Team:Hong Kong-CUHK/Project results

From 2010.igem.org

(Difference between revisions)
(New page: <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" > <meta http-equiv="content-type" content="text/html;charset=utf-8"> <head> <base /> <meta http-equiv="con...)
 
(4 intermediate revisions not shown)
Line 64: Line 64:
}
}
          
          
-
body.page-Team_Hong_Kong-CUHK_Project h1.firstHeading { display:none; }
+
body.page-Team_Hong_Kong-CUHK_Project_results h1.firstHeading { display:none; }
-
body.page-Team_Hong_Kong-CUHK_Project #menubar { top:0px; }
+
body.page-Team_Hong_Kong-CUHK_Project_results #menubar { top:0px; }
-
body.page-Team_Hong_Kong-CUHK_Project table{background:none;}
+
body.page-Team_Hong_Kong-CUHK_Project_results table{background:none;}
-
body.page-Team_Hong_Kong-CUHK_Project ul.special-7 li {background: url(http://137.189.51.115/igem/templates/rt_moxy_j15/images/typo/special-7.png) no-repeat 0px 1px;}
+
body.page-Team_Hong_Kong-CUHK_Project_results ul.special-7 li {background: url(http://137.189.51.115/igem/templates/rt_moxy_j15/images/typo/special-7.png) no-repeat 0px 1px;}
-
body.page-Team_Hong_Kong-CUHK_Project #main-body a, body.page-Team_Hong_Kong-CUHK_Project #bottom a, body.page-Team_Hong_Kong-CUHK_Project #main-content body.page-Team_Hong_Kong-CUHK_Project #footer a, body.page-Team_Hong_Kong-CUHK_Project a, body.page-Team_Hong_Kong-CUHK_Project .moduletable h3 span, body.page-Team_Hong_Kong-CUHK_Project .contentheading span {color: #1366A3;}
+
body.page-Team_Hong_Kong-CUHK_Project_results #main-body a, body.page-Team_Hong_Kong-CUHK_Project_results #bottom a, body.page-Team_Hong_Kong-CUHK_Project_results #main-content body.page-Team_Hong_Kong-CUHK_Project_results #footer a, body.page-Team_Hong_Kong-CUHK_Project_results a, body.page-Team_Hong_Kong-CUHK_Project_results .moduletable h3 span, body.page-Team_Hong_Kong-CUHK_Project_results .contentheading span {color: #1366A3;}
/* Wiki Hacks - END */
/* Wiki Hacks - END */
div.wrapper { margin: 0 auto; width: 982px;padding:0;}
div.wrapper { margin: 0 auto; width: 982px;padding:0;}
Line 137: Line 137:
<div id="horizmenu-surround">
<div id="horizmenu-surround">
<ul class="menutop level1" >
<ul class="menutop level1" >
-
<li class="item1 active root" >
+
<li class="item1 root" >
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK"  >
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK"  >
<span>
<span>
Line 146: Line 146:
</li>
</li>
-
<li class="item167 parent root" >
+
<li class="item167 parent active root" >
<a class="daddy item bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project"  >
<a class="daddy item bullet subtext" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project"  >
<span>
<span>
Line 179: Line 179:
<li class="item191" >
<li class="item191" >
-
<a class="orphan item bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_results"  >
+
<a class="orphan item active bullet" href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_results"  >
<span>
<span>
    Results    
    Results    
Line 325: Line 325:
<!--Begin Logo-->
<!--Begin Logo-->
<div class="logo-module">
<div class="logo-module">
-
<a href="http://137.189.51.115/igem/index.html" id="logo"></a>
+
<a href="https://2010.igem.org/Team:Hong_Kong-CUHK" id="logo"></a>
</div>
</div>
<!--End Logo-->
<!--End Logo-->
Line 354: Line 354:
<div class="article-rel-wrapper">
<div class="article-rel-wrapper">
<h2 class="contentheading">
<h2 class="contentheading">
-
Project </h2>
+
Results </h2>
</div>
</div>
Line 361: Line 361:
-
<p><p><span class="dropcap-purple">C</span>UHK iGEM 2010 team is formed by a group of undergraduates and instructors from the Chinese University of Hong Kong. Our project is to create a brand new biological cryptography system. We harness the incredible adaptability of simple organisms in the tortured environment to make sure that the message stored can be left undisturbed regardless of any environmental changes. Employing a specially people are denied access to obtain the information.</p></p>
+
<p>After months of wet lab work, we can conclude that our bio-encryption prototype works.</p>
-
<p><span class="inset-right">Quick fact:&nbsp;<br /><br />In our system, 1g of&nbsp;<em>E. coli</em> can store max 931,322 GB data.&nbsp;<br /><br />In comparison, typical hard disk can store 1-4GB/gram.</span></p>
+
-
<p>As the leakage of national confidential information and personal privacy become more and more serous, we believe that this biological cryptography can help protect the important information of the mankind. The innovative cryptography system heralds a new era of information security.</p>
+
-
<p> </p>
+
<p>This rci-system is feasible in DH5-alpha strain of <i>E.coli</i>, as supported by extracted plasmid DNA size. It is found that the size of the DNA extracted is consistent with that of DNA stored in the plasmid before extraction. There is no loss of DNA, implying that no large deletion has occurred during the experimental procedure.</p>
-
<p><span class="dropcap-blue">T</span></p>
+
 
