Team:VT-ENSIMAG/Genothreat
From 2010.igem.org
GenoTHREAT
|
Global presentationThe software, GenoTHREAT takes a DNA sequence on input, and in return told the user if it's a dangerous sequence which need further investigation or if the sequence can be synthesized. It follows the algorithm given by the federal guidelines, and so uses the Blast software for sequence alignement. For managing the sequence (six-frame translation, reversed frame, extracting sub-sequence), we use Biojava, a bio-informatics toolbox ([http://www.biojava.org/wiki/Main_Page 1]). GenoTHREAT has been coded in Java, and is working on both Windows and Linux distribution. We have developed different versions in order to optimize the time execution or the CPUs' utilization (Central Processing Units) according to the use (#Different implementations). General algorithmFollowing the federal guideline, the first step is to do the six frame translation (See More) in order to have the corresponding amino-acid strands. We also keep the initial nucleotid strand and its reversed DNA sequence (Why?). So we have now 8 sequences to screen (6 amino-acid, 2 nucleotides).
Then, we divide each sequence in 200bps nucleotide or 66 amino-acid subsequences.
If one sub-sequence is a hit for our algorithm, then it means that a 200bps sequence potentially dangerous has been detected. The sequence will be so flagged, and a result file containing all the select agent found and some more information will be created. If any of the sub-sequences is considered as a sequence of concern, then the sequence is accepted and can be synthesized.
Different optionsAround this algorithm, we have developed different options to use the sequence screening. We can use it to just screen one sequence, or a group of sequence from our test database, or screen sequence from the iGEM registry or GenoCAD database. The parameter on some versions can also be changed in creating a new set of parameters. Different implementationsOur main issue in implementing the software is the ressources-consuming(time and computational ressources) of blast. In order to get rid of it, we have tried different implementation of our algorithm. See the description and comparison in Different implementations. AvaibilityDue to its security aspect, we are unfortunately not allowed to make it freely available. You can contact us to have it. |