Difference between revisions of "Team:NEFU China/Background"

 
(23 intermediate revisions by 6 users not shown)
Line 10: Line 10:
 
<link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-background-layer-bottom&action=raw&ctype=text/css" rel="stylesheet" type="text/css">
 
<link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-background-layer-bottom&action=raw&ctype=text/css" rel="stylesheet" type="text/css">
 
<link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-background-banner&action=raw&ctype=text/css" rel="stylesheet" type="text/css">
 
<link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-background-banner&action=raw&ctype=text/css" rel="stylesheet" type="text/css">
<link href="https://2018.igem.org/wiki/index.php?title=Template:NEFU_China/CSS-background-foot&action=raw&ctype=text/css" rel="stylesheet" type="text/css">
 
 
<style>
 
<style>
 
+
table {
 +
    border: 0px!important;
 +
}
 +
td {
 +
border: 0px!important;
 +
}
 
#top_title, #sideMenu{
 
#top_title, #sideMenu{
 
     display: none;
 
     display: none;
Line 143: Line 147:
 
}
 
}
 
#table7 td {
 
#table7 td {
 +
 +
 
     vertical-align: top;
 
     vertical-align: top;
 
}
 
}
Line 149: Line 155:
 
</head>
 
</head>
 
<body>
 
<body>
<!--menu-->
 
 
<!--menu-->
 
<!--menu-->
  
 
<div id="menu" style="background-color:rgba(0,0,0,0.6)!important">
 
<div id="menu" style="background-color:rgba(0,0,0,0.6)!important">
 
<li id="nav" style="left: 8%!important; width: 100%!important;">&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;
 
<li id="nav" style="left: 8%!important; width: 100%!important;">&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160;
<!--<a class="menu1" href="#" style="text-align: right;">☰</a>-->
+
 
<ul class="firstmenu" style="float: left">
 
<ul class="firstmenu" style="float: left">
 
 
Line 165: Line 170:
 
<ul id="sub_02">
 
<ul id="sub_02">
 
<li><a href="https://2018.igem.org/Team:NEFU_China/Background" target="_self">BACKGROUND</a></li>
 
<li><a href="https://2018.igem.org/Team:NEFU_China/Background" target="_self">BACKGROUND</a></li>
<li><a href="https://2018.igem.org/Team:NEFU_China/Description" target="_self">DESCRIPTION</a></li>
+
<li><a href="https://2018.igem.org/Team:NEFU_China/Description" target="_self">DESCRIPTION &amp; DESIGN</a></li>
<li><a href="https://2018.igem.org/Team:NEFU_China/Design" target="_self">DESIGN</a></li>
+
<li><a href="https://2018.igem.org/Team:NEFU_China/Coding book" target="_self">CODE BOOK</a></li>
<li><a href="https://2018.igem.org/Team:NEFU_China/Coding book" target="_self">CODING BOOK</a></li>
+
 
  </ul>
 
  </ul>
 
  </li>
 
  </li>
 
 
 
<li class="mainlevel" id="mainlevel_03">
 
<li class="mainlevel" id="mainlevel_03">
  <a href="https://2018.igem.org/Team:NEFU_China/Demonstrate"><img id="parts" src="https://static.igem.org/mediawiki/2018/6/62/T--NEFU_China--_RESULTS.png">EXPERIMENT</a>
+
  <a href="https://2018.igem.org/Team:NEFU_China/Demonstrate"><img id="parts" src="https://static.igem.org/mediawiki/2018/6/62/T--NEFU_China--_RESULTS.png">EXPERIMENTS</a>
 
  <ul id="sub_03">
 
  <ul id="sub_03">
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Lock_Key" target="_self">LOCK &amp; KEY</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Lock_Key" target="_self">LOCK &amp; KEY</a></li>
  <li><a href="https://2018.igem.org/Team:NEFU_China/Suicide" target="_self">SUICIDE</a></li>
+
  <li><a href="https://2018.igem.org/Team:NEFU_China/Suicide" target="_self">INFORMATION DESTRUCTION</a></li>
  <li><a href="https://2018.igem.org/Team:NEFU_China/Splicing" target="_self">SPLICING</a></li>
+
  <li><a href="https://2018.igem.org/Team:NEFU_China/Splicing" target="_self">Pre-RNA SPLICING</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Demonstrate" target="_self">DEMONSTRATE</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Demonstrate" target="_self">DEMONSTRATE</a></li>
 
  <hr>
 
  <hr>
Line 195: Line 197:
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Model" target="_self">OVERVIEW</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Model" target="_self">OVERVIEW</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Model1" target="_self">CORRESPONDING COEFFICIENT</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Model1" target="_self">CORRESPONDING COEFFICIENT</a></li>
  <li><a href="https://2018.igem.org/Team:NEFU_China/Model2" target="_self">FIGHTING MODEL</a></li>
+
  <li><a href="https://2018.igem.org/Team:NEFU_China/Model2" target="_self">KILLING MODEL</a></li>
 
