Line 355: | Line 355: | ||
In our case, secret information is stored in spy yeast, and if the spy yeast is intercepted, killer yeast can secrete α factors to induce spy yeast apoptosis. Therefore, the time of apoptosis induction, in other words, the time from interception to spy yeast self-destruction, determines the security of stored information.</span> The level of security is an important criterion to evaluate the quality of our encryption system. Therefore, we built models to calculate the time of apoptosis induction to prove our system of high quality. Meanwhile, if wet lab would like to store information for a certain time, we can also give a reasonable initial input of killing yeast and spy yeast according to our models. <br><br> | In our case, secret information is stored in spy yeast, and if the spy yeast is intercepted, killer yeast can secrete α factors to induce spy yeast apoptosis. Therefore, the time of apoptosis induction, in other words, the time from interception to spy yeast self-destruction, determines the security of stored information.</span> The level of security is an important criterion to evaluate the quality of our encryption system. Therefore, we built models to calculate the time of apoptosis induction to prove our system of high quality. Meanwhile, if wet lab would like to store information for a certain time, we can also give a reasonable initial input of killing yeast and spy yeast according to our models. <br><br> | ||
<img src="https://static.igem.org/mediawiki/2018/a/a3/T--NEFU_China--modeloverview.png" style="width: 600px;margin-left: 260px!important;margin-right: 260px!important;"><br><br> | <img src="https://static.igem.org/mediawiki/2018/a/a3/T--NEFU_China--modeloverview.png" style="width: 600px;margin-left: 260px!important;margin-right: 260px!important;"><br><br> | ||
− | The time of spy yeast death induced by killer yeast is directly dependent on the expression efficiency of the proapoptotic gene, Bax, which has been engineeringly integrated into the spy yeast genome by us. In our case, the expression efficiency of Bax gene is relevant to the promoter | + | The time of spy yeast death induced by killer yeast is directly dependent on the expression efficiency of the proapoptotic gene, Bax, which has been engineeringly integrated into the spy yeast genome by us. In our case, the expression efficiency of Bax gene is relevant to the promoter strength of the Fig2c promoter</span>. Therefore, we first analyzed the parameters of Fig2c promoter-mediated transcription. Based on the experimental procedure, we predicted that Fig2c promoter-mediated transcription is mainly proportional to the initial dosage of the spy yeast, killer yeast, and alpha factor secreted by killer yeast</span>. To test our prediction, we <span style="color:greenyellow">conducted the correlation analysis </span>. According to our correlation analysis, we find our our hypothesize is right.<p> |
Secondly, with induced apoptosis of the spy yeast, the percentage of killer yeast would increase, while the percentage of spy yeast would decrease in the cocultured yeast population. This phenomenon could be depicted that the killer yeast preyed on the spy yeast. Therefore, we improved the initial predator-prey model and <span style="color:greenyellow">established a killing model.</span> <p>Using this new model, we can estimate the time of information destruction with different initial ratios between the killer yeast and spy yeast, and verify the security levels of information storage using our biological encryption system. Also,according to the information storage time, we can find the corresponding initial input of two yeasts, which can guide the wet laboratory experiment to determine optimal initial input. This is the most important problem to solve in our modeling.<br><br><br> | Secondly, with induced apoptosis of the spy yeast, the percentage of killer yeast would increase, while the percentage of spy yeast would decrease in the cocultured yeast population. This phenomenon could be depicted that the killer yeast preyed on the spy yeast. Therefore, we improved the initial predator-prey model and <span style="color:greenyellow">established a killing model.</span> <p>Using this new model, we can estimate the time of information destruction with different initial ratios between the killer yeast and spy yeast, and verify the security levels of information storage using our biological encryption system. Also,according to the information storage time, we can find the corresponding initial input of two yeasts, which can guide the wet laboratory experiment to determine optimal initial input. This is the most important problem to solve in our modeling.<br><br><br> | ||
</p> | </p> |
Revision as of 10:13, 17 October 2018
Model
In our case, secret information is stored in spy yeast, and if the spy yeast is intercepted, killer yeast can secrete α factors to induce spy yeast apoptosis. Therefore, the time of apoptosis induction, in other words, the time from interception to spy yeast self-destruction, determines the security of stored information. The level of security is an important criterion to evaluate the quality of our encryption system. Therefore, we built models to calculate the time of apoptosis induction to prove our system of high quality. Meanwhile, if wet lab would like to store information for a certain time, we can also give a reasonable initial input of killing yeast and spy yeast according to our models.
The time of spy yeast death induced by killer yeast is directly dependent on the expression efficiency of the proapoptotic gene, Bax, which has been engineeringly integrated into the spy yeast genome by us. In our case, the expression efficiency of Bax gene is relevant to the promoter strength of the Fig2c promoter. Therefore, we first analyzed the parameters of Fig2c promoter-mediated transcription. Based on the experimental procedure, we predicted that Fig2c promoter-mediated transcription is mainly proportional to the initial dosage of the spy yeast, killer yeast, and alpha factor secreted by killer yeast. To test our prediction, we conducted the correlation analysis . According to our correlation analysis, we find our our hypothesize is right.
Secondly, with induced apoptosis of the spy yeast, the percentage of killer yeast would increase, while the percentage of spy yeast would decrease in the cocultured yeast population. This phenomenon could be depicted that the killer yeast preyed on the spy yeast. Therefore, we improved the initial predator-prey model and established a killing model.
Using this new model, we can estimate the time of information destruction with different initial ratios between the killer yeast and spy yeast, and verify the security levels of information storage using our biological encryption system. Also,according to the information storage time, we can find the corresponding initial input of two yeasts, which can guide the wet laboratory experiment to determine optimal initial input. This is the most important problem to solve in our modeling.