一人民医院口腔科,杭州310006;浙江大学医学院附属第二医院口腔修复科,杭州310009;浙江大学浙江加州国际纳米技术研究院,杭州310029【正文语种】中文【中图分类】R318引言骨组织工程与再生医学,是指体外构建人工骨组织或者利用生物装置、植入生物材料来刺激骨原细胞或干细胞分化,维持和促进成骨细胞增殖,以重建缺损的骨组织。

骨组织工程与再生医学依赖于多个因素,主要包括细胞、生长因子、生物支架和稳定的机械环境[1]。

自体骨和同种异体骨移植可满足以上要求,但两者均存在不足之处:自体骨骨量极为有限,并且增加了手术部位和伤口愈合期并发症[2];同种异体骨移植可能引发慢性炎症,甚至产生免疫排斥反应。

因此,骨移植修复术的不足促进了人工骨修复生物材料的发展。

譬如,已对羟基磷灰石 (HA)、A-W玻璃陶瓷、壳聚糖、胶原以及复合材料等已在骨损伤修复中的应用开展了广泛研究[3-4]。

甲壳素,又名甲壳质、几丁质,化学名称为聚N-乙酰葡萄糖胺,主要存在于甲壳类动物虾、蟹、昆虫的外壳及高等植物的细胞壁中,是世界上第二丰富的天然生物聚合物[5-6]。

(可打1.2页)白姜花倍半萜合成酶基因的克隆及表达

(可打1.2页)白姜花倍半萜合成酶基因的克隆及表达

园 艺 学 报 2008,35(10):1527-1532Acta Horticulturae Sinica白姜花倍半萜合成酶基因的克隆及表达李瑞红1,范燕萍13,余让才2,陆旺金1,庄楚雄2(1华南农业大学园艺学院,广州510642;2华南农业大学生命科学学院,广州510642)摘 要:以白姜花的叶片为材料,通过RT2PCR与RACE相结合的方法,克隆到一个倍半萜合成酶基因的c DNA序列,其全长为1932bp,基因编码区共1653bp,编码551个氨基酸,命名为Hc2Sesqui。

该基因编码蛋白的氨基酸序列与姜和玉米中的倍半萜合成酶有较高的同源性,并且含有DDXXD保守序列。

通过Clustal X进行序列分析,确定该基因属于植物萜类合成酶基因家族中的T p s2a亚族。

Northern杂交的结果表明,该基因在茎、叶和萼片中均有表达。

关键词:白姜花;倍半萜合成酶;基因;克隆;表达中图分类号:S68 文献标识码:A 文章编号:05132353X(2008)1021527206M olecul ar C lon i n g and Expressi on of Sesqu iterpeno i d Syn tha se Gene i n H edych ium corona rium Koen i gL I Rui2hong1,F AN Yan2p ing13,Y U Rang2cai2,LU W ang2jin1,and ZHUANG Chu2xi ong2(1College of Horticulture,2College of L ife Science,South China A gricultural U niversity,Guangzhou510642,China)Abstract:A TPS gene na med as Hc2Sesqui was is olated fr om Hedych ium coronarium Koenig leaf.The comp lete sequence of the c DNA gene was1932bp,with an ORF encoding551a m ino acids.The a m ino acids sequence shared highly ho mol ogy t o other sesquiter penoid synthase,containing conserved boxes of:TPS DDXXD.The phyl ogenetic analysis after Clustal X alignment suggested that the Hc2Sesqui bel onged t o T p s2a. Northern bl ot revealed that the Hc2Sesqui gene was exp ressed in leaf,ste m and sepal.Key words:Hedychium coronarium Koenig;sesquiter penoid synthase;gene;cl one;exp ressi on萜类化合物按其在植物体内的生理功能可分为初生代谢物和次生代谢物两大类。

