Computational identification of rare codons of Escherichia coli based on codon pairs preference
نویسندگان
چکیده
منابع مشابه
Emergent rules for codon choice elucidated by editing rare arginine codons in Escherichia coli.
The degeneracy of the genetic code allows nucleic acids to encode amino acid identity as well as noncoding information for gene regulation and genome maintenance. The rare arginine codons AGA and AGG (AGR) present a case study in codon choice, with AGRs encoding important transcriptional and translational properties distinct from the other synonymous alternatives (CGN). We created a strain of E...
متن کاملCodon Pairs in the Genome of Escherichia Coli
MOTIVATION The effect of two neighboring codons (codon pairs) on gene expression is mediated via the interaction of their cognate tRNAs occupying the two functional ribosomal sites during the translation elongation step. For steric reasons it is reasonable to assume that not all combinations of codons and therefore of tRNAs are equally favorable when situated on the ribosome surface. Aiming of ...
متن کاملStop codons preceded by rare arginine codons are efficient determinants of SsrA tagging in Escherichia coli.
The SsrA or tmRNA quality control system intervenes when ribosomes stall on mRNAs and directs the addition of a C-terminal peptide tag that targets the modified polypeptide for degradation. Although hundreds of SsrA-tagged proteins can be detected in cells when degradation is prevented, most of these species have not been identified. Consequently, the mRNA sequence determinants that cause ribos...
متن کاملLow-usage codons and rare codons of Escherichia coli Mini Review
In Escherichia coli (E. coli), a low-usage codon is defined as a codon that is used rarely or infrequently in the genome with usage frequency lower than the smallest value (or frequency cut-off) among the usage frequencies of non-degenerate codons (Met codon AUG and Trp codon UGG) and the optimal codons for amino acids Leu, Ile, Val, Ser, Pro, Thr, Ala, Arg, Gly and Gln that have 2 or more dege...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: BMC Bioinformatics
سال: 2010
ISSN: 1471-2105
DOI: 10.1186/1471-2105-11-61