-
<p>his year in the iGEM 2010 competition, we will use bacteria not only as a biological data storage unit but also to integrate an intrinsic encryption system with it.</p>
+
<p>In the first trial, we encoded a short message in a single vector, together with two inverted repeats. We designed primers which targets the encoded message either in normal orientation or reverse-complementary orientation. Both sets of primers could be used to generate PCR products, indicating that encoded message exists in both recombinated and normal forms. Sequencing results confirmed the correctness of the PCR product.</p>
-
<p>With the advancement of electronic engineering after the World War II, more complex ciphers are developed, which plays a pivotal role in the security system of this information explosive age. However mathematical advances result in the weakening or even attack on the ciphers. It makes us rethink whether data storage and encryption in computer is the only way to ensure data safety</p>
+
 
-
<p>Using bacteria as the information storage device is not a new idea, Bancroft’s group [1] had long proposed the storage of information in DNA early in 2001. Yachie’s group[2] had also been working on the bacterial data storage method in Bacillus subtilis in 2007. In contrast to electronic data storage, the nature of bacterial data storage depends on the bacteria one would pick – Bacillus subtilis would create extra copies of the data, inserting into their genomes which would further safeguard the information; Deinococcus radiodurans, one of the most radioresistant organisms known, would survive even under the electromagnetic pulse and radiation after the nuclear attack. But how are we actually improving the security system by simply storing information in bacteria?</p>
+
<p><h4>Primer sequence to recognize DNA sequence without recombination:</h4></p>
-
<p><a href="https://2010.igem.org/Team:Hong_Kong-CUHK/Project_principle">Next: Principle</a></p>
+
 
 +
<p>Forward: gCCCAgATCTAgAAAgATggCAATAC</p>
 +
 
 +
<p>Reverse: TCTCTTATTCTCACTCCACgTACCg</p>
 +
 
 +
<p><h4>Primer sequence to recognize DNA sequence with recombination:</h4></p>
 +
 
 +
<p>Forward: CAgATCTAgAAAgATCCACgTACC</p>
 +
 
 +
<p>Reverse: CTCTTATTCTCACTggCAATACTTTCg</p>
 +
 
 +
<p><img src="http://137.189.51.115/igem/images/stories/seq.png" /></p>
 +
 
 +
<p>Apart from the above stated, no deletion has been found in the DNA sequence. According to literatures, the recombinase would cause deletion of the sequence upon point mutation. After doing restriction digestion and gel electrophoresis, it is shown that the sequence has a correct size and no deletion is observed.</p>
 +
 
 +
<p>Yet, there are two mutations noted. However, since high through-put sequencing will be employed, inaccurate bases can be corrected by using majority vote. In short, it can be said that the recombinase can function normally.</p>
 +
 
 +
<p>To conclude, the whole system of our project is found to be successful and that proves the viability of our project design.</p>
<div class="article-ratings">
<div class="article-ratings">

Latest revision as of 21:23, 27 October 2010

Project

Results

After months of wet lab work, we can conclude that our bio-encryption prototype works.

This rci-system is feasible in DH5-alpha strain of E.coli, as supported by extracted plasmid DNA size. It is found that the size of the DNA extracted is consistent with that of DNA stored in the plasmid before extraction. There is no loss of DNA, implying that no large deletion has occurred during the experimental procedure.

In the first trial, we encoded a short message in a single vector, together with two inverted repeats. We designed primers which targets the encoded message either in normal orientation or reverse-complementary orientation. Both sets of primers could be used to generate PCR products, indicating that encoded message exists in both recombinated and normal forms. Sequencing results confirmed the correctness of the PCR product.

Primer sequence to recognize DNA sequence without recombination:

Forward: gCCCAgATCTAgAAAgATggCAATAC

Reverse: TCTCTTATTCTCACTCCACgTACCg

Primer sequence to recognize DNA sequence with recombination:

Forward: CAgATCTAgAAAgATCCACgTACC

Reverse: CTCTTATTCTCACTggCAATACTTTCg

Apart from the above stated, no deletion has been found in the DNA sequence. According to literatures, the recombinase would cause deletion of the sequence upon point mutation. After doing restriction digestion and gel electrophoresis, it is shown that the sequence has a correct size and no deletion is observed.

Yet, there are two mutations noted. However, since high through-put sequencing will be employed, inaccurate bases can be corrected by using majority vote. In short, it can be said that the recombinase can function normally.

To conclude, the whole system of our project is found to be successful and that proves the viability of our project design.