Lv+Wen+Huan.Yuan+Zheng+Wen

Lv+Wen+Huan.Yuan+Zheng+Wen

Deconstructing Hierarchical Databases UsingDingthriftYuan Zheng Wen and Lv Wen HuanA BSTRACTIn recent years,much research has been devoted to the deployment of write-ahead logging;on the other hand,few have analyzed the emulation of sensor networks.After years of unproven research into RPCs,we confirm the evaluation of thin clients.In this work we prove that the Internet can be made large-scale,multimodal,and concurrent.I.I NTRODUCTIONRobots must work.After years of confirmed research into symmetric encryption[1],we verify the intuitive unification of Scheme and linked lists.Further,contrarily,an essential grand challenge in networking is the investigation of vacuum tubes [2].To what extent can local-area networks be investigated to achieve this intent?Dingthrift,our new approach for multimodal symmetries, is the solution to all of these grand challenges.It is always a structured mission but is derived from known results.Next, two properties make this approach perfect:our application is NP-complete,and also our framework evaluates cache coherence.By comparison,the usual methods for the synthesis of link-level acknowledgements do not apply in this area. For example,many methodologies observe B-trees[3][3]. Despite the fact that conventional wisdom states that this grand challenge is mostly solved by the construction of replication, we believe that a different solution is bined with knowledge-based algorithms,it constructs an analysis of fiber-optic cables.In this work we introduce the following contributions in detail.To begin with,we propose a novel system for the evaluation of access points(Dingthrift),which we use to demonstrate that the location-identity split can be made modular,Bayesian,and extensible.We show that the well-known semantic algorithm for the analysis of object-oriented languages by Miller and Jones[3]is recursively enumerable. The rest of this paper is organized as follows.First,we motivate the need for hash tables.Similarly,we place our work in context with the previous work in this area.We verify the investigation of massive multiplayer online role-playing games.Finally,we conclude.II.R ELATED W ORKDingthrift builds on related work in adaptive archetypes and steganography[4].Despite the fact that this work was published before ours,we came up with the solutionfirst but could not publish it until now due to red tape.A recent un-published undergraduate dissertation[5]introduced a similar idea for operating systems[6].The original method to this quandary[5]was numerous;nevertheless,this outcome did not completelyfix this problem.A litany of related work supports our use of link-level acknowledgements[7],[6].Without using the producer-consumer problem,it is hard to imagine that the infamous authenticated algorithm for the emulation of multi-processors by Martin and Li runs in O(2n)time.A number of existing applications have developed sensor networks,either for the refinement of I/O automata or for the essential unification of the lookaside buffer and red-black trees.The foremost framework by Bose does not create architecture as well as our approach[8],[6],[9].Further,we had our method in mind before E.Jones et al.published the recent infamous work on symbiotic methodologies.This is arguably ill-conceived.Further,Jones and Maruyama et al. constructed thefirst known instance of empathic archetypes. In the end,note that Dingthrift turns the robust archetypes sledgehammer into a scalpel;as a result,our framework runs in Θ(log n)time[10],[11].Our solution represents a significant advance above this work.While we know of no other studies on collaborative con-figurations,several efforts have been made to refine Boolean logic[12].Our design avoids this overhead.J.Zhao and John Kubiatowicz explored thefirst known instance of the study of thin clients.Recent work by Davis and Suzuki[13] suggests a framework for observing object-oriented languages, but does not offer an implementation[1].Clearly,if latency is a concern,our approach has a clear advantage.On a similar note, Maruyama et al.[14],[15]originally articulated the need for the UNIV AC computer.In this position paper,we solved all of the grand challenges inherent in the previous work.As a result, the class of systems enabled by Dingthrift is fundamentally different from related methods[16].III.M ODELSuppose that there exists replicated technology such that we can easily explore the understanding of model checking.Next, we hypothesize that each component of Dingthrift observes DHTs,independent of all other components.We consider a framework consisting of n B-trees.This may or may not actually hold in reality.Therefore,the design that Dingthrift uses is feasible.Along these same lines,we consider a solution consisting of n multicast frameworks[3].The model for our system consists of four independent components:“smart”technology,gigabit switches,public-private key pairs,and802.11b.Similarly, Figure1shows Dingthrift’s cooperative refinement.We useFig.1.New mobile archetypes.our previously developed results as a basis for all of these assumptions.IV.I MPLEMENTATIONOur system is elegant;so,too,must be our implementation [17].Since Dingthrift is impossible,architecting the home-grown database was relatively straightforward.We plan to release all of this code under very restrictive.V.E VALUATION AND P ERFORMANCE R ESULTSWe now discuss our performance analysis.Our overall performance analysis seeks to prove three hypotheses:(1) that Markov models no longer affect a system’s autonomous code complexity;(2)that median signal-to-noise ratio stayed constant across successive generations of Commodore64s;and finally(3)that NV-RAM space behaves fundamentally differ-ently on our10-node testbed.We are grateful for mutually exclusive,topologically Bayesianflip-flop gates;without them, we could not optimize for performance simultaneously with usability.Next,the reason for this is that studies have shown that energy is roughly93%higher than we might expect[18]. We hope that this section illuminates the contradiction of e-voting technology.A.Hardware and Software ConfigurationWe modified our standard hardware as follows:Soviet computational biologists instrumented a real-time deployment on CERN’s decommissioned Apple Newtons to quantify the randomly self-learning nature of mutually psychoacoustic technology[19].We quadrupled the work factor of our“fuzzy”overlay network.On a similar note,we removed3GB/s of Internet access from our network.Along these same lines,we removed150kB/s of Internet access from our system.With this change,we noted weakened throughput improvement.On a0.1250.250.51248163264128bandwidth(MB/s)bandwidth (ms)Fig.2.The effective complexity of Dingthrift,as a function of work factor.-2.5-2-1.5-1-0.50.51-40-20 0 20 40 60 80 100 120 power(man-hours)clock speed (GHz)Fig. 3.The10th-percentile popularity of rasterization of our heuristic,as a function of work factor.similar note,we added7300TBfloppy disks to our planetary-scale testbed to examine models.Next,computational biolo-gists added2300GB USB keys to our network to understand our stly,we removed some NV-RAM from our desktop machines to better understand technology.Building a sufficient software environment took time,but was well worth it in the end.All software components were linked using AT&T System V’s compiler with the help of Van Jacobson’s libraries for independently investigating in-dependent Knesis keyboards.Our experiments soon proved that instrumenting our randomly parallel PDP11s was more effective than instrumenting them,as previous work suggested. Next,we added support for Dingthrift as a runtime applet.We note that other researchers have tried and failed to enable this functionality.B.Experimental ResultsGiven these trivial configurations,we achieved non-trivial results.Seizing upon this ideal configuration,we ran four novel experiments:(1)we ran44trials with a simulated database workload,and compared results to our hardware simulation;(2)we compared complexity on the GNU/Debian Linux,Microsoft Windows1969and LeOS operating systems;500010000 15000 20000 25000-6-4-2 0 2 4 6d i s t a n ce (M B /s )time since 1953 (celcius)Fig. 4.Note that clock speed grows as energy decreases –aphenomenon worth improving in its own right.2.933.1 3.2 3.3 3.4 3.5-10 0 10 20 30 40 50 60 70 80 90P D Fthroughput (sec)Fig.5.These results were obtained by Kobayashi and Sun [20];wereproduce them here for clarity [10].(3)we deployed 92UNIV ACs across the sensor-net network,and tested our local-area networks accordingly;and (4)we measured NV-RAM speed as a function of RAM throughput on a Motorola bag telephone.We first explain experiments (3)and (4)enumerated above as shown in Figure 5.These throughput observations contrast to those seen in earlier work [21],such as B.Garcia’s seminal treatise on kernels and observed response time.Note that Figure 2shows the mean and not median disjoint tape drive throughput.The results come from only 2trial runs,and were not reproducible.Shown in Figure 4,experiments (3)and (4)enumerated above call attention to Dingthrift’s instruction rate.Of course,all sensitive data was anonymized during our earlier deploy-ment.Operator error alone cannot account for these results.The results come from only 7trial runs,and were not reproducible.Lastly,we discuss the second half of our experiments.The curve in Figure 4should look familiar;it is better knownas F (n )=1.32log nn .Next,of course,all sensitive data was anonymized during our software simulation.Next,bugs in our system caused the unstable behavior throughout theexperiments.VI.C ONCLUSIONWe confirmed in this paper that Markov models and neural networks are usually incompatible,and Dingthrift is no excep-tion to that rule.Continuing with this rationale,the character-istics of Dingthrift,in relation to those of more acclaimed systems,are particularly more structured.Our methodology for analyzing the exploration of IPv4is daringly outdated.We expect to see many information theorists move to harnessing Dingthrift in the very near future.R EFERENCES[1]W.C.Shastri,I.Moore,and R.Karp,“Byzantine fault tolerance con-sidered harmful,”in Proceedings of the USENIX Technical Conference ,Jan.1991.[2]O.C.Smith,H.Jackson,P.Gupta,J.Smith,M.Robinson,ner,W.Q.Martinez,and R.Tarjan,“Deconstructing operating systems using GROIN,”in Proceedings of SIGGRAPH ,May 2004.[3]U.Johnson and O.Qian,“Deploying superblocks and consistent hash-ing,”in Proceedings of NOSSDAV ,Mar.2005.[4]L.Adleman,ner,and P.Bose,“A methodology for the evaluationof linked lists,”in Proceedings of the Conference on Atomic Method-ologies ,Mar.1994.[5]I.Johnson,“A simulation of telephony using Clee,”in Proceedings ofVLDB ,Mar.1991.[6]Y .Z.Wen and a.Gupta,“Grit:Concurrent,replicated archetypes,”inProceedings of the Conference on Self-Learning Methodologies ,Dec.2004.[7] D.Clark,“Constructing architecture and the transistor,”UT Austin,Tech.Rep.1907/700,Jan.2003.[8] a.Watanabe and H.Levy,“Study of multi-processors,”Journal ofAutomated Reasoning ,vol.6,pp.77–92,Aug.2003.[9] C.Darwin,M.Thompson,J.Ullman,X.Jones,Q.Taylor,and A.Tanen-baum,“The impact of relational configurations on complexity theory,”in Proceedings of ASPLOS ,Mar.2001.[10]L.Adleman,“Comparing randomized algorithms and IPv7,”in Proceed-ings of the Symposium on Large-Scale Algorithms ,Dec.1991.[11] F.Qian,“A case for randomized algorithms,”in Proceedings of IPTPS ,Mar.2003.[12] A.Einstein,D.Culler,R.Reddy,V .Wu,and R.Sun,“A case for theUNIV AC computer,”in Proceedings of NSDI ,Sept.1992.[13]K.Raman and V .Jacobson,“Towards the confirmed unification ofevolutionary programming and rasterization,”in Proceedings of the WWW Conference ,Nov.2004.[14]Z.Moore,N.Wirth,K.Thompson,and Q.Harris,“Decoupling thepartition table from redundancy in 128bit architectures,”UCSD,Tech.Rep.13-88-143,May 2002.[15]Q.Wang,“Relational,“fuzzy”theory for SMPs,”in Proceedings of theSymposium on Reliable,Interposable Algorithms ,Oct.2001.[16] E.Codd,“The impact of optimal archetypes on algorithms,”in Pro-ceedings of the Conference on Secure,Autonomous Configurations ,June 2003.[17]M.V .Wilkes,“SCSI disks considered harmful,”in Proceedings ofPODC ,Apr.1990.[18]U.K.Smith,J.Smith,I.Takahashi,M.O.Rabin,and D.Sasaki,“The impact of symbiotic models on hardware and architecture,”in Proceedings of PODC ,July 2005.[19]J.Kubiatowicz,kshminarayanan,A.Newell,M.Gayson,and Y .Z.Wen,“InkyYard:A methodology for the understanding of XML,”in Proceedings of the USENIX Security Conference ,Oct.2002.[20]S.Floyd and H.Sadagopan,“Decoupling context-free grammar fromthe Turing machine in simulated annealing,”in Proceedings of the Symposium on Homogeneous Methodologies ,Apr.2003.[21]R.Hamming,“Harnessing SCSI disks using ambimorphic configura-tions,”Journal of Optimal,Omniscient Communication ,vol.69,pp.71–93,Sept.1990.。

