Security device

From 2007.igem.org

(Difference between revisions)
Line 4: Line 4:
As indicated earlier, in order for the modified SMB to behave as a secure source of sterile somatic cells, three events should be initiated upon activation of a switch. This could be done in the following manner:
As indicated earlier, in order for the modified SMB to behave as a secure source of sterile somatic cells, three events should be initiated upon activation of a switch. This could be done in the following manner:
-
[[Image: security device.jpg|center|500px]]
+
[[Image: security scheme.jpg|center|400px]]
* EVENT 1  
* EVENT 1  
Line 25: Line 25:
-
[[Image: security scheme.jpg|center|400px]]
+
[[Image: security device.jpg|center|500px]]

Revision as of 23:03, 24 October 2007

Back to Paris/Applications


As indicated earlier, in order for the modified SMB to behave as a secure source of sterile somatic cells, three events should be initiated upon activation of a switch. This could be done in the following manner:

Security scheme.jpg
  • EVENT 1

In order to achieve massive induction of recombination,, we could add inducible promoter in regulation of Cre expression (pBad for example). It could allow us to differentiate every cell into somatic cell. The generation of a substantial number of somatic cells should be possible if we let the system work alone (positive feedback by pDAPA). And once this number is enough we could add arabinose to express Cre in every germ cell (long and strong induction), leading to massive G to S differentiation. But a certain proportion of G cells would however persist.

  • EVENT 2

The solution to second challenge could be coupling the high recombination switch to a retarded suicide switch in the gem line cells. This could be the expression of ccdB suicide gene in the germ line cells.

This could be the opportunity to practically apply one of the founder principles of synthetic biology: modularity in systems assembly.

Indeed, a time delay circuit has already been described, constructed & theoretically studied (Sara Hooshangi et al. 2005, Sara Hooshangi et al. 2006 and Juan M. Pedraza et al. 2006). Using such a time delay circuit could allow using a single signal to induce event 1, followed after a delay by event 2.

  • EVENT 3

We could also be able to screen the somatic cells by the size. Indeed S cells that have lost FtsK expression present a strange phenotype: they grows without dividing. We also could keep big cells (Cell sorting). The threshold should be determined by studying the size repartition of germ cells and somatic cells to improve sensitivity and specificity of our test.


Security device.jpg



References

  • Ultrasensitivity and noise propagation in a synthetic transcriptional cascade

Sara Hooshangi, Stephan Thiberge, and Ron Weiss PNAS March 8, 2005 vol.102 no. 10 p3581–3586

  • Noise Propagation in Gene Networks

Juan M. Pedraza and Alexander van Oudenaarden SCIENCE March 25, 2005 vol.307

  • The effect of negative feedback on noise propagation in transcriptional gene networks

Sara Hooshangi and Ron Weiss CHAOS 16, 026108 (2006)