  </ul>
 
  </ul>
 
  </li>
 
  </li>
Line 212: Line 214:
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Attributions" target="_self">ATTRIBUTIONS</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Attributions" target="_self">ATTRIBUTIONS</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Members" target="_self">MEMBERS</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Members" target="_self">MEMBERS</a></li>
 
  <!-- <li><a href="https://2018.igem.org/Team:NEFU_China/Sponsoring" target="_self">SPONSORING</a></li>-->
 
 
  </ul>
 
  </ul>
 
  </li>
 
  </li>
Line 219: Line 219:
 
  <a href="https://2018.igem.org/Team:NEFU_China/Human_Practices"><img id="humanpractice" src="https://static.igem.org/mediawiki/2018/9/91/T--NEFU_China--_HUMANPRACTICE.png">HUMAN PRACTICE</a>
 
  <a href="https://2018.igem.org/Team:NEFU_China/Human_Practices"><img id="humanpractice" src="https://static.igem.org/mediawiki/2018/9/91/T--NEFU_China--_HUMANPRACTICE.png">HUMAN PRACTICE</a>
 
  <ul id="sub_08">
 
  <ul id="sub_08">
 +
  <li><a href="https://2018.igem.org/Team:NEFU_China/Human_Practices" target="_self">OVERVIEW</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Gold_integrated" target="_self">GOLD INTEGRATED</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Gold_integrated" target="_self">GOLD INTEGRATED</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Silver" target="_self">SILVER</a></li>
 
  <li><a href="https://2018.igem.org/Team:NEFU_China/Silver" target="_self">SILVER</a></li>
Line 230: Line 231:
 
</div>
 
</div>
 
<div id="banner">  
 
<div id="banner">  
<img src="https://static.igem.org/mediawiki/2018/0/05/T--NEFU_China--DNA.png" alt="banner" id="banner-img">
+
<img src="https://static.igem.org/mediawiki/2018/0/06/T--NEFU_China--background-title01.png" alt="banner" id="banner-img">
 
</div>
 
</div>
 
  
  
Line 245: Line 245:
 
var context =canvas.getContext("2d");
 
var context =canvas.getContext("2d");
 
var W = window.innerWidth;
 
var W = window.innerWidth;
                         var H = 3100;
+
                         var H = 2600;
 
//var H = window.innerHeight*1.5;
 
//var H = window.innerHeight*1.5;
 
canvas.width = W;
 
canvas.width = W;
Line 313: Line 313:
  
 
<p>
 
<p>
Since ancient time, people have been seeking safe ways of information storage and transfer to combat message leaks that have recently become a public security problem and great concerns all over the world. To overcome this, encryption technologies have been developed and widely used to ensure the safety of important information.
+
Since ancient time, people have been seeking for safe ways of information storage and transfer to combat message leaks that have recently become a public security problem and greatly concerns all over the world. To overcome this, encryption technologies have been developed and widely used to ensure the safety of important information.
 
</p>
 
</p>
 
<br>
 
<br>
Line 322: Line 322:
 
 
 
<p>
 
<p>
    For example, the <i>Da Vinci Cryptograph</i> was commonly used in the Tang Dynasty. If the messages were retrieved in a wrong way, the letter with the white phosphorus would be self-destroyed.
+
    For example, the <i>Da Vinci code cylinder</i> was recorded in the <i>Da Vinci </i>manuscript. If the messages were retrieved in a wrong way, the letter with the white phosphorus would be self-destroyed.
 
        </p>
 
        </p>
 
 
Line 328: Line 328:
 
<td valign="top" width="40%">
 
<td valign="top" width="40%">
 
<img style="width: 330px;" src="https://static.igem.org/mediawiki/2018/4/47/T--NEFU_China--Introduction01.png" alt="Figure1" id="Figure1-img">
 
<img style="width: 330px;" src="https://static.igem.org/mediawiki/2018/4/47/T--NEFU_China--Introduction01.png" alt="Figure1" id="Figure1-img">
 +
 
 
 
</td>
 
</td>
Line 334: Line 335:
 
<table id="table2" >
 
<table id="table2" >
 
<td valign="top" width="35%">
 
<td valign="top" width="35%">
<img style="width:330px;" src="https://static.igem.org/mediawiki/2018/1/10/T--NEFU_China--Introduction02.png" alt="Figure2" id="Figure2-img">
+
<img style="width:330px;" src="https://static.igem.org/mediawiki/2018/b/bc/T--NEFU_China--Introduction04.png" alt="Figure2" id="Figure2-img">
 
 
 
</td>
 
</td>
Line 369: Line 370:
 