基于表面质子化聚多巴胺修饰电极用于拟南芥原生质体的黏附与测定

基于表面质子化聚多巴胺修饰电极用于拟南芥原生质体的黏附与测定

基于表面质子化聚多巴胺修饰电极用于拟南芥原生质体的黏附与测定周铁安;张娜;苏招红;申大忠;陈宗星;邓君;谢杰;邹剑锋【摘要】采用自氧化方法将多巴胺(DA)聚合修饰到光透ITO(或金)电极表面上,通过缓冲溶液(pH 3)处理后形成带正电、可与带负电荷原生质体静电相互作用的表面膜.经循环伏安、电化学阻抗方法证明修饰薄膜对拟南芥原生质体黏附的有效性,在一定原生质体数目范围(1000~30000),质子化聚多巴胺膜界面电荷转移电阻(Rct)随原生质体数目(Ncells)增加而增加,1/Rct与1/Ncells呈线性关系.此外,石英晶体微天平动态测试结果亦证明,本方法制备的修饰薄膜对原生质体具良好的黏附效果.本研究提供了一种用于原生质体固定与传感的有效方法,为在细胞层次研究植物结构、功能与行为及植物生命多样性提供参考.【期刊名称】《亚热带植物科学》【年(卷),期】2017(046)002【总页数】7页(P101-107)【关键词】质子化聚多巴胺;拟南芥原生质体;界面黏附;电化学表征;石英晶体微天平【作者】周铁安;张娜;苏招红;申大忠;陈宗星;邓君;谢杰;邹剑锋【作者单位】湖南农业大学细胞力学与生物传感研究所,湖南长沙 410128;湖南农业大学生物科学技术学院,湖南长沙410128;湖南农业大学细胞力学与生物传感研究所,湖南长沙 410128;湖南农业大学生物科学技术学院,湖南长沙410128;湖南农业大学细胞力学与生物传感研究所,湖南长沙 410128;湖南农业大学理学院,湖南长沙 410128;山东师范大学化学化工与材料科学学院,山东济南 250014;湖南农业大学细胞力学与生物传感研究所,湖南长沙 410128;湖南农业大学生物科学技术学院,湖南长沙410128;湖南农业大学细胞力学与生物传感研究所,湖南长沙 410128;湖南农业大学生物科学技术学院,湖南长沙410128;湖南农业大学细胞力学与生物传感研究所,湖南长沙 410128;湖南农业大学生物科学技术学院,湖南长沙410128;湖南农业大学细胞力学与生物传感研究所,湖南长沙 410128;湖南农业大学科技创新平台中心,湖南长沙 410128【正文语种】中文【中图分类】Q2-33基因组测序和系统生物学变革了生命科学,蛋白质组学成为生命科学领域的基本技术[1]。

各类质粒载体图谱

各类质粒载体图谱
(PR8Z151)
pGADT7
Vector Information
as a fusion to a hemagglutinin (HA) epitope tag. HA-tagged proteins can be identified with antibodies raised to this common epitope, eliminating the need to generate specific antibodies to new proteins. The T7 promoter is used for in vitro transcription and translation of the epitope tagged fusion protein and also provides a binding site for sequencing using the T7 Sequencing Primer. Note that the AD is not expressed during the in vitro transcription and translation reactions. The Nco I and Pst I sites may be used to shuttle inserts from pGADT7 into pGBKT7, the MATCHMAKER Two-Hybrid System 3 DNA-BD Vector. The MCS in pGADT7 is compatible with those in pMyc-CMV and pHA-CMV, CLONTECH's epitope tagged mammalian expression vector set (#K6003-1). As a result, the target gene can be shuttled into these vectors in order to confirm protein interactions in vivo. Location of features: • Full-length S. cerevisiae ADH1 promoter (PADH1): 7–1479 • GAL4 AD polypeptide with SV40 Nuclear Localization Signal (NLS) NLS: 1501–1557 GAL4 amino acids 768–881: 1561–1899 • T7 RNA polymerase promoter: 1905–1927 • HA epitope tag: 1942–1968 • Multiple Cloning Sites: 1969–2041 • Transcription termination signal Fragment carrying the S. cerevisiae ADH1 terminator (TADH1): 2280–2605 • LEU2 coding sequences: 3814–2723 • pUC plasmid replication origin: 4581–5418 • Ampicillin resistance gene: 6432–5575 • Yeast 2 µ replication origin: 6998–7988 Location of primers: • T7 Sequencing Primer: 1905–1925 • 3' AD Sequencing Primer: 2102–2083 • MATCHMAKER 5' AD LD-Insert Screening Amplimer (#9103-1): 1858–1889 • MATCHMAKER 3' AD LD-Insert Screening Amplimer (#9103-1): 2078–2046 Propagation in E. coli: • Suitable host strains: DH5α, DH10 & other general purpose strains • Selectable marker: plasmid confers resistance to ampicillin (100 µg/ml) to E. coli hosts • E. coli replication origin: pUC • Copy number: ~500 • Plasmid incompatibility group: pMB1/Col E1 Propagation in S. cerevisiae: • Suitable host strains: Y187(α), Y190(a), SFY526(a), CG1945(a), HF7c(a), or AH109(a) • Selectable marker: LEU2 • S. cerevisiae origin: 2 µ Reference:

CCL20_通过IL-17_信号通路调控糖尿病肾病炎症进展

CCL20_通过IL-17_信号通路调控糖尿病肾病炎症进展

九年级政治重点知识点总结归纳九班级政治重点知识点总结1一、坚持党的基本路线不动摇(一)党的地位1、党的地位:党是领导中国特色社会主义的核心力量, 是现代化建设顺利进行的根本保证。

2、为什么中国共产党成为中国特色社会主义的领导核心?源于她的先进性(表现)这是因为(1)-:党始终代表中国先进生产力的进展要求, 代表中国先进(文化)的前进方向, 代表中国最广大人民的根本利益。

(2)党的奋斗目标:是谋求民族的独立和复兴、国家的繁荣和富强、人民的解放和幸福(3)党的性质:是中国工人阶级的先锋队, 同时是中国人民和中华民族的先锋队。

?基本路线1、党的十一届三中全会以来中国的变化及在世界舞台上的中国形象:①当今世界, 中国是进展最快、变化的国家之一, ②但我国还属于进展中国家, 面临发达国家在经济、科技等方面占优势的压力。

2、当代中国的基本国情是:我国处于并将长期处于社会主义初级阶段。

3、为什么说我国处于并将长期处于社会主义初级阶段(初级阶段的具体表现或基本特征是什么)?①从总体上看, 现阶段我国社会生产力水平还比较低;②科学技术水平、民族文化素质还不够高;③社会主义具体制度还不完善, 所以我国现在处于并将长期处于社会主义初级阶段。

4、初级阶段的含义:所谓初级阶段, 就是不发达阶段。

初级阶段的起止时间:从上世纪五十年代中期算起, 至少需要一百年时间。

5、我国社会主义初级阶段的主要矛盾:人民日益增长的物质文化需要同落后的社会生产之间的矛盾。

6、国家总任务:实现社会主义现代化和中华民族伟大复兴。

国家根本任务制定依据:基本国情和主要矛盾。

7、我们应长期坚持的指导思想:马克思列宁主义、毛泽东思想、邓小平理论、“-”重要思想及科学进展观。

8、改革开放以来, 我们取得一切成绩和进步的根本原因是什么?开辟了中国特色社会主义道路, 形成了中国特色社会主义理论体系,确立了中国特色社会主义制度。

9、中国特色社会主义理论体系包括:邓小平理论、“-”重要思想及科学进展观。

蛋白质组学PPT课件

蛋白质组学PPT课件

蛋白质组定义
1,基因组表达的全部蛋白质。 2,在一种细胞/组织内存在的全部蛋白 质。
Proteome
• 1994 M.Wilkins and K.W.Williams