<td valign="top" width="35%" style="text-align: center;
 
<td valign="top" width="35%" style="text-align: center;
 
">
 
">
<img style="width:300px;text-align: center;" src="https://static.igem.org/mediawiki/2018/b/bc/T--NEFU_China--Introduction04.png" alt="Figure4" id="Figure4-img">
+
<img style="width:300px;text-align: center;" src="https://static.igem.org/mediawiki/2018/1/10/T--NEFU_China--Introduction02.png" alt="Figure4" id="Figure4-img">
 
 
 
</td>
 
</td>
 
</table>
 
</table>
 
<p style="color: white">
 
<p style="color: white">
In this project, we built an information storage and transfer system with high security on using yeast spores, which consists of six modules, including “CODING”, “WRITE IN”, “LOCKING”, “MISLEADING”, “TIME DELAY SUICIDE” and “READ OUT”. Together with the computation methods developed in this project, we designed and incorporated a considerable number of genetic parts into the six modules above to ensure the safety of information stored in and transferred using our system. <br>
+
In this project, we built an information storage and transfer system with high security on using yeast spores, which consists of six modules, including<span style="color:orange"> “CODING”, “WRITE IN”, “LOCKING”, “MISLEADING”, “TIME DELAY SUICIDE” and “READ OUT”</span>. Together with the computation methods developed in this project, we designed and incorporated a considerable number of genetic parts into the six modules above to ensure the safety of information stored in and transferred using our system. <br>
 
</p>
 
</p>
 
<table id="table5">
 
<table id="table5">
<td valign="top" width="24%" style="text-align: center;
+
<td valign="top" width="100%" style="text-align: center;
 
">
 
">
<img style="width:230px;text-align: center;" src="https://static.igem.org/mediawiki/2018/5/5d/T--NEFU_China--yeast-codebook.png" alt="Figure4" >
+
<img style="width:100%;text-align: center;" src="https://static.igem.org/mediawiki/2018/5/5b/T--NEFU_China--background-bottom.png" alt="Figure4" >
 
 
</td>
 
 
 
<td valign="top" width="24%" style="text-align: center;
 
">
 
<img style="width:230px;text-align: center;" src="https://static.igem.org/mediawiki/2018/4/41/T--NEFU_China--yeast-lock.png" alt="Figure4" >
 
 
</td>
 
<td valign="top" width="24%" style="text-align: center;
 
">
 
<img style="width:230px;text-align: center;" src="https://static.igem.org/mediawiki/2018/a/a1/T--NEFU_China--yeast-splice2.png" alt="Figure4" >
 
 
</td>
 
<td valign="top" width="24%" style="text-align: center;
 
">
 
<img style="width:230px;text-align: center;" src="https://static.igem.org/mediawiki/2018/d/d4/T--NEFU_China--yeast-boom.png" alt="Figure4" >
 
 
</td>
 
</td>
 
</table>
 
</table>
Line 402: Line 387:
 
</div>
 
</div>
  
<div id="background-reference">
 
<h1 style="font-size: 65px;color: orange!important;height: 70px;">Reference</h1>
 
<p> <a href="#"> [1] Pu, Jinyue and Zinkus-Boltz, Julia and Dickinson, Bryan C. (2017) Evolution of a split RNA polymerase as a versatile biosensor platform. <em><em>Nat Chem Biol 13</em></em> , 432-438 </a>
 
<br>
 
<a href="#"> [2] Pu, Jinyue and Zinkus-Boltz, Julia and Dickinson, Bryan C. (2017) Evolution of a split RNA polymerase as a versatile biosensor platform. <em><em>Nat Chem Biol 13</em></em> , 432-438 </a>
 
<br>
 
<a href="#"> [3] Pu, Jinyue and Zinkus-Boltz, Julia and Dickinson, Bryan C. (2017) Evolution of a split RNA polymerase as a versatile biosensor platform. <em><em>Nat Chem Biol 13</em></em> , 432-438 </a>
 
<br>
 
<a href="#"> [4] Pu, Jinyue and Zinkus-Boltz, Julia and Dickinson, Bryan C. (2017) Evolution of a split RNA polymerase as a versatile biosensor platform. <em><em>Nat Chem Biol 13</em></em> , 432-438 </a>
 
<br>
 
<a href="#"> [5] Pu, Jinyue and Zinkus-Boltz, Julia and Dickinson, Bryan C. (2017) Evolution of a split RNA polymerase as a versatile biosensor platform. <em><em>Nat Chem Biol 13</em></em> , 432-438 </a>
 
<br>
 
<a href="#"> [6] Pu, Jinyue and Zinkus-Boltz, Julia and Dickinson, Bryan C. (2017) Evolution of a split RNA polymerase as a versatile biosensor platform. <em><em>Nat Chem Biol 13</em></em> , 432-438 </a>s
 