Macquarie University in Sydney
• Total Proteins Complement of a Genome
环境
ቤተ መጻሕፍቲ ባይዱ
REAL COMPLEXITY…
IS IN CELLULAR ROTEOMES • BEYOND THE GENOME… • Tissue Specific Expression • Alternate Splicing, (1/3 of all genes) • Post-Translational Modifications
Functional
Proteomics
• During human development, cell express different proteins
• Normal and cancer cells express different proteins
• Cell treated with and without drug express different proteins
– Types and Level:
– Signal Sequence cleavage – Glycosylation
– Phosphorylation – Farnylation – Isoprenylation – Acetylation
• All combine > 100-1000 fold increase in complexity
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Constructing Bio-molecular Databases on a DNA-based ComputerWeng-Long Chang11Contact Author: Department of Computer Science and Information Engineering, National Kaohsiung University of Applied Sciences, 415 Chien Kung Road, Kaohsiung 807, Taiwan, R. O. C.E-mail: changwl@.twMichael (Shan-Hui) Ho22Department of Information Management, School of Information Technology, Ming Chuan University, 5,Teh-Ming Rd., Gwei-Shan, 333 Taoyuan, Taiwan, R. O. C.E-mail: MHoInCerritos@Minyi Guo33Department of Computer Software, The University of Aizu, Aizu-Wakamatsu City, Fukushima 965-8580, JapanE-mail: minyi@u-aizu.ac.jp_____________________________________________________________________________________________________________________ Codd [Codd 1970] wrote the first paper in which the model of a relational database was proposed. Adleman [Adleman 1994] wrote the first paper in which DNA strands in a test tube were used to solve an instance of the Hamiltonian path problem. From [Adleman 1994], it is obviously indicated that for storing information in molecules of DNA allows for an information density of approximately 1 bit per cubic nm (nanometer) and a dramatic improvement over existing storage media such as video tape which store information at a density of approximately 1 bit per 1012 cubic nanometers. This paper demonstrates that biological operations can be applied to construct bio-molecular databases where data records in relational tables are encoded as DNA strands. In order to achieve the goal, DNA algorithms are proposed to perform eight operations of relational algebra (calculus) on bio-molecular relational databases, which include Cartesian product, union, set difference, selection, projection, intersection, join and division. Furthermore, this work presents clear evidence of the ability of molecular computing to perform data retrieval operations on bio-molecular relational databases.Categories and Subject Descriptors: H.3.0 [Information Storage and Retrieval]: General;H.3..3 [Information Storage and Retrieval]: Information Search and Retrieval - Retrieval models; D.3.0 [Programming Languages]: General; D.3.1 [Programming Languages]: Formal Definitions and Theory – Syntax, Semantics; D..3. m [Programming Languages]: MiscellaneousGeneral Terms: Relational Databases, Bio-molecular Relational Databases, Molecular ComputingAdditional Key Words and Phrases: Relational Algebra (Calculus), Bio-molecular Relational Algebra (Calculus), DNA-based Supercomputing_____________________________________________________________________________________________________________________1. INTRODUCTIONIn 1970, Codd [Codd 1970] wrote the first paper where a new model for database structure and design appeared - the relational model. The relational model from [Codd 1970] is the first incarnation of relational database systemsand is an enormous advancement over other database models. In 1994, Adleman [Adleman 1994] succeeded in solving an instance of the Hamiltonian path problem in a test tube by handling DNA strands. From [Guo et al. 2005], it is clearly pointed out that optimal solution of every NP-complete or NP-hard problem is determined from its characteristic. DNA-based algorithms have been proposed to solve many computational problems. These contain satisfiability [Lipton 1995], the maximal clique problem [Ho et al. 2004], the set-packing problem [Ho et al. 2004], the set-splitting problem [Chang et al. 2004], the set-cover problem and the problem of exact cover by 3-sets [Chang and Guo 2004], the subset production [Ho 2005], the binary integer programming problem [Yeh et al. 2006], the dominating-set problem [Guo et al. 2004], the maximum cut problem [Xiao et al. 2004], real DNA experiments of Knapsack problems [Henkel et al. 2007] and the set-partition problem [Chang 2007]. One potentially significant area of application for DNA algorithms is the breaking of encryption schemes [Chang et al. 2005; Boneh et al. 1996; Adleman et al. 1999; Chang et al. 2004]. From [Guarnieri et al. 2006; Ahrabian and Nowzari-Dalini 2004] DNA-based arithmetic algorithms are proposed.On the other hand, molecular dynamics and (sequential) membrane systems from the viewpoint of Markov chain theory were proposed from [Muskulus et al. 2006]. Reif and LaBean [Reif and LaBean 2007] overviewed the past and current states of the emerging research area of the field of bio-molecular devices. Wu and Seeman [Wu and Seeman 2006] described the computation using a DNA strand as the basic unit and they had used this unit to achieve the function of multiplication. It was reported in [Macdonald et al. 2006] that a second-generation deoxyribozyme-based automaton MAYA-II, which plays a complete game of tic-tac-toe according to a perfect strategy, integrates 128 deoxyribozyme-based logic gates, 32 input DNA molecules, and 8 two-channel fluorescent outputs across 8 wells. The first direct observations of the tile-based DNA self-assembly in solution, using fluorescent nanotubes composed of a single tile, was presented in [Ekani-Nkodo et al. 2004]. In [Dehnert et al 2006], it was found that with increasing range of correlations the capacity to distinguish between the species on the basis of this correlation profile is getting better and requires ever shorter sequence segments for obtaining a full species separation. In [Müller et al. 2006], it was shown that “open” tweezers exist in a single conformation with minimal FRET efficiency. From [Dirks et al. 2007], the first algorithm for calculating the partition function of an unpseudoknotted complex of multiple interacting nucleic acid strands was proposed.DES (the United States Data Encryption Standard) is one of the most widely used cryptographic systems. It produces a 64-bit ciphertext from a 64-bit plaintext under the control of a 56-bit key. A cryptanalyst obtains a plaintext and its corresponding ciphertext and wishes to determine the key used to perform the encryption. The most naive approach to this problem is to try all 256 keys, encrypting the plaintext under each key until a key that produces the ciphertext is found and is called the plaintext-ciphertext attack. Adleman and his co-authors [Adleman et al. 1999] provided a description of such an attack using the sticker model of molecular computation. Start with approximately 256 identical ssDNA memory strands each 11580 nucleotides long. Each memory strand contains 579 contiguous blocks each 20 nucleotides long. As it is appropriate in the sticker model there are 579 stickers⎯one complementaryto each block. Memory strands with annealed stickers are called memory complexes. When the 256 memory complexes have half of their sticker positions occupied at the end of the computation, they weigh approximately 0.7 g and, in solution at 5 g/liter, would occupy approximately 140 ml. Hence, the volume of the 1303 tubes needs be no more than 140 ml each. It follows that the 1303 tubes occupy, at most, 182 L and can, for example, be arrayed in 1 m long and wide and 18 cm deep.Adleman and his co-authors [Adleman et al. 1999] indicated that at the end of computation for breaking DES, 256× (56 key bits + 64 ciphertext bits) pairs were generated and processed. Adleman and his co-authors [Adleman et al. 1999] also pointed out that this codebook for breaking DES has approximately 263 (8 × 1018) bits of information (the equivalent of approximately one billion 1 gigabyte CDs). The actual running time for the algorithm of breaking DES depends on how fast the operations can be performed. If each operation requires 1 day, then the computation for breaking DES will require 18 years. If each operation requires 1 hour, then the computation for breaking DES will require approximately 9 months. If each operation can be completed in 1 minute, then the computation for breaking DES will take 5 days. Finally if the effective duration of a step can be reduced to 1 second, then the effort for breaking DES will require 2 hours. While it has been argued that special purpose electronic hardware [Adleman et al. 1999] or massively parallel supercomputers (the IBM Blue Gene/L machine is capable of 183.5 TFLOPS or 183.5 × 1012 floating-point operations per second) might be used to break DES in a reasonable amount of time, it appears that today's most powerful sequential machines would be unable to accomplish the task.In this paper, we first use the method of designing DNA sequences, cited from [Braich et al. 2000; Braich et al. 2002], to construct solution spaces of DNA strands for encoding every domain of a relational model [Codd 1970; Ullman and Widom 1997]. Then by using basic biological operations, we, respectively, develop DNA-based algorithms to perform eight operations of relational algebra (calculus), which include Cartesian product, union, set difference, selection, projection, intersection, join and division. Furthermore, this work offers clear evidence of the ability of molecular computing to perform data retrieval operations on bio-molecular relational databases.The paper is organized as follows. Section 2 introduces DNA models of computation proposed by Adleman and his co-authors. Section 3 introduces the DNA program to finish eight operations of relational algebra (calculus) on bio-molecular relational databases. Experimental results by simulated DNA computing and Conclusions are, respectively, drawn in Section 4 and Section 5.2. BACKGROUNDIn this section we review the basic structure of the DNA molecule and then discuss available techniques for dealing with DNA that will be used to perform eight operations of relational algebra (calculus), which include Cartesian product, union, set difference, selection, projection, intersection, join and division.2.1. THE STRUCTURE OF DNAFrom [Sinden 1994; Paun et al. 1998], DNA (DeoxyriboNucleic Acid) is the molecule that plays the main role in DNA based computing. In the biochemical world of large and small molecules, polymers and monomers, DNA is a polymer, which is strung together from monomers called deoxyriboNucleotides. The monomers used for the construction of DNA are deoxyribonucleotides. Each deoxyribonucleotide contains three components: a sugar, a phosphate group, and a nitrogenous base. The sugar has five carbon atoms − for the sake of reference there is a fixed numbering of them. The carbons of the sugar are numbered from 1' to 5'. The phosphate group is attached to the 5' carbon, and the nitrogenous base is attached to the 1' carbon. Within the sugar structure there is a hydroxyl group attached to the 3' carbon. Figure 1 is applied to show the chemical structure of a nucleotide [Sinden 1994; Paun et al. 1998].As stated in [Sinden 1994; Paun et al. 1998], distinct nucleotides are detected only with their bases, which come in two sorts: purines and pyrimidines. Purines include adenine and guanine, abbreviated A and G. Pyrimidines contain cytosine and thymine, abbreviated C and T. Because nucleotides are distinguished solely from their bases, they are simply represented as A, G, C, or T nucleotides, depending upon the kinds of bases that they have.Figure 1: The chemical structure of a nucleotide.From [Sinden 1994; Paun et al. 1998], nucleotides can be linked together in two different ways. The first method is that the 5'-phosphate group of one nucleotide is joined with 3'-hydroxyl group of the other forming a phosphodiester bond. The resulting molecule has the 5'-phosphate group of one nucleotide, denoted as 5' end, and the 3'-hydroxyl group of the other nucleotide available, denoted as 3' end, for bonding. This gives the molecule the directionality, and we can talk about the direction of 5' end to 3' end or 3' end to 5' end. The second way is that the base of one nucleotide interacts with the base of the other to form a hydrogen bond. This bonding is the subject ofthe following restriction on the base pairing: A and T can pair together, and C and G can pair together − no other pairings are possible. This pairing principle is called the Watson−Crick complementarity (named after James D. Watson and Francis H. C. Crick who deduced the famous double helix structure of DNA in 1953, and won the Nobel Prize for the discovery).According to [Sinden 1994; Paun et al. 1998], a DNA strand is essentially a sequence (polymer) of four types of nucleotides detected by one of four bases they contain. Two strands of DNA can form (under appropriate conditions) a double strand, if the respective bases are the Watson-Crick complements of each other – A matches T and C matches G; also 3’ end matches 5’ end. The length of a single stranded DNA is the number of nucleotides comprising the single strand. Thus, if a single stranded DNA includes 20 nucleotides, then we say that it is a 20 mer (i.e., it is a polymer containing 20 monomers). The length of a double stranded DNA (where each nucleotide is base paired) is counted in the number of base pairs. Thus if we make a double stranded DNA from a single stranded 20 mer, then the length of the double stranded DNA is 20 base pairs, also written 20 bp. Hybridization is a special technology term for the pairing of two single DNA strands to make a double helix and also takes advantages of the specificity of DNA base pairing for the detection of specific DNA strands (for more discussions of the relevant biological background, please refer to [Sinden 1994; Paun et al. 1998]).2.2. AALEMAN’S EXPERIMENT FOR SOLUTION OF A SATISFIABILITY PROBLEMAdleman and his co-authors [Braich et al. 2000; Braich et al. 2002] performed experiments that were applied to, respectively, solve a 6-variable 11-clause formula and a 20-variable 24-clause 3-conjunctive normal form (3-CNF) formula. A Lipton encoding [Lipton 1994] was used to represent all possible variable assignments for the chosen 6-variable or 20-variable SAT problem. For each of the 6 variables x1, …, x6 two distinct 15 base value sequences were designed. One represents true (T), x k T, and another represents false (F), x k F for 1 ≤k≤ 6. Each of the 26 truth