</p>
 
<br><br><br>
 
</div>
 
  
<div class="background-foot">
+
 
<div id="foot-title">
+
 
<table frame="void">
+
<tr>
+
<td>
+
<h1>Userfull links</h1>
+
<h2>
+
<a href="https://2018.igem.org/Team:NEFU_China">Home</a>
+
&nbsp;&nbsp;&nbsp;&nbsp;
+
<a href="https://2018.igem.org/Team:NEFU_China/Model">Model</a>
+
&nbsp;&nbsp;&nbsp;
+
<a href="https://2018.igem.org/Team:NEFU_China/Description">Project</a>
+
    &nbsp;&nbsp;
+
    <a href="https://2018.igem.org/Team:NEFU_China/Software">Software</a>
+
</h2>
+
+
<h2>
+
+
<a href="https://2018.igem.org/Team:NEFU_China/Basic_Part">Parts</a>
+
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
+
<a href="https://2018.igem.org/Team:NEFU_China/Members">Teams</a>
+
&nbsp;&nbsp;
+
<a href="https://2018.igem.org/Team:NEFU_China/Lock_Key">Results</a>
+
&nbsp;
+
<a href="https://2018.igem.org/Team:NEFU_China/Notebook">Notebook</a>
+
</h2>
+
+
<h2>
+
<a href="https://2018.igem.org/Team:NEFU_China/Human_Practices">Human &nbsp;Practice</a>
+
</h2>
+
</td>
+
<td style="padding-left: 70px!important;">
+
<h1>Follow us</h1>
+
<img alt="facebook" src="https://static.igem.org/mediawiki/2018/b/b5/T--NEFU_China--facebook.png">
+
&nbsp;&nbsp;&nbsp;
+
        <img alt="twitter" src="https://static.igem.org/mediawiki/2018/3/36/T--NEFU_China--twitter.png">
+
&nbsp;&nbsp;&nbsp;
+
<img alt="wehchat" src="https://static.igem.org/mediawiki/2018/c/ca/T--NEFU_China--wechat.png">
+
        <br>
+
        <img alt="facebook" src="https://static.igem.org/mediawiki/2018/b/b5/T--NEFU_China--facebook.png">
+
&nbsp;&nbsp;&nbsp;
+
        <img alt="twitter" src="https://static.igem.org/mediawiki/2018/3/36/T--NEFU_China--twitter.png">
+
&nbsp;&nbsp;&nbsp;
+
<img alt="wehchat" src="https://static.igem.org/mediawiki/2018/c/ca/T--NEFU_China--wechat.png">
+
+
</td>
+
<td style="padding-left: 70px!important;">
+
<h1>Contact us</h1>
+
<h2>iGEM-NEFU_China2018</h2>
+
<h2>Email: hexinglu@nefu.edu.cn</h2>
+
<h3>No.26 Hexing Road, Xiangfang <br>District, Harbin, Heilongjiang <br>Province 150000</h3>
+
</td>
+
</tr>
+
</table>
+
</div>
+
<div id="foot-declare">
+
<p>
+
+
</p>
+
</div>
+
</div>
+
 
</body>
 
</body>
 
</html>
 
</html>

Latest revision as of 21:34, 17 October 2018

Background

Background

Since ancient time, people have been seeking for safe ways of information storage and transfer to combat message leaks that have recently become a public security problem and greatly concerns all over the world. To overcome this, encryption technologies have been developed and widely used to ensure the safety of important information.




For example, the Da Vinci code cylinder was recorded in the Da Vinci manuscript. If the messages were retrieved in a wrong way, the letter with the white phosphorus would be self-destroyed.

Figure1

Figure2

However, these self-destruction approaches could not provide sufficient confidentiality. Then the steganography technique was developed, by which the information could only be present after special treatments, like dipped in alum water, instead of being read directly with naked eyes.


In 1854, the Playfair cipher invented by Charles Wheatstone made the English alphabet frequency statistical analysis useless. This method is convenient and safe to be used, which also provides a great reference to our password books.

Figure3

Recently, two biological encryption systems built on the spores of Bacillus subtilis have been used to safely send a key and an encrypted message, respectively. Based on the previous work, we planned to establish a DNA-based information storage and transmission system of high safety using the knowledge and techniques of synthetic biology and computer science, and this time, we used yeast to achieve our goal.

Figure4

In this project, we built an information storage and transfer system with high security on using yeast spores, which consists of six modules, including “CODING”, “WRITE IN”, “LOCKING”, “MISLEADING”, “TIME DELAY SUICIDE” and “READ OUT”. Together with the computation methods developed in this project, we designed and incorporated a considerable number of genetic parts into the six modules above to ensure the safety of information stored in and transferred using our system.

Figure4