assignments was represented by a library sequence of 90 bases consisting of the concatenation of one value sequence for each variable. DNA molecules with library sequences are termed library strands and a combinatorial pool containing library strands is termed a library. The 6-variable library strands were synthesized by employing a mix-and-split combinatorial synthesis technique [Braich et al. 2002]. The library strands were assigned library sequences with x1 at the 5’-end and x6 at the 3’-end (5’ −x1−x2−x3−x4−x5−x6− 3’). Thus synthesis began by assembling the two 15 base oligonucleotides with sequences x6T and x6F. This process was repeated until all 6 variables had been treated.The probes used for separating the library strands have sequences complementary to the value sequences. Errors in the separation of the library strands are errors in the computation. Sequences must be designed to ensure that library strands have little secondary structure that might inhibit intended probe-library hybridization. The design must also exclude sequences that might encourage unintended probe-library hybridization. To help achieve thesegoals, sequences were computer-generated to satisfy the proposed seven constraints [Braich et al. 2002]. The similar method also is applied to solve a 20-variable of 3-SAT [Braich et al. 2002].2.3. DNA MANIPULATIONSIn the last decade there have been revolutionary advances in the field of biomedical engineering particularly in recombinant DNA and RNA manipulating. Due to the industrialization of the biotechnology field, laboratory techniques for recombinant DNA and RNA manipulation are becoming highly standardized. Basic principles about recombinant DNA can be found in [Sinden 1994; Paun et al. 1998]. In this subsection we describe eight biological operations that are useful for finishing eight operations of relational algebra (calculus). The method of constructing DNA solution space for eight operations of relational algebra (calculus) is based on the proposed method in [Braich et al. 2000; Braich et al. 2002].A (test) tube is a set of molecules of DNA (a multi-set of finite strings over the alphabet {A, C, G, T}). Given a tube, one can perform the following operations:1.Extract. Given a tube P and a short single strand of DNA, S, the operation produces two tubes +(P, S) and −(P,S), where +(P, S) is all of the molecules of DNA in P which contain S as a sub-strand and −(P, S) is all of the molecules of DNA in P which do not contain S.2.Merge. Given tubes P1 and P2, yield ∪(P1, P2), where ∪(P1, P2) = P1∪P2. This operation is to pour two tubesinto one, without any change in the individual strands.3.Detect. Given a tube P, if P includes at least one DNA molecule we have ‘yes’, and if P contains no DNAmolecule we have ‘no’.4.Discard. Given a tube P, the operation will discard P.5.Amplify. Given a tube P, the operation, Amplify(P, P1, P2), will produce two new tubes P1and P2 so that P1 andP2 are totally a copy of P (P1 and P2 are now identical) and P becomes an empty tube.6.Append. Given a tube P containing a short strand of DNA, Z, the operation will append Z onto the end of everystrand in P.7.Append-head. Given a tube P containing a short strand of DNA, Z, the operation will append Z onto the head ofevery strand in P.8.R e ad. Given a tube P, the operation is used to describe a single molecule, which is contained in tube P. Even ifP contains many different molecules each encoding a different set of bases, the operation can give an explicitdescription of exactly one of them.3. CONSTRUCTING BIO-MOLECULAR RELATIONAL DATABASES3.1. THE INTRODUCTION TO A RELATIONAL VIEW OF DATAThe term relation is applied here in its accepted mathematical sense. Given sets S1, S2, …, S n (not necessarilydistinct), R is a relation on these n sets if it is a set of n-tuples each of which has its first element from S1, its secondelement from S2, and so on [Codd 1970]. More concisely, R is a subset of the Cartesian product S1×S2×…×S n.We shall refer to S j as the j th domain of R. As defined above, R is said to have degree n. Relations of degree 1 areoften called unary, degree 2 binary, degree 3 ternary, and degree n n-ary. For expository reasons, we shall frequentlymake use of an array representation of relations. An array that represents an n-ary relation R has the followingproperties [Codd 1970]:(1)Each row represents an n-tuple of R.(2)The ordering of rows is immaterial.(3)All rows are distinct.(4)The ordering of columns is significant ⎯ it corresponds to the ordering S1, S2, …, S n of the domains on which Ris defined.(5)The significance of each column is partially conveyed by labeling it with the name of the correspondingdomain.The example in Figure 2 illustrates a relation of degree 2, called employee, which reflects the employee’spersonal information of the same company from specified employee’s number to specified employee’s name.Employee’s number Employee’s nameFisher1 CarrieHamill2 MarkFigure 2: A relation of degree 2.3.2. DNA ALGORITHMS FOR THE CARTESIAN PRODUCT ON BIO-MOLECULAR DATABASESThe Cartesian product (or cross-product, or just product) of n sets, S1, S2, …S n, is the set of pairs that can beformed by choosing the first element of the pair to be any element of S1, the second element of the pair to be any element of S2, and so on [Codd 1970; Ullman and Widom 1997]. Assume that L k is the number of bits for the value of each element in S k to 1 ≤k≤n. Also suppose that R is an n-ary relation and has m elements. Assume that R is equal to {(r i, 1, …r i, n)|r i, k∈S k for 1 ≤k≤n and 1 ≤i≤m}. Also suppose that the value encoding r i, k in R can be represented as a binary number, v i, k, 1…v i, k, l for 1 ≤l≤L k, 1 ≤k≤n and 1 ≤i≤m. The bits v i, k, 1 and v i, k,l represent, respectively, the first bit and the last bit for r i, k. From [Braich et al. 2000; Braich et al. 2002], for every bit v i, k, j to 1 ≤j≤L k, two distinct 15 base value sequences are designed. One represents the value “0” for v i, k, j and the other represents the value “1” for v i, k, j. For the sake of convenience in our presentation, assume that v i, k, j1 denotes the value of v i, k, j to be 1 and v i, k, j0defines the value of v i, k, j to be 0 and v i, k, j defines the value of v i, k, j to be 0 or 1. The following DNA algorithms are used to implement a relational algebra (calculus), the Cartesian product, for constructing a bio-molecular database, R.Procedure Insert(T80, i)(1)For k = 1 to n(2) For j = 1 to L k(2a) Append(T80, v i, k, j).EndForEndForEndProcedureLemma 3−1: One record in a bio-molecular database, R,can be constructed with a library sequence from the algorithm Insert(T80, i).Proof:The algorithm, Insert(T80, i), is implemented via the append operation. It consists of one nested loop. The outer loop is applied to insert one record (including n fields) into a bio-molecular database, R. The inner loop is employed to construct each field of one record in R. Each time Step (2a) is used to append a DNA sequence, representing the value 0 or 1 for v i, k, j, onto the end of every strand in tube T80. This is to say that the value 0 or 1 to the j th bit in the k th field of the i th record in R appears in tube T80. After repeating execution of Step (2a), it finally produces tube T80 that consists of a DNA sequence with (15 * n * L k) base pairs, representing one record in R. Therefore, it is inferred that one record in a bio-molecular database, R,can be constructed with a library sequence. ■From Insert(T80, i), it takes (n * L k) append operations and a test tube to insert one record into a bio-molecular database, R. A binary number of (n * L k) bits corresponds to a record in a bio-molecular database, R. A value sequence for every bit of a record contains 15 base pairs. Therefore, the length of a DNA strand, encoding a recordin a bio-molecular database, R, is (15 * n * L k) base pairs consisting of the concatenation of one value sequence for each bit.Procedure CartesianProduct(T0, m)(1)For i = 1 to m(1a) Insert(T80, i).(1b) T0 = ∪(T0, T80).EndForEndProcedureLemma 3−2: A bio-molecular database, R,can be constructed with library sequences from the algorithm, CartesianProduct(T0, m).Proof:The algorithm, CartesianProduct(T0, m), is implemented via the append operation. It includes a single loop. The single loop is used to insert m records into a bio-molecular database, R. Each time Step (1a) is applied to call the procedure, Insert(T80, i), to insert one record (including n fields) into a bio-molecular database, R. This is to say that the i th record in R appears in tube T80. Next Step (2) is applied to pour tube T80 into tube T0. This implies that the i th record in R appears in tube T0 and tube T80 becomes an empty tube. After repeating execution of Step (1a) and Step (1b), it finally produces tube T0 that consists of m DNA sequences, representing m records in R. Therefore, it is derived that a bio-molecular database, R,can be constructed with library sequences. ■From CartesianProduct(T0, m), it takes (m * n * L k) append operations and two tubes to construct a bio-molecular database, R. A binary number of (n * L k) bits corresponds to a record in a bio-molecular database, R. A value sequence for every bit of a record contains 15 base pairs. Therefore, the length of a DNA strand, encoding a record in a bio-molecular database, R, is (15 * n * L k) base pairs consisting of the concatenation of one value sequence for each bit.3.3. DNA ALGORITHM FOR SET OPERATIONS ON BIO-MOLECULAR DATABASESThe three most common operations on sets are union, intersection, and difference. The following definitions, cited from [Ullman and Widom 1997], are used to explain how these operations perform their functions on arbitrary sets X and Y.Definition 3−1:X∪Y, the union of X and Y, is the set of elements that are in X or Y or both. An element appearsonly once in the union even if it is present in both X and Y.Definition 3−2: X∩Y, the intersection of X and Y, is the set of elements that are in both X and Y.Definition 3−3:X−Y, the difference of X and Y, is the set of elements that are in X but not in Y. Note that X−Y is different from Y−X; the latter is the set of elements that are in Y but not in X.When we apply these operations above to n-ary relations, we need to put some conditions on X and Y. The first condition is that X and Y must have identical sets of columns, and the domain for each column must be the same in X and Y. The second condition is that before we compute the set-theoretic union, intersection, or difference of sets of tuples, the columns of X and Y must be ordered so that their order is the same for both relations. DNA algorithms for performing these operations are, respectively, proposed in subsection 3.3.1, subsection 3.3.2 and subsection 3.3.3.3.3.1. A DNA ALGORITHM FOR Union OPERATOR ON BIO-MOLECULAR DATABASESAssume that X and Y are n-ary relations and have, respectively, p elements and q elements. Also suppose that X and Y are, respectively, equal to {(r i, 1, …r i, n)|r i, k∈S k for 1 ≤k≤n and 1 ≤i≤p} and {(r i, 1, …r i, n)|r i, k∈S k for 1 ≤k≤n and 1 ≤i≤q}. After the two DNA algorithms, CartesianProduct(T1, p) and CartesianProduct(T2, q), are called and are performed, tube T1 consists of p DNA sequences representing p records in X and tube T2 includes q DNA sequences representing q records in Y. The following DNA algorithm is used to perform X∪Y. Notations used in the following DNA algorithm appear in section 3.2.Procedure Union(T1, T2, T3, p)(1)Amplify(T1, T11, T12).(2)Amplify(T2, T21, T22).(3)T1 = ∪(T1, T11).(4)T2 = ∪(T2, T21).(5)For i = 1 to p(6) For k = 1 to n(7) For j = 1 to L k(7a) T22 = +(T22, v i, k, j) and T22OFF = −(T22, v i, k, j).(7b) T22ON = ∪(T22ON, T22OFF).EndForEndFor(7c) Discard(T22).(7d) T22 = ∪(T22, T22ON).EndFor(8) T3 = ∪( T12, T22).EndProcedureLemma 3−3: Union operator on two n-ary relations can be performed with library sequences from the algorithm, Union(T1, T2, T3, p).Proof:The algorithm, Union(T1, T2, T3, p), is implemented via the amplify, merge, extract and discard operations. DNA strands in tube T1 are used to represent p elements in X and DNA strands in tube T2 are also employed to represent q elements in Y. Step (1) is applied to amplify tube T1 and to generate two new tubes, T11 and T12, which are copies of T1 and tube T1 becomes empty. Next Step (2) is also employed to amplify tube T2 and to generate two new tubes, T21 and T22, which are copies of T2 and tube T2 becomes empty. Step (3) is used to pour tube T11 into tube T1. This is to say that DNA strands representing p elements in X are still reserved in tube T1. Then Step (4) is used to pour tube T21 into tube T2. This implies that DNA strands representing q elements in Y are still reserved in tube T2. From Step (3) through Step (4), it is very clear that the property for no change of elements in X and Y is satisfied in the processing of X∪Y. Step (5) is the outer loop of the nested loop and is used to check whether every element in X appears also in Y. Step (6) and Step (7) are the inner loop of the nested loop and are applied to examine whether the i th element in X also appears in Y.Each time Step (7a) employs the extract operation to form two test tubes: T22 and T22OFF. The values encoded by DNA strands in tube T22 are equal to the value of v i, k, j. The values encoded by DNA strands in tube T22OFF are not equal to the value of v i, k, j. Next each time Step (7b) uses the merge operation to pour tube T22OFF into tube T22ON. This indicates that elements in Y, that are different from the i th element in X, are encoded by DNA strands in tube T22ON. After repeating execution of Steps (7a) through (7b), tube T22 contains DNA strands encoding the i th element, that appears in both X and Y and tube T22ON includes DNA strands encoding elements in Y, which are different from the i th element in X. Then each time Step (7c) applies the discard operation to discard tube T22. On the execution of Step (7d), it applies the merge operation to pour tube T22ON into tube T22. After repeating execution of Step (7a) through Step (7d), this implies that elements in Y and in both X and Y are removed, and elements in X and in both X and Y are reserved. This guarantees that elements in both X and Y appear only once in the processing of X ∪Y. Finally, Step (8) uses the merge operation to pour tubes T12 and T22 into tube T3. This is to say that DNA strands in tube T3 is the result of X ∪Y. Therefore, it is derived that X ∪Y is performed through the algorithm, Union(T1, T2, T3, p). ■From Union(T1, T2, T3, p), it takes two amplify operations, (p * n * L k + p + 3) merge operations, (p * n * L k)。

相关文档
最新文档